Description This article describes how to view the FortiCASB Data
Protection Usage information. It is maybe necessary to preconfigure the
respective Data Protection Policy and refer to the documentation at the
end of this article for more information...
Description This article describes how to upgrade FortiIsolator-VM
firmware. Scope FortiIsolator-VM. Solution It is always recommended to
review and read through the respective version's Release Notes and make
sure to back up the FortiIsolator config...
Description This article describes how to failover traffic group to the
other node in High Availability (HA) Active-Active VRRP mode. It may be
necessary to preconfigure the HA Active-Active VRRP setup and refer to
the documentation at the end of thi...
Description This article describes how to enable Route health injection
(RHI) for OSPF.It is maybe necessary to preconfigure other respective
Virtual Server setup and OSPF setup and refer to the documentation at
the end of this article for more infor...
Description This article describes how to bypass anomaly detection for
Machine Learning for a specific URL parameter.It is necessary to
preconfigure other respective server policy and Machine Learning setups
and refer to the documentation at the end ...
Hi ys1, Hope you're doing well. Currently, there's no tool or converter
to migrate the FortiWAN configuration to the FortiADC. You may need to
adapt the configuration on the FortiADC manually. You may review below
documentation on the FortiADC Link L...
Hello Forti_New, Hope you're doing well. For Q1. The disk capacity is
the hardware spec for the said model. It is not possible to change it.We
would suggest to use external logging device for the FortiWeb logs such
Hello @TBC, Please see below replies; > Do I need to request a separate
certificate for each domain? Yes. >Do all domains also have to be
reachable via port 80? You may want to check Letsencrypt's article
below: 1- Best Practice - Keep Port 80 Open
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.