Hello everyone.
I have a question regarding the status of some hosts in FortiNAC that are showing as "Disabled Online". I have already checked the settings to find out the reason, but so far I have not been able to find the cause and resolve the issue. Has anyone else experienced this? If so, can you share what was done to resolve the issue?
Thank you for your attention.
Solved! Go to Solution.
Since there is an Event for DPR re confirmation, you can check the rule that matches this host if it has selected the option 'Disable Device If Rule No Longer Matches Device', details below:
Hi
From menu Users & Hosts > Hosts, try right click on the host, then click Enable Host.
Also try see what happened by clicking menu item Show Events, and Show Audit Log.
Hi,
I had already performed this procedure, but after a while the device returned to showing as online disabled.
Regarding the Show Events and Audit Log options, everything seems to be fine.
Thank you for your attention and information.
The device has probably been automatically disabled by some event.
Check under the following:
You may find there an action like "Disable Host" that has been configured under some conditions. This may be the cause.
Normally if there is a configuration in place that disables the hosts they should be also isolated, some details are shown in this article: Technical Tip: Configuring Dead End as Enforcement
In addition to Event mapping, the hosts may also be disabled by Device profiling rules which have configured the 'Rule Confirmation Settings' or if the user is disabled Technical Tip: Disable user account in AD LDAP.
Dear all, I appreciate your feedback regarding the situation highlighted, however I am still looking for a solution where in the NAC some devices appear with "online disabled" status even though they are operational and registered.
Did you find any recorded actions while r-clicking the host and checking 'Show Events' and 'Show Audit Log'?
Are the affected hosts registered to a user, if yes are these users valid and enabled?
Do these hosts have a Persistent Agent installed and are they being regularly scanned (Override Scan Result Actions)?
Created on 07-23-2025 12:26 PM Edited on 07-23-2025 12:27 PM
Did you find any recorded actions while r-clicking the host and checking 'Show Events' and 'Show Audit Log'?
Show Events -> "Device Rule Confirmation Success".
Show Audit Log -> No history.
Are the affected hosts registered to a user, if yes are these users valid and enabled?
R- Not.
Do these hosts have a Persistent Agent installed and are they being regularly scanned (Override Scan Result Actions)?
A- Yes.
Since there is an Event for DPR re confirmation, you can check the rule that matches this host if it has selected the option 'Disable Device If Rule No Longer Matches Device', details below:
User | Count |
---|---|
2592 | |
1380 | |
800 | |
659 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.