Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

3200 Youtube Followers!

Pretty stoked on this one guys!

View Article


FortiOS 6.2 Authentication Best Practices

Authentication You must add a valid user group to activate the Authentication check box on the firewall policy configuration page. Users can authenticate with the firewall using HTTP or FTP. For users...

View Article


FortiOS 6.2 Antivirus Best Practices

Antivirus Enable antivirus scanning at the network edge for all services. l Use FortiClient endpoint antivirus scanning for protection against threats that get into your network. Subscribe to...

View Article

FortiOS 6.2 Intrusion Prevention System Best Practices

Intrusion Prevention System (IPS) Your FortiGate’s IPS system can detect traffic attempting to exploit this vulnerability. IPS may also detect when infected systems communicate with servers to receive...

View Article

FortiOS 6.2 Email Filter Best Practices

Email filter Spam is a common means by which attacks are delivered. Users often open email attachments they should not, and infect their own machine. l Enable email filtering at the network edge for...

View Article


FortiOS 6.2 Web Filtering Best Practices

Web filtering FortiGuard Web Filtering can help stop infections from malware sites and help prevent communication if an infection occurs. Enable FortiGuard Web Filtering at the network edge. l Install...

View Article

FortiOS 6.2 Patch management Best Practices

Patch management When vulnerabilities are discovered in software, the software vendors release updates that fix these problems. Keeping your software and operating system up-to-date is a vital step to...

View Article

FortiOS 6.2 Policy configuration Best Practices

Policy configuration Configuring the FortiGate unit with an ‘allow all’ traffic policy is very undesirable. While this does greatly simplify the configuration, it is less secure. As a security measure,...

View Article


Buy Hardware Reminder

Hey Guys! Just a reminder that we do have an official Fortinet GURU store now so you can buy Fortinet hardware and services / support. It is located at the Buy Fortinet Hardware link that is at the top...

View Article


FortiOS 6.2 Networking Best Practices

Networking When configuring your network, ensure that there is no ‘back door’ access to the protected network. For example, if there is a wireless access point, it must be appropriately protected with...

View Article

FortiOS 6.2 FGCP high availability Best Practices

FGCP high availability Fortinet suggests the following practices related to high availability: Use Active-Active HA to distribute TCP and UTM sessions among multiple cluster units. An active-active...

View Article

FortiOS 6.2 WAN Optimization Best Practices

WAN Optimization WAN Optimization features require significant memory resources and generate a high amount of I/O on disk. Before enabling WAN Optimization, ensure that the memory usage is not too...

View Article

FortiOS 6.2 Virtual Domains (VDOMs) Best Practices

Virtual Domains (VDOMs) VDOMs can provide separate firewall policies and, in NAT mode, completely separate configurations for routing and VPN services for each connected network or organization. This...

View Article


FortiOS 6.2 Explicit proxy Best Practices

Explicit proxy For explicit proxies, when configuring limits on the number of concurrent users, you need to allow for the number of users based on their authentication method. Otherwise you may run out...

View Article

FortiOS 6.2 Wireless Best Practices

Wireless The following section contains a list of best practices for wireless network configurations with regard to encryption and authentication, geographic location, network planning, power usage,...

View Article


FortiOS 6.2 Logging and Reporting Best Practices

Logging and reporting The default log device settings must be modified so that system performance is not compromised. The FortiGate unit, by default, has all logging of FortiGate features enabled,...

View Article

What is Sandbox Inspection?

What is Sandbox Inspection? Sandbox inspection is a network process that allows files to be sent to a separate device, such as FortiSandbox, to be inspected without risking network security. This...

View Article


FortiSandbox Appliance vs FortiSandbox Cloud

FortiSandbox Appliance vs FortiSandbox Cloud FortiSandbox is available as a physical or virtual appliance (FortiSandbox Appliance), or as a cloud advanced threat protection service integrated with...

View Article

Sending Files for Sandbox Inspection

Sending Files for Sandbox Inspection Sending files to the FortiSandbox appliance or to FortiSandbox Cloud does not block files immediately. Instead, the files assist in the discovery of new threats and...

View Article

Using FortiSandbox with a FortiGate

Using FortiSandbox with a FortiGate Connecting a FortiGate to FortiSandbox The procedures for connecting a FortiGate to FortiSandbox differ depending whether you are using FortiSandbox Appliance or...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>