Description This article describes the role assignment for FortiNAC
users, hosts, and network devices. If more than one method is applied,
the role selection will be chosen according to this list. Scope
FortiNAC. Solution In the event that multiple m...
Description This article describes how to configure endpoint
registration using Passive Agent. When a user connects to the network
and logs in, FortiNAC determines the directory group to which the user
belongs.Based on that group, a Passive Agent con...
Description This article describes how to export the Persistent Agent
configuration from a windows host. This is useful for sharing with TAC
when performing Persistent Agent troubleshooting. Scope FortiNAC.
Solution 1) Open Windows registry editor: P...
Description This article describes workarounds for two errors: 1)
'Failure: Failed to retrieve Activities' when opening the Scheduler. 2)
'Failure: Failed to retrieve table properties'. Scope Any supported
version of FortiNAC. Solution 1) 'Failure: F...
Description This article explains the issue of large infrastructure and
where L2 polling takes too long, FortiNAC can be tuned for using more
threads for that process. Scope FortiNAC all versions Solution The file
bridgeManager.properties controls th...
Hi Yngve0, You can try following this technical document with the
Best regards. Ezequiel.
Hi umerhassan, You can try following this technical document
Best regards. Ezequiel
Hi ergotherego,Here you can find our official documentation regarding
Configure minimum privilege Windows AD user account To respect the
Hello Guy_L Ubuntu is officially supported according to our release
notes, but Kali is not mentioned, you can have more information from the
Hello cybernet2025, I did more internal research and I found the timer
you modified will be the real one, any attempt to finish authentication
after 180 seconds will fail, but the one shown is hard-coded on
FortiClient side. Best regards. Ezequiel Bu...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.