Hello, I have a FortiMail device running v5.4. When my internal users
send emails to a specific email address, I would like to know if it is
possible to create a rule/policy that will automatically forward a copy
of this email message, to another adm...
I am currently running firmware version 5.4.4 and will be upgrading to
version 5.6.x. I can see that in v5.6.x "The Botnet category is no
longer available when searching the Application Signatures list." Within
my configuration, I currently have Appl...
I have two FortiGate 300D devices running in an HA cluster.
Configuration is as follows: FGT1 # show system ha config system ha set
group-id 20 set group-name "FGT" set mode a-p set password ***** set
hbdev "port3" 50 "port4" 150 set session-pickup e...
Could you provide me with a little guidance please. I have two new
FortiGate 300D devices, running firmware v5.4. The two devices are part
of a HA cluster.I also have a FortiAnalyzer running firmware v5.4.1.
What process do I following to add the For...
Hello, I am hoping someone can help me with my query. I currently have a
couple of FortiGate 100D devices, running firmware version 5.0. With
these devices I have two-factor authentication setup for my users. I
have a "user identity" policy in place ...
Would I be correct in thinking that if I specified the management IP
address of the primary device and a failover occurred, the FortiAnalyzer
would no longer receive alerts because the IP address is no longer in
Apologies, I think you may have misunderstood. I have a management
interface configured on each of the devices, for the reasons you specify
above. However, when adding the device to the FortiAnalyzer, I must
specify one of the IP addresses that is co...
I want to perform a backup and replication of the VM, using Veeam. When
VMware tools are installed, the VM can be quiesced, so that the
backup/replica is in a consistent state, should I ever need to use them.
Broad. Integrated. Automated.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.