Fortinet white logo
Fortinet white logo

Known issues

Known issues

The following issues have been identified in FortiClient (Windows) 7.0.1. For inquiries about a particular bug or to report a bug, contact Customer Service & Support.

Install and deployment

Bug ID

Description

700396

The device driver cannot be loaded (code 38).

714268

Upgrade from 6.4.2 fails.

716597

Installation using norestart parameter requests reboot.

Application Firewall

Bug ID Description
717628 Application Firewall causes issues with Motorola RMS high availability client.

GUI

Bug ID Description

707440

Clicking Unlock Settings does not enable Clear Logs button in settings page.

725644

Google social network login does not work properly.

726971

Wrong password dialog is missing when connecting via SSL VPN.

729610

FortiClient (Windows) saves encrypted password incorrectly when user uses Spanish characters and FortiClient (Windows) is configured to save username and password.

730331

User cannot launch FortiClient (Windows) from SSL VPN web portal.

730756

For SSL VPN dual stack, GUI only shows IPv4 address.

731152

FortiClient reports corporate EMS as unreachable when SSL VPN is connected.

731450

Disable context menu in antivirus (AV) scan dialog when FortiClient is connected to EMS.

731691

GUI does not refresh after disabling Hide User Information in EMS profile.

733485

SSL VPN password is blank with FortiToken.

735345

FortiClient does not translate A FortiToken code is required for SSL VPN login authentication prompt to Chinese.

ZTNA connection rules

Bug ID Description
704234 Zero Trust tagging rule set syntax to check registry key value.

721958

Entire console should not launch during ZTNA TCP forward proxy authentication.

730415 Configuration backup misses locally configured ZTNA connection rules.
730459 FortiClient certificate serial number in endpoint is incorrect.

733871

FortiClient (Windows) should remove browser-based ZTNA settings.

735494 Windows 7 does not support ZTNA TCP forwarding feature.

FSSOMA

Bug ID

Description

725710 FSSOMA does not send user identities to FortiAuthenticator.

Zero Trust Telemetry

Bug ID

Description

648651

FortiClient (Windows) reaches Unable to retrieve EMS Details state after user cancels connection key popup.

687611

FortiClient does not calculate Active Directory group-based policy rule for tags.

693928

After FortiClient (Windows) migrates to new EMS successfully, it does not remove original EMS from EMS list.

702660

Switching AD users does not modify user details in EMS Endpoints table.

705664

FortiGate waits about one minute to get ZTNA EMS tag update.

712603

CLI parameter to register FortiClient to EMS with Telemetry key.

714131

Migrating FortiClient to different server fails when connection key is enabled.

718995

FortiClient does not register to EMS after silent installation.

721651

When connected to a full VPN to FortiGate, FortiClient sends virtual IP and MAC addresses to EMS.

722082

EMS does not apply the tag for file type even though file exists on endpoint.

722199

FortiClient stays in registration progress to FortiClient Cloud and never returns connection result.

724038

Zero Trust tag rule does not work properly for AD-joined devices when endpoints connect to EMS via SSL VPN.

724988

FortiClient uses FortiSASE SIA egress IP address as the public IP address.

727570

FortiClient registry is missing key encryption when EMS-pushed rules enable encryption.

731525

FortiClient (Windows) does not detect AV is not up-to-date tagging rule result properly.

735189

FortiClient reports corporate EMS as unreachable when it is pingable.

Malware Protection and Sandbox

Bug ID

Description

672146

Antiransomware fails to detect some popular ransomware samples.

709729

realtime_scan log disappears after ten seconds.

712314

Ransomware protection rollback for Magniber.

713557

Exceptions do not work for AntiExploit.

721174

FortiClient (Windows) flags bin_x64\FctRtMonitor.exe as Win32/AI.Pallas.Suspicious.

724087

FortiClient (Windows) sends browser cache files to FortiSandbox and user cannot exclude them while browsing pages with FortiClient (Windows) installed.

724228

FortiClient quick scan cannot detect the av_custom_malware.exe file.

725936

Compatibility with USB key.

729475

User cannot look up file hash in antiransomware events.

731782

FortiClient cannot quarantine file with Ukrainian characters.

731873

FortiClient (Windows) blocks Veeam backups.

734012

FortiClient does not respect exclusions if it detects malicious file as riskware.

734993

Rule to block removable media (USB drives) stops working.

Remote Access

Bug ID

Description

637303

Certificate-only SSL VPN tunnel displays Empty username is not allowed error.

649426

IPsec/SSL VPN per-app VPN split tunnel does not work properly.

684913

SAML authentication on SSL VPN with realms does not work.

685951

FortiClient does not use fallback server IP address when Show VPN before Logon option is set.

698713

User can update SSL VPN user password without entering the same password to confirm the new password.

707882

IPsec VPN fails to autoconnect with Failed to launch IPsec service error.

710877

SSL VPN with SAML (Azure AD) and two gateways does not work.

711227

Per-user autoconnect starts to autoconnect before Windows logon.

711402

Per-user autoconnect does not get established, and per-machine autoconnect still remains connected after Windows logon.

714564

SAML connection stays in connecting state and never returns with error when FortiGate gateway is inaccessible.

717100

MTU issues when DTLS is enabled and client network tunnels IPv4 over IPv6.

717512

VPN disclaimer message present in EMS profile is not present on endpoints and endpoints show no disclaimer.

717913

FortiSASE SIA VPN failed to reestablish after FortiSASE SIA-related components were upgraded.

725941

After powering on/rebooting Windows, FortiClient (Windows) cannot establish SSL VPN tunnel for approx two minutes due to host check failure.

726249

Per-application split tunnel does not work for FortiSASE SIA SSL VPN. FortiClient cannot exempt the Trusted FQDNs effectively from FortiSASE SIA VPN.

726680

VPN client takes 20 seconds to disconnect.

727098

FortiClient appears disconnected when trying to connect to SSL VPN.

728110

FortiClient must dynamically update Windows hostnames in DNS AD-integrated database.

728240

SSL VPN negate split tunnel IPv6 address does not work on FortiClient (Windows).

728244

Negate split tunnel IPv4 address does not work for dual stack mode using IPv6 access.

729233

FortiSASE SIA trusted traffic feature (split tunnel) requires restarting FortiClient (Windows) SSL VPN connection to take effect.

730095

Without EAP enabled, certificate-based IKEv2 does not work.

731011

FortiClient is stuck at 98% connecting to SSL VPN tunnel when integrated with SAML (Azure AD) authentication.

731127

SSL VPN SAML login displays Empty username is not allowed. error.

732594

SSL VPN redundant_sort_method does not work with realms.

734866

When per-machine autoconnect before OS start is enabled, FortiClient (Windows) keeps trying to connect after failing to connect to VPN.

735105

For per-machine autoconnect, certificate dropdown lists certificates in current user store before Windows logon.

735756

IPsec VPN sends unexpected xAuth authentication attempt.

735969

SSL VPN autoconnects after logging out of Windows and logging in as administrator.

Web Filter

Bug ID Description

647955

Web Filter conflicts with third-party VPN client.

657715

FortiProxy fails to start.

712974

Web Filter blocks some WebEx communication due to unrated IP address.

729127

Web Filter affects Manufacturing Execution System software.

731982

Web rating overrides behavior between FortiClient Web Filter and FortiGate Web Filter differs.

734400

Proxy service fails to process HTTPS connections.

Logs

Bug ID

Description

652647 FortiClient fails to upload large diagnostic tool result file to EMS.
720388 FortiClient fails to provide log for secure Remote Access compliance enforcement.

Other

Bug ID

Description

720569 Update task returns error while doing full signature update.
729499 Endpoints fail to update AV signatures after EMS sends AV out-of-date email notifications.

Known issues

Known issues

The following issues have been identified in FortiClient (Windows) 7.0.1. For inquiries about a particular bug or to report a bug, contact Customer Service & Support.

Install and deployment

Bug ID

Description

700396

The device driver cannot be loaded (code 38).

714268

Upgrade from 6.4.2 fails.

716597

Installation using norestart parameter requests reboot.

Application Firewall

Bug ID Description
717628 Application Firewall causes issues with Motorola RMS high availability client.

GUI

Bug ID Description

707440

Clicking Unlock Settings does not enable Clear Logs button in settings page.

725644

Google social network login does not work properly.

726971

Wrong password dialog is missing when connecting via SSL VPN.

729610

FortiClient (Windows) saves encrypted password incorrectly when user uses Spanish characters and FortiClient (Windows) is configured to save username and password.

730331

User cannot launch FortiClient (Windows) from SSL VPN web portal.

730756

For SSL VPN dual stack, GUI only shows IPv4 address.

731152

FortiClient reports corporate EMS as unreachable when SSL VPN is connected.

731450

Disable context menu in antivirus (AV) scan dialog when FortiClient is connected to EMS.

731691

GUI does not refresh after disabling Hide User Information in EMS profile.

733485

SSL VPN password is blank with FortiToken.

735345

FortiClient does not translate A FortiToken code is required for SSL VPN login authentication prompt to Chinese.

ZTNA connection rules

Bug ID Description
704234 Zero Trust tagging rule set syntax to check registry key value.

721958

Entire console should not launch during ZTNA TCP forward proxy authentication.

730415 Configuration backup misses locally configured ZTNA connection rules.
730459 FortiClient certificate serial number in endpoint is incorrect.

733871

FortiClient (Windows) should remove browser-based ZTNA settings.

735494 Windows 7 does not support ZTNA TCP forwarding feature.

FSSOMA

Bug ID

Description

725710 FSSOMA does not send user identities to FortiAuthenticator.

Zero Trust Telemetry

Bug ID

Description

648651

FortiClient (Windows) reaches Unable to retrieve EMS Details state after user cancels connection key popup.

687611

FortiClient does not calculate Active Directory group-based policy rule for tags.

693928

After FortiClient (Windows) migrates to new EMS successfully, it does not remove original EMS from EMS list.

702660

Switching AD users does not modify user details in EMS Endpoints table.

705664

FortiGate waits about one minute to get ZTNA EMS tag update.

712603

CLI parameter to register FortiClient to EMS with Telemetry key.

714131

Migrating FortiClient to different server fails when connection key is enabled.

718995

FortiClient does not register to EMS after silent installation.

721651

When connected to a full VPN to FortiGate, FortiClient sends virtual IP and MAC addresses to EMS.

722082

EMS does not apply the tag for file type even though file exists on endpoint.

722199

FortiClient stays in registration progress to FortiClient Cloud and never returns connection result.

724038

Zero Trust tag rule does not work properly for AD-joined devices when endpoints connect to EMS via SSL VPN.

724988

FortiClient uses FortiSASE SIA egress IP address as the public IP address.

727570

FortiClient registry is missing key encryption when EMS-pushed rules enable encryption.

731525

FortiClient (Windows) does not detect AV is not up-to-date tagging rule result properly.

735189

FortiClient reports corporate EMS as unreachable when it is pingable.

Malware Protection and Sandbox

Bug ID

Description

672146

Antiransomware fails to detect some popular ransomware samples.

709729

realtime_scan log disappears after ten seconds.

712314

Ransomware protection rollback for Magniber.

713557

Exceptions do not work for AntiExploit.

721174

FortiClient (Windows) flags bin_x64\FctRtMonitor.exe as Win32/AI.Pallas.Suspicious.

724087

FortiClient (Windows) sends browser cache files to FortiSandbox and user cannot exclude them while browsing pages with FortiClient (Windows) installed.

724228

FortiClient quick scan cannot detect the av_custom_malware.exe file.

725936

Compatibility with USB key.

729475

User cannot look up file hash in antiransomware events.

731782

FortiClient cannot quarantine file with Ukrainian characters.

731873

FortiClient (Windows) blocks Veeam backups.

734012

FortiClient does not respect exclusions if it detects malicious file as riskware.

734993

Rule to block removable media (USB drives) stops working.

Remote Access

Bug ID

Description

637303

Certificate-only SSL VPN tunnel displays Empty username is not allowed error.

649426

IPsec/SSL VPN per-app VPN split tunnel does not work properly.

684913

SAML authentication on SSL VPN with realms does not work.

685951

FortiClient does not use fallback server IP address when Show VPN before Logon option is set.

698713

User can update SSL VPN user password without entering the same password to confirm the new password.

707882

IPsec VPN fails to autoconnect with Failed to launch IPsec service error.

710877

SSL VPN with SAML (Azure AD) and two gateways does not work.

711227

Per-user autoconnect starts to autoconnect before Windows logon.

711402

Per-user autoconnect does not get established, and per-machine autoconnect still remains connected after Windows logon.

714564

SAML connection stays in connecting state and never returns with error when FortiGate gateway is inaccessible.

717100

MTU issues when DTLS is enabled and client network tunnels IPv4 over IPv6.

717512

VPN disclaimer message present in EMS profile is not present on endpoints and endpoints show no disclaimer.

717913

FortiSASE SIA VPN failed to reestablish after FortiSASE SIA-related components were upgraded.

725941

After powering on/rebooting Windows, FortiClient (Windows) cannot establish SSL VPN tunnel for approx two minutes due to host check failure.

726249

Per-application split tunnel does not work for FortiSASE SIA SSL VPN. FortiClient cannot exempt the Trusted FQDNs effectively from FortiSASE SIA VPN.

726680

VPN client takes 20 seconds to disconnect.

727098

FortiClient appears disconnected when trying to connect to SSL VPN.

728110

FortiClient must dynamically update Windows hostnames in DNS AD-integrated database.

728240

SSL VPN negate split tunnel IPv6 address does not work on FortiClient (Windows).

728244

Negate split tunnel IPv4 address does not work for dual stack mode using IPv6 access.

729233

FortiSASE SIA trusted traffic feature (split tunnel) requires restarting FortiClient (Windows) SSL VPN connection to take effect.

730095

Without EAP enabled, certificate-based IKEv2 does not work.

731011

FortiClient is stuck at 98% connecting to SSL VPN tunnel when integrated with SAML (Azure AD) authentication.

731127

SSL VPN SAML login displays Empty username is not allowed. error.

732594

SSL VPN redundant_sort_method does not work with realms.

734866

When per-machine autoconnect before OS start is enabled, FortiClient (Windows) keeps trying to connect after failing to connect to VPN.

735105

For per-machine autoconnect, certificate dropdown lists certificates in current user store before Windows logon.

735756

IPsec VPN sends unexpected xAuth authentication attempt.

735969

SSL VPN autoconnects after logging out of Windows and logging in as administrator.

Web Filter

Bug ID Description

647955

Web Filter conflicts with third-party VPN client.

657715

FortiProxy fails to start.

712974

Web Filter blocks some WebEx communication due to unrated IP address.

729127

Web Filter affects Manufacturing Execution System software.

731982

Web rating overrides behavior between FortiClient Web Filter and FortiGate Web Filter differs.

734400

Proxy service fails to process HTTPS connections.

Logs

Bug ID

Description

652647 FortiClient fails to upload large diagnostic tool result file to EMS.
720388 FortiClient fails to provide log for secure Remote Access compliance enforcement.

Other

Bug ID

Description

720569 Update task returns error while doing full signature update.
729499 Endpoints fail to update AV signatures after EMS sends AV out-of-date email notifications.