Description This article describes that FortiMail accepts Virus
Signature. Scope All FortiMail Versions. Solution For AntiVirus
Profiles, a Default Action should always be Configured.For Example: This
Action will be applied for the known 'Virus Signa...
Description Technical discusses FortiSandbox Realtime Anti-Phishing
Service. Scope FortiSandbox v4.2.0 and above. Solution It is possible to
enable the Realtime Anti-Phishing Service by executing the Following
Command: # anti-phishing -e Once this is...
Description This article describes how to resolve issues related to VM
Clones on FortiSandbox with AMD CPU. Scope FortiSandbox v4.2. Solution
For the latest versions (Version 4.2.0 & above) the minimum requirement
for AMD Processors is ESXi v6.7 and ...
Description This article describes how to Resolve Issues related to
emails that are NOT Received / Sent due to Size Limits Scope All
FortiMail versions Solution The Default FortiMail Maximum Message Size
is 10MB. 1) Max Content Limit. Detected by Con...
Hello @rcpdkc, Regarding your questions, 1.: Is it normal for a private
virtual machine not to access the internet in edit mode? + Yes, this is
expected behavior. The edit mode is for some small changes (such as
refine the autorun.bat file, install o...
Dear @natsu30 , I'm sorry to hear that you did not have all the required
help & answers to your questions from TAC. Regarding the Custom VM
License,Yes, the Custom VM License allows you to run 20 VMs which either
you can prepare or Download a Pre-con...
Hello David,Regarding your Questions,Q1.: No this is not possible
distribute jobs to specific HA node. Only if you remove the Node from
the Cluster and re-add it when needed.Q2.: Upgrade the Worker First so
the Secondary will Work in the Meantime, th...
Dear Aaqib, From FortiSandbox side nothing special to do, it works as
normal ICAP.From Forcepoint side please check if there are any
additional requirements ex.: license or special configuration that needs
to be done. Best RegardsKonstantinos Agritel...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.