Has anyone come across this error before Cannot enumerate
(LDAP ID 11) until email alert is sent for previous error: An operation
error occurred. it sort of came after the cannot enumerate the domain
error i get, which usually to fix it is to remove...
HI All Does anyone have a procedure on how to do this, just been having
so many issues with the software. I feel like i just need to start over
again. Do i need to remove the agent from all the endpoints first, or
can they be left alone (current vers...
Is it possible and if so what would be required to have forticilent ems
visible to endpoints that are off the domain, so they receive any policy
/ profile updates or new configurations. So when connected the endpoint
checks its ip address and if set ...
Getting the following errors when trying to add a 2nd domain. 1st domain
adds and syncs fine and it locates the endpoints. Testing the 2nd domain
is successful and i save the config, just than you try and do a manual
sync it keeps failing with the 2 ...
we are running v6.4.2 build 1570 we have 2 domains that are in use with
the EMS, one of those domains is fine and reporting back as normal. I
have opened a support ticket and sent the logs to them, but they do take
a while to respond.
Are you seeing the following warning in the logs under the
administration menu, Cannot enumerate DC=*********,DC=**** (LDAP ID 5)
due to previous error: Failed to roll back transaction while handling
exception. This is what we have been getting recen...
Hi Check the ip address of the new server, as it may be assigned a DHCP
ip address if you haven't set the ip address to static. Also just try
and ping the new EMS server ip address from the endpoint. See if it gets
my client installers are on the EMS Server in the following folder
(x86)\Fortinet\FortiClientEMS\Clients\Installers\Default after the
default folder their should be a current version folder with the .exe
and msi files within that. I ...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.