DescriptionThis article explains how to block the email of a known
threat.For example, if a user on your network has recently downloaded a
virus onto their computer and they are now sending out emails that
contain harmful malware to other people in t...
DescriptionThis article explains how to replace the default certificate
used by a FortiMail for secure connections.SolutionAll FortiMail units
have a self-signed certificate installed on them by default. It is
recommended to replace this certificate ...
DescriptionThis article provides information concerning the monitoring
and blocking of the Tor browser application.For example you want to
allow one user to use the Tor browser application for web traffic, while
monitoring the user’s activity. Use of...
DescriptionWireless standards are specified and controlled by many
government regulations and everyone using this technology is legally
obliged to abide by them. These regulations can cover what RF bands may
be used, which technology can use specific...