Hi Forti Fellows, I deployed the FGT-60E over 6.0 and 6.0.2 for the
explicit web proxy authentication. The issue is that after all
configuration of explicit web proxy by following the process of making "
authentication scheme (basic + NTLM method), a...
Hi Fortinet Fellows I want to know that is it possible to get AD-user
based extensive report in FortiGate Local Reports or Forticloud?. Is it
only possible in Forti Analyzer? Thanks in advance. Khizer Saleem
Hi FortiFellows I used to create the FortiGate local pdf report, i want
to ask can we customize the Fortigate report or not? The puprpose for
the customization is, shown in attached image, i want to get the traffic
in and out volume separately, as in...
Hi Boris You are lucky, after searching for more than an hour, I finally
got the table. Here is the link for your consideration.
can find the detail of AD Groups and FSSO Servers t...
Hi Boris Forgot to mention that, always use the FSSO agent installed on
Domain controller in the big AD environment. For more assistance, you
can contact me on my personal email, firstname.lastname@example.org
Hi Boris, No no, you are not clear on it. You can add 1000+ AD groups
per single FSSO Object, and it's confirmed.I consult the Fortinet TAC
engineer while doing my project of the explicit web proxy.
Unfortunately, I lost that table in which exact num...
Hi Boris, You just have to make that users part of multiple AD-Groups,
and then map that AD Groups in FSSO agent under Fabric Connector tab,
and then map that FSSO objects in the groups.After making groups, you
can call them in multiple rules. I used...
Hi You can push the proxy setting on the AD-Machines using the GPO too.
Or you can integrate your macs with the AD then you can also control the
traffic by macs using SSO. For the ipv4 policies, I don't know, may b
they have a method for it too.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.