How can we protect foritgate against a huge number of attempts to
establish an IPsec tunnel, secured by a certificate with a bad
certificate in request? That fact strongly imposes a huge load on one of
the CPUs.
How do we prevent a scenario when the first email is sent to a
particular recipient within the IBE system, being intercepted by a
hacker? After this hackers can create accounts in IBE and read emails.
If sender alignment is used on Fortimail, it will block emails sent by
some third-party applications for example from smartphones even if a
domain of the sender (e.g. gmail.com) is legitimate. Would you happen to
know how to avoid it?
But what in case when such a email is trasmitted via series of MTA and I
cannot be sure that between 2 MTA not controlled be me email is send in
clear text format?
Hi,I know that it works like you mentioned. But before it was also
possible to use formula: select * from $log and it worked. I have such a
formula in current version of training materials for FortiAnalyzer
Analyst training, that's because I have pos...
Hi,I was wrong. According to training materials formula:select * from
$log should display column names from relevant log. but as I can see it
gives syntax error:"Merge: please use specific columns instead of '*'