| Description |
This article outlines the recommended steps to be executed when a FortiWeb appliance is suspected or confirmed to have been compromised due to a vulnerability or post-exploit persistence mechanism. It covers the actions required to contain the incident, assess the compromise, restore trust in the device, and securely rebuild its configuration. The guidance reflects the assumption that malicious actors may have gained access to, altered, or persistently embedded themselves into the device’s configuration or file system. |
| Scope | All FortiWeb VM & Hardware Devices |
| Solution |
The recommended mitigation steps for compromised FortiWeb VM and hardware devices are listed below:
config system global set threat-analytics disable end
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.