Description This article describes how to block the email of a known
threat.For example, if a user on the network has recently downloaded a
virus onto the computer and now sending out emails that contain harmful
malware to other people in the office ...
DescriptionThis article explains how to replace the default certificate
used by a FortiMail for secure connections.SolutionAll FortiMail units
have a self-signed certificate installed on them by default. It is
recommended to replace this certificate ...
DescriptionThis article provides information concerning the monitoring
and blocking of the Tor browser application.For example you want to
allow one user to use the Tor browser application for web traffic, while
monitoring the user’s activity. Use of...
Description Wireless standards are specified and controlled by many
government regulations and everyone using this technology is legally
obliged to abide by them. These regulations can cover what RF bands may
be used, which technology can use specifi...