Description This article describes how to check, verify and fix policy
package different status.Solution Compatibility between FortiManager and
FortiGates has to be verified before adding the FortiGates to
FortiManager or pushing any configuration fr...
DescriptionThis article provides a solution for when no hostnames are
seen on the FortiAnalyzer under Log View despite resolved host names
being enabled on the FortiGate.Solution - Go to Log View > Column
Settings > More Columns - From the list, chec...
Description This article explains how to disable specific IPS signatures
on a FortiGate managed by FortiManager. It is achieved by running CLI
script on the FortiManager against the ADOM database, and then pushing
the configuration to the FortiGate. ...
DescriptionOne cause of performance statistics logs not showing on the
FortiGate or FortiAnalyzer under “Log View” is that the feature is
disabled. The interval time must be set on the FortiGate to enable the
feature and to generate the logsSolutionT...
DescriptionWhen VDOMs are enabled, log disk quota is limited to a
default value which varies based on the device model and hardware.This
value can be increased or reduced, however the log quota storage is
shared between VDOMs. SolutionThe following c...
Hello,Try to rebuild the database per the following
0 100139590 Regards,
Hello, 1. ADOM creation will affect the existing log stored in FA?No 2.
Can I add the old 310B logs to new ADOM ?Yes from
Hi, We need to check the firmware version of "root" ADOM which all
devices added to it.If the ADOM firmware version for example on v5.0 and
the device running firmware v5.2 it will cause incompatibility issues as
the database is different.Even if sti...
Hello, FortiAnalyzer VM will works the same as FortiAnalyzer
hardware.Also it will works perfectly with either Hyper-V or
VMware.Performance based on the VM hardware (CPU/Memory/Storage) and
FAZVM license.More information can be found on the followin...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.