Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

How to create a backup solution for logging

How to create a backup solution for logging The following helps to explain how to create a log backup solution for a small network topology. This example has one FortiAnalyzer unit and a subscription...

View Article


Reports

Reports Reports provide a way to analyze log data without manually going through a large amount of logs to get to the information you need. This section explains how to configure a FortiOS report and...

View Article


What are FortiOS reports?

What are FortiOS reports? FortiOS reports are configured from logs stored on the FortiGate unit’s hard drive. These reports, generated by the FortiGate unit itself, provide a central location for both...

View Article

Best Practices: Log management

Best Practices: Log management When the FortiGate unit records FortiGate activity, valuable information is collected that provides insight into how to better protect network traffic against attacks,...

View Article

Logging and reporting for small networks

Logging and reporting for small networks This section explains how to configure the FortiGate unit for logging and reporting in a small office or SOHO/SMB network. To properly configure this type of...

View Article


Logging and reporting for large networks

Logging and reporting for large networks This section explains how to configure the FortiGate unit for logging and reporting in a larger network, such as an enterprise network. To set up this type of...

View Article

Advanced logging

Advanced logging This section explains how to configure other log features within your existing log configuration. You may want to include other log features after initially configuring the log...

View Article

Troubleshooting and logging

Troubleshooting and logging This section explains how to troubleshoot logging configuration issues, as well as connection issues, that you may have with your FortiGate unit and a log device. This...

View Article


Chapter 19 – Managing Devices

Chapter 19 – Managing Devices What’s New in FortiOS 5.4 Managing “bring your own device” Device monitoring Device Groups Controlling access with a MAC Address Access Control List Security policies for...

View Article


Managing “bring your own device”

Managing “bring your own device”   FortiOS can control network access for different types of personal mobile devices that your employees bring onto your premises. You can: identify and monitor the...

View Article

Chapter 20 – Managing a FortiSwitch with a FortiGate

Chapter 20 – Managing a FortiSwitch with a FortiGate   Managing a FortiSwitch with a FortiGate   Introduction This document provides information about how to setup and configure Managed FortiSwitches...

View Article

Image may be NSFW.
Clik here to view.

Chapter 21 – Sandbox Inspection

Chapter 21 – Sandbox Inspection   Sandbox Inspection This guide explains how to set up sandbox inspection using FortiSandbox with a FortiGate. It contains the following sections: An Overview of Sandbox...

View Article

Image may be NSFW.
Clik here to view.

Chapter 22 – Security Profiles

Chapter 22 – Security Profiles This FortiOS Handbook chapter contains the following sections: What’s new in FortiOS 5.4 lists and describes the new security profile features in FortiOS 5.4. Security...

View Article


Route Based (Interface Based) IPSec Tunnels

This is a video I created to provide guidance on how to configure a basic IPSec tunnel (route based) between two FortiGates. A more advanced video will be released that provides a more in depth look...

View Article

Security Profiles overview

Security Profiles overview Ranging from the FortiGate®-30 series for small businesses to the FortiGate-5000 series for large enterprises, service providers and carriers, the FortiGate line combines a...

View Article


Security Profiles components

Security Profiles components   AntiVirus Your FortiGate unit stores a virus signature database that can identify more than 15,000 individual viruses. FortiGate models that support additional virus...

View Article

Security Profiles/lists/sensors

Security Profiles/lists/sensors A profile is a group of settings that you can apply to one or more firewall policies. Each Security Profile feature is enabled and configured in a profile, list, or...

View Article


AntiVirus

AntiVirus This section describes how to configure the antivirus options. From an antivirus profile you can configure the FortiGate unit to apply antivirus protection to HTTP, FTP, IMAP, POP3, SMTP, and...

View Article

Antivirus concepts

Antivirus concepts The word “antivirus” refers to a group of features that are designed to prevent unwanted and potentially malicious files from entering your network. These features all work in...

View Article

Enabling AntiVirus scanning

Enabling AntiVirus scanning Antivirus scanning is configured in an AntiVirus profile, but it is enabled in a firewall policy. Once the use of an antivirus profile is enabled and selected in one or more...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>