@Anthony_E @sramanujam has very well explained how to increase limit but
Step 4 is not clear as to which service to be restarted, as I cannot
afford to restart all services, can you specify which services needs
restart to give effect to
changes.https...
Overview:In NAC-based environments, it's common to see compliance
violations or host breaches reported daily. However, not all of them
require immediate action—especially if they self-remediate. The real
concern arises when a host remains non-complia...
Hello Community,We are currently facing an issue with our log archive
setup. Our system consists of 1 supervisor and 2 workers. We've mounted
an NFS for log archiving purposes, but we are still experiencing our
archive getting filled up on both worke...
Assume I have 50 network device license and 1000 Extra EPS after
forwarding 50 network device logs.Can this 1000 Extra EPS be utilised to
install NXLog agent in windows PC and collect logs? I
When we add credentials in FortiSIEM admin settings, it only asks to map
IP.Same IP can belong to multiple clients also, But in mapping there is
no option to select collector. So how to map credentials to correct
device linked to correct collector. A...
We have implemented CA issued wildcard SSL Certificate in Supervisor,
Worker and Collector and added host names in etc/hosts. Securing all to
and fro communications with TLS yet not exposing servers by adding DNS
record anywhere.
Suggested query by @cdurkin_FTNT surely worked for me!While my next
concern was how to get last reporting time for devices not reporting in
given period of time.So i did different work around.
So far what I have done is:Step 1: Created report for reporting device
using event countBut this report will only fetch devices who are sending
logs and not all devices Step 2: I used CMDB search for nested report to
search reporting IP not in Step 1...