Most Liked Posts Recent Solutions
No Content Available

User Activity

DescriptionThis article explains how to block the email of a known threat.For example, if a user on your network has recently downloaded a virus onto their computer and they are now sending out emails that contain harmful malware to other people in t...
DescriptionThis article explains how to replace the default certificate used by a FortiMail for secure connections.SolutionAll FortiMail units have a self-signed certificate installed on them by default. It is recommended to replace this certificate ...
DescriptionThis article provides information concerning the monitoring and blocking of the Tor browser application.For example you want to allow one user to use the Tor browser application for web traffic, while monitoring the user’s activity. Use of...
Description Wireless standards are specified and controlled by many government regulations and everyone using this technology is legally obliged to abide by them. These regulations can cover what RF bands may be used, which technology can use specifi...