Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
jacobcamp
New Contributor

Endpoint encryption check for SSL-VPN

I am trying to configure control checks for SSLVPN clients connecting to the network through Fortigate SSL-VPN. I can perform OS version and realtime AV checks through the SSL-VPN Portals on the Fortigate, but I also need to check controls for patches, and above all disk encryption. It appears as though ForticlientEMS can provide the patch checks/remediation, but I have yet to find any information about whether ForticlientEMS can also check for endpoint encryption in order to QT users and block them from SSL-VPN access until remedied. Does anyone know if the encryption aspect is possible with EMS.

1 REPLY 1
Markus_M
Staff
Staff

Hey Jacob,

 

I cannot say for sure on the EMS/EDR front, but I guess that this will depend on some specific factor that the endpoint encryption supplies. I am assuming with endpoint encryption, you mean disk encryption.

Detecting this is difficult. Whether this is a specific registry value, file existence, daemon is difficult to say and will differ from the encryption implementation used.

I can imagine this being VERY difficult to detect if the disk is encrypted by its own native disk encryption (many SSDs offer this).

To an encrypted disk, you authenticate on device boot, not the OS.

- If you authenticate successfully, the OS is loaded.

- If you fail to authenticate the disk is unreadable, OS cannot be found.

- The disk encryption might be managed by BitLocker and then again you could detect it, then you authenticate to the bootloader, that passes this to the disks and keeps the "successful auth" info available for Windows authentication, such as having a single sign on.

 

If your clients are all the same type, this is maybe easier.

If they are different, you will have a hard time having them match policies.

 

Best regards,

 

Markus

Labels
Top Kudoed Authors