Description This article describes how to disable the sponsor field for
self self-registration portal on FortiAuthenticator. Scope
FortiAuthenticator. Solution The sponsor field is used in the
self-registration portal, where users can select a sponso...
Description This article describes how to fix
user.saml.FORTISASE_SWG_SAML_SERVER.user-name='username' was not found
in the SAML Assertion Response error. Scope FortiSASE. Solution
Accessing SWG would fail with an authentication failed error. Validat...
Description This article describes why the idle timeout setting is not
visible in the FortiSASE GUI. Scope FortiSASE. Solution Authentication
settings under Endpoint management -> Endpoint profiles -> Settings
would not show the idle timeout option a...
Description This article describes the SSL VPN Connection Attempts on
the IPSec-enabled FortiSASE Tenant. Scope FortiSASE. Solution On an
IPSec-enabled instance, it is expected to see an SSL VPN login attempt
under Operations -> Logs -> Events. date=...
Description This article describes how to verify if static cipher suites
are disabled on the FortiGate. Scope FortiGate. Solution A security
audit would need static ciphers to be disabled on the FortiGate for
compliance purposes. Encryption level can...
If you are looking to block upload to OneDrive specifically, as deep
inspection is already enabled add the application control signature
'OneDrive_File.Upload' for personal version of OneDrive and for business
version use the signature 'Microsoft.Sha...
RMA applies to hardware models where a faulty one is replaced. I believe
you are referring to redeploying a VM Deleting a device | FortiManager
7.6.1 | Fortinet Document Library Replacing a managed device |
FortiManager 7.6.4 | Fortinet Document Libr...
Hello UdaM, I would say it would depend on your requirement. Compared to
scheduled scan, event based would perform automatic scan when Endpoint
connects to FortiSASE. Endpoint OS is updated. Vulnerability signatures
are updated. Refer Protection | Fo...
Hello, I would suggest using policy in proxy inspection mode with deep
inspection enabled. Application control and IPs profile can be applied
to block the signatures.