What you would need to do first is make sure that the Fortigate logs are being received and parsed by the manager, you can enable the archives that store the events in archives.log and archives.json. What archives does is to save all the logs that the manager received regardless of whether they triggered an alert or not.
To enable the archives storing the events in archives.log and archives.json you should follow this
guide Once they are enabled, you should look in the archives.json or archives.log to see if you are receiving those logs. Once you see that Fortigate logs are being written to those files, it is assumed that the handler should be parsing them. Something VERY IMPORTANT is that once you don't need it, deactivate it, since it generates a high amount of data and can occupy a large part of your storage space, even bringing problems in the future.
So the next step is to take one of the Fortigate logs and with the wazuh-logtest tool see if the log is decoded by the decoders you have and then see if any of the rules match. You can follow this
guide
If there is any rule that is matched and its level is equal or higher than the minimum level configured in the manager to generate alerts, then the alert will be generated.
If the Fortigate log is received and no decoder is able to decode it, you will have to add a custom decoder. You can follow this
guide If the Fortigate log is received and decoded correctly, you may not be matching any of the rules. In case you want to be alerted about some circumstance, and there is no rule for it, you would have to create one. You can follow this
guide See this
example for more information on how to create custom rules and decoders.
The log has to be received by the manager so that it can be analyzed by it, if it is not being received due to a bad configuration, it will be impossible to see any alert.