EMS for Internal and External FortiClients
When deploying EMS in your environment, you want to make sure the users can communicate back to EMS when connected internally as well as externally. Is seems that there is some confusion so I decided ...

When deploying EMS in your environment, you want to make sure the users can communicate back to EMS when connected internally as well as externally. Is seems that there is some confusion so I decided ...
Normally, I position FortiMail for anti-SPAM at customers. However, today I decided to play with the Anti-SPAM feature on the FortiGate itself. NOTE: You will require the UTM, Enterprise or the ala ca...
Although the FortGate CAN operate in transparent mode, I rarely used/use it. Fortinet introduced VWire which is a layer 2 pair of interfaces. These interfaces do NOT have an IP address assigned to eit...
FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing...
An organization's workforce is its most valuable asset. And when an employee can't work due to illness or injury, it impacts not only an organization's productivity, but also its morale. This toolkit ...
When you configure a FortiGate in HA, normally, there is no way connect to the second box unless you ssh to the master and then connect via it to the secondary. The only way to connect to the secondar...
Most of the documentation out there will tell you to configure a Domain Admin user to perform LDAP authentication. When I am doing a Proof-of-Concept (PoC), and I tell a prospective customer to create...
Fortinet announced today it is opening the entire online, self-paced catalogue of advanced Network Security Expert training courses for free. Fortinet is making 24 advanced security courses available ...
We recommend sending FortiGate logs to a FortiAnalyzer as it produces great reports and great, usable information. However sometimes, you need to send logs to other platforms such as SIEMs. When sendi...
Putting together a presentation I am giving to some customers and decided I wanted to put together an article with a topic that is rarely discussed. The FortiGate firewall can do two-factor authentica...
IPSec Remote Access VPN Naming Limitations on FortiGate There is a 15 character limit on the interface names in FortiOS. When using IPSec for remote access VPNs, it is important to take this into acco...
As more and more users are using remote access VPNs and probably using FortiClient, I wanted to share the errors you are encountering based on the percentage when it fails and some troubleshooting ste...
Lately I have been doing some AWS. I am looking to get certified in the short-term. I was struggling with a customer after I deployed a FortiGate in AWS and could not figure out how to allocate Elasti...
I have been getting asked this question since this coronavirus thing started. I decided I would address it with an article. So the use case is: You want to run a script after the user logs in. This co...
I have been playing with AWS a lot since the pandemic. I wrote another article about adding some VIPs using Elastic IPs. Here I will walk through deploying FAZ in my AWS lab environment. Here is my AW...
In this article, I discuss how to us the FortiGate and the Web-filtering profile to selectively whitelist certain YouTube channels while blocking all other YouTube channels. I also discuss installing ...
Fortinet Team and FortiVet Program Employer Partners,The SHRM Foundation Veterans at Work Certificate, developed for HR professionals, hiring managers, and front-line supervisors, is a multi-faceted p...
As the global COVID-19 pandemic has curtailed our Accelerate 2020 plans in Barcelona, New York and Riviera Maya this year, I am excited to share the news that Fortinet has just announced the Accelerat...
Team,As a proud sponsor and supporter of our military veterans, we are conducting a survey to understand the impact military service members and their families have on Fortinet’s business and culture....
Key Takeaways: Transitioning to a remote workforce has its challenges in terms of logistics to get people up and running from their home offices. Organizations also need to prioritize reducing this ne...
Whether you are upskilling, reskilling or educating yourself to help close the cybersecurity skills gap, it doesn’t matter. Fortinet has three no-cost courses available to anyone who is interested in ...
Today’s businesses are fully aware of the consequences of a successful cyber attack, and yet they continue to struggle to put together a cyber security strategy that can deal with them effectively. An...
Executive Summary: Challenge: Hiring skilled employees that can adequately protect the business from evolving threats Orchestrating point solutions together & having consistent security protections ac...
We'd like to inform you that Accelerate 2020 Barcelona has been cancelled due to the health and safety concerns associated with the coronavirus. What to expect; actions to take: Registration fees paid...
Thanks to the cloud, companies of any sizes are able to take advantage of nearly unlimited resources almost instantaneously. With the increase in cloud adoption, enterprises are also finding themselve...
The cliché of "threats are evolving" is unavoidable. That is because it is true. With threats constantly changing and becoming increasingly complex, organizations need a strategic vendor that can help...
The FortiSwitch 400 series welcomes a new addition in the FortiSwitch 424E-Fiber. This is the first fiber only switch by Fortinet offering 24 slots which you can populate with a variety of long and sh...
With reInvent coming up, there are some things that you should watch out for! Amazon's Web Services (AWS) reInvent 2019 is being held in Last Vegas, with professionals in all industries attending. Wit...
Don't you hate it when you have a really good, strong, fun password and then the associated program/business gets breached and you have to change it? Personally, I hate thinking of new passwords, and ...
Cyber Monday draws millions of shoppers online for deals and savings, but this day also provides opportunities for an attacker to steal personal information. The Cybersecurity and Infrastructure Secur...