How to create a backup solution for logging
How to create a backup solution for logging The following helps to explain how to create a log backup solution for a small network topology. This example has one FortiAnalyzer unit and a subscription...
View ArticleReports
Reports Reports provide a way to analyze log data without manually going through a large amount of logs to get to the information you need. This section explains how to configure a FortiOS report and...
View ArticleWhat are FortiOS reports?
What are FortiOS reports? FortiOS reports are configured from logs stored on the FortiGate unit’s hard drive. These reports, generated by the FortiGate unit itself, provide a central location for both...
View ArticleBest Practices: Log management
Best Practices: Log management When the FortiGate unit records FortiGate activity, valuable information is collected that provides insight into how to better protect network traffic against attacks,...
View ArticleLogging and reporting for small networks
Logging and reporting for small networks This section explains how to configure the FortiGate unit for logging and reporting in a small office or SOHO/SMB network. To properly configure this type of...
View ArticleLogging and reporting for large networks
Logging and reporting for large networks This section explains how to configure the FortiGate unit for logging and reporting in a larger network, such as an enterprise network. To set up this type of...
View ArticleAdvanced logging
Advanced logging This section explains how to configure other log features within your existing log configuration. You may want to include other log features after initially configuring the log...
View ArticleTroubleshooting and logging
Troubleshooting and logging This section explains how to troubleshoot logging configuration issues, as well as connection issues, that you may have with your FortiGate unit and a log device. This...
View ArticleChapter 19 – Managing Devices
Chapter 19 – Managing Devices What’s New in FortiOS 5.4 Managing “bring your own device” Device monitoring Device Groups Controlling access with a MAC Address Access Control List Security policies for...
View ArticleManaging “bring your own device”
Managing “bring your own device” FortiOS can control network access for different types of personal mobile devices that your employees bring onto your premises. You can: identify and monitor the...
View ArticleChapter 20 – Managing a FortiSwitch with a FortiGate
Chapter 20 – Managing a FortiSwitch with a FortiGate Managing a FortiSwitch with a FortiGate Introduction This document provides information about how to setup and configure Managed FortiSwitches...
View ArticleChapter 21 – Sandbox Inspection
Chapter 21 – Sandbox Inspection Sandbox Inspection This guide explains how to set up sandbox inspection using FortiSandbox with a FortiGate. It contains the following sections: An Overview of Sandbox...
View ArticleChapter 22 – Security Profiles
Chapter 22 – Security Profiles This FortiOS Handbook chapter contains the following sections: What’s new in FortiOS 5.4 lists and describes the new security profile features in FortiOS 5.4. Security...
View ArticleRoute Based (Interface Based) IPSec Tunnels
This is a video I created to provide guidance on how to configure a basic IPSec tunnel (route based) between two FortiGates. A more advanced video will be released that provides a more in depth look...
View ArticleSecurity Profiles overview
Security Profiles overview Ranging from the FortiGate®-30 series for small businesses to the FortiGate-5000 series for large enterprises, service providers and carriers, the FortiGate line combines a...
View ArticleSecurity Profiles components
Security Profiles components AntiVirus Your FortiGate unit stores a virus signature database that can identify more than 15,000 individual viruses. FortiGate models that support additional virus...
View ArticleSecurity Profiles/lists/sensors
Security Profiles/lists/sensors A profile is a group of settings that you can apply to one or more firewall policies. Each Security Profile feature is enabled and configured in a profile, list, or...
View ArticleAntiVirus
AntiVirus This section describes how to configure the antivirus options. From an antivirus profile you can configure the FortiGate unit to apply antivirus protection to HTTP, FTP, IMAP, POP3, SMTP, and...
View ArticleAntivirus concepts
Antivirus concepts The word “antivirus” refers to a group of features that are designed to prevent unwanted and potentially malicious files from entering your network. These features all work in...
View ArticleEnabling AntiVirus scanning
Enabling AntiVirus scanning Antivirus scanning is configured in an AntiVirus profile, but it is enabled in a firewall policy. Once the use of an antivirus profile is enabled and selected in one or more...
View Article