1. FortiOS 7.4 Administration Guide: In the "Firewall policies" section
it is detailed that for each policy
an administrator must enable the "Log Violation Traffic" option to record logs for traffic handled by that policy. This demonstrates the need for explicit configuration. (Reference: FortiOS Administration Guide 7.4
Chapter: "Firewall"
Section: "Firewall policies").
2. FortiAnalyzer 7.4.2 Administration Guide: The troubleshooting section lists "The logging device is not configured to send logs to the FortiAnalyzer unit" as a primary reason for not receiving logs. This directly supports the idea that the source device's configuration is a critical factor. (Reference: FortiAnalyzer Administration Guide 7.4.2
Chapter: "Troubleshooting"
Section: "Logs are not being received from a registered device").
3. FortiOS 7.4 High Availability Guide: The "HA logging" section explains that in an active-passive cluster
the primary unit is responsible for sending traffic logs. The secondary unit only sends logs about its own operation. This confirms that a configuration issue on the primary unit (Option C) would be the reason for missing traffic logs from the cluster. (Reference: FortiOS High Availability Guide 7.4
Chapter: "Introduction to HA"
Section: "HA logging").