Description This article describes the flow of FortiGate configuration
from the managed device to the device database and on to the ADOM
database. Scope FortiManager, all platforms, all versions. Solution This
document aims to describe the flow of co...
Description This article explains how to enable the audit of logon
events on a Windows Server for FSSO. Solution From Control Panel, open
Administrative Tools, Local Security Policy.Navigate to Security
Settings > Local Policies > Audit PolicyEnsure ...
Description This article explains how to clear logons for an email
harvesting captive portal. Solution These logons are registered in the
device authentication list. This list can be viewed with the command:
diagnose user device list To filter for a ...
DescriptionThis article lists the variables sent by the FortiGate for
customisation of server side NPS policy.ScopeTested on 5.4.1, should
apply to earlier versions.SolutionSSL VPN RADIUS authentication
Hi Iokatseno,If you are using the same object on multiple firewalls, it
must have the same name in the FMG ADOM DB. This is the Policy & Objects
section of the FMG GUI. If you use one policy package for multiple
fortigates, that will reference object...
Hello Sims,I don't see any default reports in a FAZ running 7.0.4 that
matches these titles that you asked for, I think you might need to
create a custom report yourself to suit your requirements. I can't guess
what information you're looking to disp...
Hello,It looks like the FAZ can't detect the file system.Did you check
the command execute lvm info?If disks show there but the space is not
used, you can try execute lvm extend.If no disks show up with that
command, you'll probably need to change th...
Hello NIS,I see that you removed the RADIUS server IP but also shared
the full hex output of the sniffer and after converting that to a PCAP,
I can see your server IP ending 241.The sniffer shows a login for
username n****jar and the RADIUS server re...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.