Description | This article describes how to allow a device such as a Vulnerability Scanner for Intrusion Prevention while simultaneously logging the signatures generated from the machine. |
Scope | FortiGate. |
Solution |
In some scenarios, Administrators want to allow specific devices/scanners while enabling Intrusion Prevention logging for monitoring and analysis purposes. To achieve this, the following setup is required: Custom IPS Profile Creation with the action set to monitor for all signatures - FortiGate administra....
Firewall Policies Required:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.