Hello FNAC admins,
What's the most recommended method(s) in device profiling rules ? I know it depends for each scenario.
Also I wanna know if it's best to use many methods in one rule, or each rule better have one method ?
Thanks in advance
BR,
Solved! Go to Solution.
Hello BH
All I remember is that lighter rules should be at top. This helps FNAC to profile devices without using much resources.
Have a look at the best practices:
https://docs.fortinet.com/document/fortinac-f/7.6.0/administration-guide/185068/best-practices
Besides, if you need it more secure in device auto registration or re-validation then then "I think" you may need to harden the profiling rules instead of using OUI, DHCP fingerprint and other weak methods.
Hope it helps.
The details are covered on this dedicated guide Device Profiler Configuration, and Prioritization is very important. Rules should be ordered accordingly, and any rules that include methods from 'Must Be Received' should always be placed at the bottom.
For example, if a host matches a rule that evaluates DHCP but lacks DHCP fingerprint details, its evaluation becomes stuck, and other rules are not processed.
Methods under 'Needs to Be Read' usually require a host IP to extract information. Ensure that FNAC can receive this information through L3 polling on network devices.
Hello BH
All I remember is that lighter rules should be at top. This helps FNAC to profile devices without using much resources.
Have a look at the best practices:
https://docs.fortinet.com/document/fortinac-f/7.6.0/administration-guide/185068/best-practices
Besides, if you need it more secure in device auto registration or re-validation then then "I think" you may need to harden the profiling rules instead of using OUI, DHCP fingerprint and other weak methods.
Hope it helps.
Thank you for the help AEK, I understand now
BR,
The details are covered on this dedicated guide Device Profiler Configuration, and Prioritization is very important. Rules should be ordered accordingly, and any rules that include methods from 'Must Be Received' should always be placed at the bottom.
For example, if a host matches a rule that evaluates DHCP but lacks DHCP fingerprint details, its evaluation becomes stuck, and other rules are not processed.
Methods under 'Needs to Be Read' usually require a host IP to extract information. Ensure that FNAC can receive this information through L3 polling on network devices.
Thank you for this detailed explanation Emirjon. I will defo read those articles after that I am done with the admin guide
BR,
| User | Count |
|---|---|
| 2790 | |
| 1423 | |
| 812 | |
| 748 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.