Rackmount your Fortinet --> http://www.rackmount.it/fortirack
config webfilter urlfilter
edit 1
config entries
edit " .*update\\.microsoft\\.com.*"
set action monitor
set type regex
next
edit " .*download\\.windowsupdate\\.com.*"
set action monitor
set type regex
next
edit " .*\\.microsoft\\.com.*"
set action monitor
set type regex
next
end
set name " defined-urlfilter"
next
end
Next, setup the fgt device group/schedule for running the script...
1. Under Device Manager (Root), right click on the Fortigate group, choose Script->Scheduled Scripts->Create New->Select Script->{name of script from above}
2. Uncheck " Run on DB(Only CLI Scripts)" (if you want the script run directly on the fgt devices)
3. Under " Select Execute Type" choose schedule type.
4. Check " Exclude Certain Devices from the Group" if you want to exclude some devices from the script run.
Note the above is untested and I am not sure if you need to run the script against the DB or not. (i.e. the fgt device may go out-of-sync with the fgr.)
Also, I suggest running the script on a stand-alone fgt to confirm it is running properly (you may need to remove the padded spaces).
Again, the above is untested -- use this info at your own risk.
Edit: I am assuming the white list is a URL filter list (but any script code should do).
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
| User | Count |
|---|---|
| 2712 | |
| 1416 | |
| 810 | |
| 732 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.