Thanks for helping on the last question about reading the logs. This one
really has me stumped. I'm struggling to figure out how to use the log
view. In capture1 you can see the log shows a source "HP101F74020EA4
(10.36.0.6)" this was particularly tr...
I am really trying to understand what I see in the logs. The screenshot
shows a highlighted line (8:32:51) where a user attempting to get to
"188.8.131.52" and then in parenthesis it says
"connectivitycheck.android.com" The attempt is blocked and t...
The number one complaint I get is "I clicked 'release' on a quarantine
email and it never showed up"Is there a way to find out if they really
did click release or if they accidentally clicked delete? and when it
was logged so I can check the email se...
I am having trouble with Windows laptops and sleep, when they come out
of a long sleep they don't get authenticated at the firewall and have to
reboot. Then all is fine Our setup:Aruba controller using Radius
authenticationMicrosoft Server with NPS a...
The fortimail unit does a good job of protecting us but I feel it is
really lacking in some features. Some things I hope will be evaluated
for future releases: 1) better tracking of quarantine emails. The number
1 complaint I get is "I clicked releas...
update... we successfully were able to make this work. however....two
major hurdles exist. 1) "deep-inspection" of certificates IS required,
which means either the Fortigate certificate must be installed on all
workstations, or a trusted certificate ...
not yet. I opened a ticket on it and was told we needed to implement
proxy. So I have spent the last couple of months working out enabling
proxy with AD integration. Once we had it set up, I opened another
ticket and was told we didn't need a proxy.....
m.razaThere are a lot of possibilities to go wrong with the
Fortigate-Fortianalyzer combo.First check your System Settings tab and
look at the "Log Receive Monitor" and make sure it shows logs are being
received. If it does not show them being receiv...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.