Known issues
The following issues have been identified in FortiClient (Windows) 7.0.1. For inquiries about a particular bug or to report a bug, contact Customer Service & Support.
Install and deployment
Bug ID |
Description |
---|---|
700396 |
The device driver cannot be loaded (code 38). |
714268 |
Upgrade from 6.4.2 fails. |
716597 |
Installation using |
Application Firewall
Bug ID | Description |
---|---|
717628 | Application Firewall causes issues with Motorola RMS high availability client. |
GUI
ZTNA connection rules
Bug ID | Description |
---|---|
704234 | Zero Trust tagging rule set syntax to check registry key value. |
721958 |
Entire console should not launch during ZTNA TCP forward proxy authentication. |
730415 | Configuration backup misses locally configured ZTNA connection rules. |
730459 | FortiClient certificate serial number in endpoint is incorrect. |
733871 |
FortiClient (Windows) should remove browser-based ZTNA settings. |
735494 | Windows 7 does not support ZTNA TCP forwarding feature. |
FSSOMA
Bug ID |
Description |
---|---|
725710 | FSSOMA does not send user identities to FortiAuthenticator. |
Zero Trust Telemetry
Malware Protection and Sandbox
Bug ID |
Description |
---|---|
672146 |
Antiransomware fails to detect some popular ransomware samples. |
709729 |
|
712314 |
Ransomware protection rollback for Magniber. |
713557 |
Exceptions do not work for AntiExploit. |
721174 |
FortiClient (Windows) flags |
724087 |
FortiClient (Windows) sends browser cache files to FortiSandbox and user cannot exclude them while browsing pages with FortiClient (Windows) installed. |
724228 |
FortiClient quick scan cannot detect the |
725936 |
Compatibility with USB key. |
729475 |
User cannot look up file hash in antiransomware events. |
731782 |
FortiClient cannot quarantine file with Ukrainian characters. |
731873 |
FortiClient (Windows) blocks Veeam backups. |
734012 |
FortiClient does not respect exclusions if it detects malicious file as riskware. |
734993 |
Rule to block removable media (USB drives) stops working. |
Remote Access
Bug ID |
Description |
---|---|
637303 |
Certificate-only SSL VPN tunnel displays Empty username is not allowed error. |
649426 |
IPsec/SSL VPN per-app VPN split tunnel does not work properly. |
684913 |
SAML authentication on SSL VPN with realms does not work. |
685951 |
FortiClient does not use fallback server IP address when Show VPN before Logon option is set. |
698713 |
User can update SSL VPN user password without entering the same password to confirm the new password. |
707882 |
IPsec VPN fails to autoconnect with Failed to launch IPsec service error. |
710877 |
SSL VPN with SAML (Azure AD) and two gateways does not work. |
711227 |
Per-user autoconnect starts to autoconnect before Windows logon. |
711402 |
Per-user autoconnect does not get established, and per-machine autoconnect still remains connected after Windows logon. |
714564 |
SAML connection stays in connecting state and never returns with error when FortiGate gateway is inaccessible. |
717100 |
MTU issues when DTLS is enabled and client network tunnels IPv4 over IPv6. |
717512 |
VPN disclaimer message present in EMS profile is not present on endpoints and endpoints show no disclaimer. |
717913 |
FortiSASE SIA VPN failed to reestablish after FortiSASE SIA-related components were upgraded. |
725941 |
After powering on/rebooting Windows, FortiClient (Windows) cannot establish SSL VPN tunnel for approx two minutes due to host check failure. |
726249 |
Per-application split tunnel does not work for FortiSASE SIA SSL VPN. FortiClient cannot exempt the Trusted FQDNs effectively from FortiSASE SIA VPN. |
726680 |
VPN client takes 20 seconds to disconnect. |
727098 |
FortiClient appears disconnected when trying to connect to SSL VPN. |
728110 |
FortiClient must dynamically update Windows hostnames in DNS AD-integrated database. |
728240 |
SSL VPN negate split tunnel IPv6 address does not work on FortiClient (Windows). |
728244 |
Negate split tunnel IPv4 address does not work for dual stack mode using IPv6 access. |
729233 |
FortiSASE SIA trusted traffic feature (split tunnel) requires restarting FortiClient (Windows) SSL VPN connection to take effect. |
730095 |
Without EAP enabled, certificate-based IKEv2 does not work. |
731011 |
FortiClient is stuck at 98% connecting to SSL VPN tunnel when integrated with SAML (Azure AD) authentication. |
731127 |
SSL VPN SAML login displays Empty username is not allowed. error. |
732594 |
SSL VPN |
734866 |
When per-machine autoconnect before OS start is enabled, FortiClient (Windows) keeps trying to connect after failing to connect to VPN. |
735105 |
For per-machine autoconnect, certificate dropdown lists certificates in current user store before Windows logon. |
735756 |
IPsec VPN sends unexpected xAuth authentication attempt. |
735969 |
SSL VPN autoconnects after logging out of Windows and logging in as administrator. |
Web Filter
Bug ID | Description |
---|---|
647955 |
Web Filter conflicts with third-party VPN client. |
657715 |
FortiProxy fails to start. |
712974 |
Web Filter blocks some WebEx communication due to unrated IP address. |
729127 |
Web Filter affects Manufacturing Execution System software. |
731982 |
Web rating overrides behavior between FortiClient Web Filter and FortiGate Web Filter differs. |
734400 |
Proxy service fails to process HTTPS connections. |
Logs
Bug ID |
Description |
---|---|
652647 | FortiClient fails to upload large diagnostic tool result file to EMS. |
720388 | FortiClient fails to provide log for secure Remote Access compliance enforcement. |
Other
Bug ID |
Description |
---|---|
720569 | Update task returns error while doing full signature update. |
729499 | Endpoints fail to update AV signatures after EMS sends AV out-of-date email notifications. |