FortiNAC-F
FortiNAC-F is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks. For legacy FortiNAC articles prior to FortiNAC-F 7.2, see FortiNAC.
Hatibi
Staff
Staff
Article Id 348726
Description This article describes the features and differencies between the Persistent Agent and FortiClient EMS in terms of endpoint compliance.
Scope FortiNAC, Persistent Agent, FortiClient EMS.
Solution

FortiNAC can leverage integrations with FortiClient EMS or any Third Party MDM solution, to register endpoints and then apply Network Access Control by using 'MDM compliant' state as a filter in its Policies. In these cases, the compliance part is covered by the MDM and FortiNAC simply uses this information (Compliant or Not) to apply control.

 

FortiNAC can also use the Persistent Agent to register Endpoints. Compliance in this case is configured in FortiNAC through Endpoint Compliance policies.

 

Different features are checked for Compliance.

FortiClient EMS will provide compliance and cover endpoint security in the following areas:

 

  • Secure remote access (VPN,SSO,ZTNA).
  • Application control.
  • Web filtering.
  • Vulnerability patching.

This documentation provides more details on EMS endpoint profiles and its features.

 

FortiNAC collects the following host data when it polls FortiClient EMS:

 

  • Type (PC/Android/IOS).
  • Operating System.
  • Owner (User).
  • Host Name.
  • Compliance (Boolean based on Vulnerability State).

 

When an endpoint is marked in FortiClient EMS as 'Compliant', FortiNAC will check the 'Quarantine' attribute to determine if updating the host attribute with MDM is compliant or not.

 

To troubleshoot, enable the following debug commands in the FortiNAC-F CLI:

 

diagnose debug plugin enable MdmManager
diagnose debug plugin enable FortinetEMSServer

diagnose tail -F output.master

 

Filtered output from the returned information from EMS will show the following JSON data for a compliant endpoint:

 

yams.FortinetEMSServer FINER :: DATE :: 8334 :: endpointsJson =
{"XXXXXXXXXXXXXXXXXX":{"client_cert_sn":"0","fct_ver":[7,0,6],
"is_registered":true,
"public_ip":"Y.Y.Y.Y",
"memory":"4094",
"fct_build_no":238,
"user_name":"FortiUser"
"host_manufacturer":"VMware, Inc.",
"av_sig_ver":[1,0],
"quarantined":false, <---------------
"indirectly_connected":false,
"mac":"xx-xx-xx-xx-xx",
"onnet":true,
"hostname":"FortiHost"

 

The MDM Compliant attribute and/or other Host attributes can be then leveraged to enforce control on the registered host.

 

Figure 1. Example on using different MDM compliance criteria to enforce controlFigure 1. Example on using different MDM compliance criteria to enforce control

 

In FortiNAC Host view, it is possible to add Columns that represent specific attributes that are used in the Network Access Policies.

This makes it easier to identify if a host is currently MDM managed or if there is no Persistent Agent installed. Failing to match the defined criteria will result in the Host matching no policy. In these cases, FortiNAC returns the Default VLAN configured in the Model configuration or port/SSID.

 

Figure 2. Adding specific columns in Host view for increased visibility of Host attributes.Figure 2. Adding specific columns in Host view for increased visibility of Host attributes.

 

The Persistent Agent can register, authenticate and proactively scan hosts by returning Host/Adapter/User attribute information to FortiNAC.

Additionally the Persistent agent provides the following in combination with Endpoint Compliance policies in FortiNAC:

 

Application Inventory can also be used as a filter to enforce control.

Figure 3 shows the list of the attributes that can be used.

 

Figure 3. Application Inventory Attributes that can be leveraged for Policy Matching.Figure 3. Application Inventory Attributes that can be leveraged for Policy Matching.

 

An example would be a group of users that have a unique Application Version or vendor that is used only by them.

Using such attributes will make it possible to correctly apply network access.

Another option would be to use the 'Threat Score', where a High threat score value can be used as filter and applied in policies that Isolate the host.

 

Using both FortiClient EMS (MDM) integration and the Persistent Agent will provide a complete endpoint security posture as the complement each other in different areas.

FortiClient EMS data can be used for the initial Host registration and compliance in secure remote access, while the Agent will apply custom scans, scan chaining and monitors to proactively make sure that the Host is fulfilling the criteria of being allowed to access production resources. If any of these criteria do not match, FortiNAC will move the host to remediation state when a scan fails or will change the VLAN to a Isolation VLAN when the EMS reports that host is not Compliant.

 

Related documentation: