Fortinet Document Library
Version:
6.4.3
6.4.2
6.4.1
Version:
6.4.0
6.2.8
6.2.7
Version:
6.2.6
6.2.5
6.2.4
Version:
6.2.3
6.2.2
6.2.1
Version:
6.2.0
6.0.10
6.0.9
Version:
6.0.8
6.0.7
6.0.6
Version:
6.0.5
6.0.4
6.0.3
Version:
6.0.2
6.0.1
6.0.0
Version:
5.6.6
5.6.5
5.6.4
Version:
5.6.3
5.6.2
5.6.1
Version:
5.6.0
5.4.5
5.4.4
Version:
5.4.3
5.4.2
5.4.1
Version:
5.4.0
Table of Contents
Introduction
Modes and features
Standalone mode
Managed mode
Feature comparison of standalone and managed modes
Fortinet product support for FortiClient
FortiClient EMS
FortiManager
FortiGate
FortiAnalyzer
FortiSandbox
Feature comparison of FortiClient Windows, macOS, and Linux
What’s new in FortiClient 6.0
FortiClient 6.0.9
FortiClient 6.0.8
FortiClient 6.0.7
FortiClient 6.0.6
FortiClient 6.0.5
FortiClient 6.0.4
FortiClient 6.0.3
FortiClient 6.0.2
FortiClient 6.0.1
FortiClient 6.0.0
EMS quarantine file management
User data security improvement
New FortiClient GUI
Improved FortiSandbox Detection techniques
Installed Software Inventory
Customize system quarantine message
FortiClient installs and runs as a 64-bit process on 64-bit platforms
Linux support
Getting started
Getting started with standalone mode
Getting started with managed mode
Managed mode concepts
Terminology
FortiGate and FortiClient Compliance profiles
EMS and endpoint profiles
Telemetry connection options
Telemetry gateway IP lists
EMS and automatic upgrade of FortiClient
Provisioning preparation
Installation requirements
Licensing
FortiClient licenses for FortiGate
FortiClient licenses for EMS
Required services and ports
FortiClient setup types and modules
EMS and FortiClient setups
FortiGate compliance and FortiClient setups
Firmware images and tools
Microsoft Windows
macOS
Linux
Where to download FortiClient installation files
Custom FortiClient installation files
Provisioning
Installing FortiClient on computers
Microsoft Windows
Microsoft Server
macOS
Linux
Installing FortiClient on infected systems
Installing FortiClient as part of cloned disk images
Installing FortiClient using the CLI
Deploying FortiClient using Microsoft AD servers
Using Microsoft AD to deploy FortiClient
Using Microsoft AD to uninstall FortiClient
Uninstalling FortiClient
Upgrading FortiClient
User details
Viewing user details
Retrieving user details from cloud applications
Adding phone number and email address manually
Specifying the user avatar manually
Compliance & Telemetry
FortiClient Telemetry
Telemetry data
How FortiClient locates FortiGate or EMS
Connecting FortiClient Telemetry after installation
Remembering gateway IP addresses
Compliance
Enabling compliance
Connecting FortiClient Telemetry manually
Disconnecting FortiClient Telemetry
Viewing compliance status
Standalone mode
Managed mode with EMS
Managed mode with FortiGate
Viewing FortiGate compliance rules
Accessing endpoint details
Viewing gateway IP lists
On-net/off-net status with FortiGate and EMS
FortiGate and EMS
FortiGate only
EMS only
Logging to FortiAnalyzer
Fixing non compliance (blocked)
Viewing unmet compliance rules
Fixing non-compliant settings
Patching software vulnerabilities
Examples of blocked network access
Fixing non compliance (warning)
Quarantined endpoints
Malware Protection
AntiVirus
Enabling RTP
Third party AV software and RTP
Disabling RTP
Configuring AntiVirus
Blocking malicious websites
Blocking known attack communication channels
Updating the AntiVirus database
Scheduling AntiVirus scanning
Managing the AntiVirus exclusion list
Configuring additional AntiVirus options
Scanning with AntiVirus on demand
Scanning now
Scanning files or folders
Submitting files to FortiGuard for analysis
Viewing AntiVirus scan results
Viewing quarantined threats
Viewing site violations
Viewing alerts
Viewing RTP events
Viewing FortiClient engine and signature versions
AntiExploit
Enabling and disabling exploit prevention
Viewing detected exploit attempts
Viewing applications protected from exploits
Excluding applications from protection
Evaluating the anti-exploit detection feature
Sandbox Detection
Enabling Sandbox Detection
Checking FortiClient authorization for FortiSandbox scanning
Disabling Sandbox Detection
Configuring Sandbox Detection
Configuring submission, access, and remediation
Examples of FortiSandbox availability and scanning results
Configuring exceptions
Managing the Sandbox Detection exclusion list
Scanning with FortiSandbox on demand
Viewing Sandbox Detection results
Viewing FortiSandbox scan results
Viewing quarantined files
Submitting quarantined files for scanning
Restoring quarantined files
Deleting quarantined files
Using the popup window
Viewing notifications
Configuring removable media access
Web Filter
Enabling Web Filter
Disabling Web Filter
Configuring web filtering
Configuring site categories
Managing the Web Filter exclusion list
Configuring settings
Viewing violations
Troubleshooting Web Filter
Application Firewall
Viewing blocked applications
Viewing application firewall profiles
Vulnerability Scan
Compliance and vulnerability scanning
Enabling vulnerability scan
Scanning now
Canceling scans
Automatically fixing detected vulnerabilities
Reviewing detected vulnerabilities before fixing
Manually fixing detected vulnerabilities
Viewing details about vulnerabilities
Viewing vulnerability scan history
Remote Access
Enabling remote access
Configuring VPN connections
Configuring SSL VPN connections
Configuring IPsec VPN connections
Connecting VPNs
Connecting SSL and IPsec VPNs
Connecting VPNs with FortiToken Mobile
Save password, auto connect, and always up
Access to certificates in Windows Certificates Stores
Advanced features (Microsoft Windows)
Activating VPN before Windows log on
Connecting VPNs before logging on (AD environments)
Creating redundant IPsec VPNs
Creating priority-based SSL VPN connections
Advanced features (macOS)
Creating redundant IPsec VPNs
Creating priority-based SSL VPN connections
VPN tunnel and script
Windows
macOS
Standalone SSL VPN client
Windows and macOS
Linux
Settings
System
Backing up or restoring full configuration files
Logging
Enabling logging for features
Sending logs to FortiAnalyzer or FortiManager
Exporting the log file
Clearing entries in the log file
Antivirus options
VPN options
Advanced options
Single Sign-On mobility agent
Configuration lock
FortiTray
Diagnostic Tool
Appendix A - FortiClient API
Overview
API reference
Appendix B - FortiClient log messages
Appendix C - Vulnerability patches
Appendix D - FortiClient processes
FortiClient (Windows) processes
FortiClient (macOS) processes
Change log
Home
FortiClient 6.0.9
Administration Guide
Administration Guide
Introduction
Modes and features
Standalone mode
Managed mode
Feature comparison of standalone and managed modes
Fortinet product support for FortiClient
FortiClient EMS
FortiManager
FortiGate
FortiAnalyzer
FortiSandbox
Feature comparison of FortiClient Windows, macOS, and Linux
What’s new in FortiClient 6.0
FortiClient 6.0.9
FortiClient 6.0.8
FortiClient 6.0.7
FortiClient 6.0.6
FortiClient 6.0.5
FortiClient 6.0.4
FortiClient 6.0.3
FortiClient 6.0.2
FortiClient 6.0.1
FortiClient 6.0.0
EMS quarantine file management
User data security improvement
New FortiClient GUI
Improved FortiSandbox Detection techniques
Installed Software Inventory
Customize system quarantine message
FortiClient installs and runs as a 64-bit process on 64-bit platforms
Linux support
Getting started
Getting started with standalone mode
Getting started with managed mode
Managed mode concepts
Terminology
FortiGate and FortiClient Compliance profiles
EMS and endpoint profiles
Telemetry connection options
Telemetry gateway IP lists
EMS and automatic upgrade of FortiClient
Provisioning preparation
Installation requirements
Licensing
FortiClient licenses for FortiGate
FortiClient licenses for EMS
Required services and ports
FortiClient setup types and modules
EMS and FortiClient setups
FortiGate compliance and FortiClient setups
Firmware images and tools
Microsoft Windows
macOS
Linux
Where to download FortiClient installation files
Custom FortiClient installation files
Provisioning
Installing FortiClient on computers
Microsoft Windows
Microsoft Server
macOS
Linux
Installing FortiClient on infected systems
Installing FortiClient as part of cloned disk images
Installing FortiClient using the CLI
Deploying FortiClient using Microsoft AD servers
Using Microsoft AD to deploy FortiClient
Using Microsoft AD to uninstall FortiClient
Uninstalling FortiClient
Upgrading FortiClient
User details
Viewing user details
Retrieving user details from cloud applications
Adding phone number and email address manually
Specifying the user avatar manually
Compliance & Telemetry
FortiClient Telemetry
Telemetry data
How FortiClient locates FortiGate or EMS
Connecting FortiClient Telemetry after installation
Remembering gateway IP addresses
Compliance
Enabling compliance
Connecting FortiClient Telemetry manually
Disconnecting FortiClient Telemetry
Viewing compliance status
Standalone mode
Managed mode with EMS
Managed mode with FortiGate
Viewing FortiGate compliance rules
Accessing endpoint details
Viewing gateway IP lists
On-net/off-net status with FortiGate and EMS
FortiGate and EMS
FortiGate only
EMS only
Logging to FortiAnalyzer
Fixing non compliance (blocked)
Viewing unmet compliance rules
Fixing non-compliant settings
Patching software vulnerabilities
Examples of blocked network access
Fixing non compliance (warning)
Quarantined endpoints
Malware Protection
AntiVirus
Enabling RTP
Third party AV software and RTP
Disabling RTP
Configuring AntiVirus
Blocking malicious websites
Blocking known attack communication channels
Updating the AntiVirus database
Scheduling AntiVirus scanning
Managing the AntiVirus exclusion list
Configuring additional AntiVirus options
Scanning with AntiVirus on demand
Scanning now
Scanning files or folders
Submitting files to FortiGuard for analysis
Viewing AntiVirus scan results
Viewing quarantined threats
Viewing site violations
Viewing alerts
Viewing RTP events
Viewing FortiClient engine and signature versions
AntiExploit
Enabling and disabling exploit prevention
Viewing detected exploit attempts
Viewing applications protected from exploits
Excluding applications from protection
Evaluating the anti-exploit detection feature
Sandbox Detection
Enabling Sandbox Detection
Checking FortiClient authorization for FortiSandbox scanning
Disabling Sandbox Detection
Configuring Sandbox Detection
Configuring submission, access, and remediation
Examples of FortiSandbox availability and scanning results
Configuring exceptions
Managing the Sandbox Detection exclusion list
Scanning with FortiSandbox on demand
Viewing Sandbox Detection results
Viewing FortiSandbox scan results
Viewing quarantined files
Submitting quarantined files for scanning
Restoring quarantined files
Deleting quarantined files
Using the popup window
Viewing notifications
Configuring removable media access
Web Filter
Enabling Web Filter
Disabling Web Filter
Configuring web filtering
Configuring site categories
Managing the Web Filter exclusion list
Configuring settings
Viewing violations
Troubleshooting Web Filter
Application Firewall
Viewing blocked applications
Viewing application firewall profiles
Vulnerability Scan
Compliance and vulnerability scanning
Enabling vulnerability scan
Scanning now
Canceling scans
Automatically fixing detected vulnerabilities
Reviewing detected vulnerabilities before fixing
Manually fixing detected vulnerabilities
Viewing details about vulnerabilities
Viewing vulnerability scan history
Remote Access
Enabling remote access
Configuring VPN connections
Configuring SSL VPN connections
Configuring IPsec VPN connections
Connecting VPNs
Connecting SSL and IPsec VPNs
Connecting VPNs with FortiToken Mobile
Save password, auto connect, and always up
Access to certificates in Windows Certificates Stores
Advanced features (Microsoft Windows)
Activating VPN before Windows log on
Connecting VPNs before logging on (AD environments)
Creating redundant IPsec VPNs
Creating priority-based SSL VPN connections
Advanced features (macOS)
Creating redundant IPsec VPNs
Creating priority-based SSL VPN connections
VPN tunnel and script
Windows
macOS
Standalone SSL VPN client
Windows and macOS
Linux
Settings
System
Backing up or restoring full configuration files
Logging
Enabling logging for features
Sending logs to FortiAnalyzer or FortiManager
Exporting the log file
Clearing entries in the log file
Antivirus options
VPN options
Advanced options
Single Sign-On mobility agent
Configuration lock
FortiTray
Diagnostic Tool
Appendix A - FortiClient API
Overview
API reference
Appendix B - FortiClient log messages
Appendix C - Vulnerability patches
Appendix D - FortiClient processes
FortiClient (Windows) processes
FortiClient (macOS) processes
Change log
6.0.9
6.4.3
6.4.2
6.4.1
6.4.0
6.2.8
6.2.7
6.2.6
6.2.5
6.2.4
6.2.3
6.2.2
6.2.1
6.2.0
6.0.10
6.0.9
6.0.8
6.0.7
6.0.6
6.0.5
6.0.4
6.0.3
6.0.2
6.0.1
6.0.0
5.6.6
5.6.5
5.6.4
5.6.3
5.6.2
5.6.1
5.6.0
5.4.5
5.4.4
5.4.3
5.4.2
5.4.1
5.4.0
Download PDF
Copy Link
Disabling Sandbox Detection
On the
Malware Protection
tab, click the settings icon.
The settings page displays.
Toggle
Sandbox Detection
off.
FortiSandbox Detection is disabled.
Disabling Sandbox Detection
Disabling Sandbox Detection
On the
Malware Protection
tab, click the settings icon.
The settings page displays.
Toggle
Sandbox Detection
off.
FortiSandbox Detection is disabled.
Link
PDF
TOC