| Description | This article is a guide on providing read-only access to UTM profiles and nothing else on the firewall. |
| Scope | All FortiOS versions. |
| Solution |
In some environments, it may be required to give read-only access to the Security profiles (UTM) configured on the FortiGate and nothing else. This can be done to give a SOC team a means of seeing changes to security profile configurations without the access to change anything.
The steps to achieve this are outlined below:
Using the CLI:
config system accprofile
Using the CLI:
config system admin
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.