Created on
11-23-2022
10:16 PM
Edited on
11-12-2025
01:11 AM
By
Jean-Philippe_P
| Description |
This article describes the steps to take when evidence of compromised device integrity is detected on Fortinet devices.
A device may become corrupted, for example, due to power issues, abrupt shutdown, environmental anomalies, or, in some cases, due to malicious activity. In such cases, it is important to be able to restore device integrity.
This article explains what factors may lead to identifying such a scenario and how to proceed. |
| Scope | All FortiGates and FortiOS firmware versions. |
| Solution |
Since FortiOS v7.4.0, v7.2.5, v7.0.12 & v6.4.13, strong device integrity checks are incorporated into the boot process. A FortiGate with these versions will not boot if integrity is compromised.
Fortinet TAC can also help verify device integrity by confirming the FortiOS capability and running filesystem integrity checks.
Note that inadvertent knowledge of device configuration entries does not constitute a compromised device; these can be resolved by configuration changes.
Under other unlikely scenarios, it may become necessary to re-format and fresh install FortiOS. The following outlines how to achieve this.
In the event of inadvertent or unauthorized access to the device configuration, ensure the following changes are made after upgrading to or reloading the most recent version of FortiOS:
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.