Configuring EMS settings
FortiClient EMS installs with a default IP address and port configured. You can change the IP address and port and configure other server settings for FortiClient EMS.
When you enable multitenancy, you must configure some EMS settings at the global level, and other settings at the site level. See Global and per-site configuration.
To configure EMS settings:
- Go to System Settings > EMS Settings.
- Configure the following options under Shared Settings. EMS uses these settings for FortiClient EMS managing Windows, macOS, and Linux endpoints, and FortiClient EMS managing Chromebook endpoints:
Hostname
Displays the FortiClient EMS server's hostname.
Listen on IP
Displays the IP addresses for the FortiClient EMS server. FortiClient connects to FortiClient EMS on the specified IP address.
You can generate a QR code for the specified IP address. See Generating a QR code for centrally managing FortiClient (Android) and (iOS) endpoints.
Use FQDN
Specify an FQDN for the FortiClient EMS server.
FortiClient's connection to EMS is critical to managing endpoint security. Managing this is relatively easy for internal devices. For external devices or devices that may leave the internal network, you must consider how to maintain this connection. FortiClient can connect to EMS using an IP address or fully qualified domain name (FQDN). An FQDN is preferable for the following reasons:
- Easy to migrate EMS to a different IP address
- Easy to migrate to a different EMS instance
- Flexible to dynamically resolve the FQDN
The third reason is particularly valuable for environments where devices may be internal or external from day to day. When using an FQDN, you can configure your internal DNS servers to resolve the FQDN to the EMS internal IP address and register your external IP address with public DNS servers. You must then configure the device with your external IP address to forward communication received on port 8013 to your EMS internal IP address. This allows your external clients to leverage a virtual IP address on the FortiGate so that they can reach EMS, while allowing internal clients to use the same FQDN to reach EMS directly.
Alternatively, you can use a private IP address for the connection. This configuration would require external clients to establish a VPN connection to reach the EMS (VPN policies permitting). This configuration can be problematic if all endpoints need an urgent update but some are not connected to VPN at that time.
FQDN
Enter the FortiClient EMS server FQDN. FortiClient can connect using the specified IP address in the Listen on IP Addresses option or the specified FQDN.
Remote HTTPS access
Specify settings for remote administration access to FortiClient EMS.
Turn remote HTTPS access to FortiClient EMS on and off. When enabled, enter a hostname in the Custom hostname field to let administrators use a browser and HTTPS to log into FortiClient EMS. When disabled, administrators can only log into FortiClient EMS on the server.
HTTPS port
Available when Remote HTTPS Access is enabled. Displays the predefined HTTPS port. You cannot change the port.
Pre-defined hostname
Available when Remote HTTPS Access is enabled. Displays the predefined hostname. You cannot change the name.
Custom hostname
Available when Remote HTTPS Access is enabled. Displays the predefined hostname of the server on which FortiClient EMS is installed. You can customize the hostname. When you change the hostname, the web server restarts.
Redirect HTTP request to HTTPS
Available when Remote HTTPS Access is enabled. If this option is enabled, if you attempt to remotely access FortiClient EMS at http://<server_name>, this automatically redirects to https://<server_name>.
SSL certificate
Displays the currently imported SSL certificate. If you have already uploaded an SSL certificate, a Replace button displays. The certificate must be in .pfx format, which is the same as PKCS#12. It contains the private key, along with the public key, and related certificate chain. You can create this certificate using OpenSSL. You can also export it in a Microsoft Windows system using
export-pfxcertificate
PowerShellcommand or certmgr. EMS calls the MSI signtool, along with the .pfx certificate provided, to sign FortiClient installers. If no certificate is provided, EMS does not sign newly generated FortiClient installers. See Adding an SSL certificate to FortiClient EMS.Use SSL certificate for Endpoint Control
Enable to use the certificate uploaded in the SSL certificate field on port 8013. When this option is enabled and FortiClient tries to connect to EMS using the endpoint control protocol, EMS sends the SSL certificate so that FortiClient can use the certificate to verify the connection.
If the SSL certificate is from a publicly signed certificate authority, only endpoints with the FortiClient 6.4.7 and later versions can connect to EMS.
Show FortiGate Server List
When this option is enabled, you can configure FortiGate IP addresses in a Telemetry server list to allow FortiClient to connect directly to FortiOS. FortiClient 6.4.0 and later versions cannot directly connect Telemetry to FortiOS. FortiClient 6.4.0 only connects Telemetry to EMS, which then sends FortiClient data to FortiOS. Only endpoints with FortiClient versions older than 6.4.0 installed can connect Telemetry directly to FortiOS.
When this option is disabled, you can only configure EMS IP addresses in a Telemetry server list.
Reset Stalled Deployment Interval
Enter number of hours after which to reset stalled deployments.
- Configure the following options under EMS Settings. FortiClient EMS uses these settings when managing Windows, macOS, and Linux endpoints:
- If managing Chromebooks, enable EMS for Chromebooks Settings. You may need to restart FortiClient EMS after enabling this option.
- Configure the following options under EMS for Chromebooks Settings. These settings are used by FortiClient EMS managing Chromebook endpoints:
Listen on port
Displays the default port for the FortiClient EMS server for Chromebooks. You can change the port by typing a new port number. The FortiClient Web Filter extension on Chromebooks connects to FortiClient EMS using the specified port number.
User inactivity timeout
Enter the number of hours of inactivity after which to timeout the user.
Profile update interval
Specify the profile update interval (in seconds).
SSL certificate
Displays the SSL certificate currently imported. If you have already uploaded an SSL certificate, a Replace button displays.
Certificate
Browse and upload a new SSL certificate file. See Adding an SSL certificate to FortiClient EMS for Chromebook endpoints.
Password
Configure a new SSL password.
Service account
Displays the service account ID currently in use.
Update service account
Update the service account with new credentials.
Reset service account
In the event your service account is broken, you can revert back to the default service account by clicking the Reset button. This restores the default service account. You must Save the settings for the change to take effect.
ID
Available if the Update service account button is clicked. Enter a new service account ID.
Private key
Available if the Update service account button is clicked. Upload a new service account private key.
- Configure the following options under Endpoints Settings:
FortiClient telemetry connection key
Add the FortiClient Telemetry connection key for FortiClient EMS. FortiClient must provide this key during connection.
You can generate a QR code for the specified key. See Generating a QR code for centrally managing FortiClient (Android) and (iOS) endpoints.
Keep alive interval
Each connected FortiClient endpoint sends a short keep-alive (KA) message to FortiClient EMS at the specified interval.
Full keep alive interval
Each connected FortiClient endpoint sends a full KA message to FortiClient EMS at the specified interval.
Endpoints become unregistered after the configured license timeout. EMS keeps these endpoint records until the EMS administrator manually deletes them or marks them as uninstalled.
Automatically upload avatars
FortiClient uploads user avatars to all FortiGates, FortiAnalyzers, and FortiClient EMS servers it is connected to.
Enable endpoint snapshot reports
Enable endpoint snapshot reports and enter the interval at which to take reports in seconds. The interval must be between 300 and 86400 seconds.
- Enable Manage Multiple Customer Sites. This enables multitenancy for EMS.
- Configure the following options under EMS FSSO Settings. These settings add SSL encryption to the FSSO protocol between EMS and FortiOS.
SSL certificate
Displays the SSL certificate currently imported. If you have already uploaded an SSL certificate, a Replace button displays.
Configure FSSO Password
Configure a new SSL password.
- Click Save.