It seems that, in FortiOS 5.0.4, I can receive Log Alert emails EITHER:
1. for ALL Severity levels (for selected categories), OR 2. for ALL
categories (above a selected Severity level). I want to be able to
select only some categories, and only above...
Hi forum users, We' ve got an FG100D which I set up (badly, being a
newbie to FortiOS, despite having 15 years in the security field). We'
ve purchased a second FG100D to set up in HA mode, but having now worked
with the product on-and-off for six+ m...
I' m testing FortiCloud to enable larger volumes of data to be stored
and analyzed without filling up the local flash disk storage of my
FG100D. At first I didn' t know how to turn on DNS reverse resolution in
FortiCloud so that hostnames are visible...
Hi abc, I have already reached out to our own FortiNet reseller asking
for referrals; what I hope to find here, however, is a referral based on
personal experience of one of us in the FortiNet user community, not
just a FortiNet partner who, in theor...
@Dave Thanks. I agree with the analysis, and of course I could manually
track it down at the possible source/exposure point. What I' m hoping
for is that the data gathered by the FortiGate itself would be more
complete and actionable. " This IP might...
Hi Livo, sorry for my long delay in responding. There is no " config log
trafficfilter" option on my FG100D with FortiOD 5.0.4. My guess is that
there is a prerequisite setting somewhere else to make this " config log
trafficfilter" apear? thanks,
Oops, just being an idiot (again). Sorry. I use XPrivacy on my Android
devices, to have permission-by-permission control over apps. I' d
forgotten that, when I installed FortiToken, I' d not adjusted the
default permissions (so I' d prohibited FortiT...
Hi oheigl, I' m not sure I know the difference between a " Dial" IPsec
connection and any other type of IPsec connection. Maybe this will
answer; we do not have any network-to-network VPNs. All of our VPNs are
for end-users on PCs, Macs, Linux machin...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.