Browse
Fortinet Community
Help
Sign In
Forums
Support Forum
Knowledge Base
Customer Service
FortiGate
FortiClient
FortiAP
FortiAnalyzer
FortiADC
FortiAuthenticator
FortiBridge
FortiCache
FortiCarrier
FortiCASB
FortiConnect
FortiConverter
FortiCNP
FortiDAST
FortiDDoS
FortiDB
FortiDNS
FortiDeceptor
FortiDevSec
FortiDirector
FortiEDR
FortiExtender
FortiGate Cloud
FortiGuard
FortiHypervisor
FortiInsight
FortiMail
FortiManager
FortiMonitor
FortiNAC
FortiNDR
FortiPAM
FortiPortal
FortiProxy
FortiRecorder
FortiRecon
FortiScan
FortiSandbox
FortiSIEM
FortiSOAR
FortiSwitch
FortiTester
FortiToken
FortiWAN
FortiVoice
FortiWeb
RMA Information and Announcements
Wireless Controller
FortiCloud Products
ZTNA
Community Groups
Agora
FortiSIEM
Discussions
FortiSOAR
Discussions
Announcements
Idea Exchange
Finland
KCS
Article Ideas
patelj
Staff
03-14-2023
Last activity:
Mar 14, 2023 5:22:38 PM
100
Profile
100% Complete
User Statistics
0
Topics
1
Posts
0
Solutions
0
Kudos
View all badges
Most Liked Posts
Recent Solutions
No Content Available
My Draft
My Article Draft
Status:
All (0)
Draft (0)
Awaiting Review (0)
Awaiting Publication (0)
User Activity
Posts
Replies
No posts to display.
Re: CVE-2021-44228 Apache LOG4J vulnerability
12-12-2021
Run exec update-now and verify if the IPS attack definition is on 19.00215. This will include the signature and then have to set the action to 'block' manually.Since this was the emergency release, default action is still pass.
Kudos given to
User
Count
AlexC-FTNT
1
View all