Recommended upgrade path
Existing FortiClient and EMS users may have a mixture of 7.2.0 and older versions in production. The endpoint security improvement feature is available for EMS 7.2.0 and later versions. The EMS administrator configures this feature by enabling Use SSL certificate for Endpoint Control in EMS and configuring the desired Invalid Certificate Action for each endpoint profile. When the endpoint security improvement feature is enabled in EMS, only FortiClient 7.2.0 and later versions can connect. Therefore, upgrading all FortiClient endpoints to 7.2.0 is recommended.
When Use SSL certificate for Endpoint Control is enabled on EMS, FortiClient 7.0.1 and earlier versions cannot connect to EMS. Following the recommended upgrade path as detailed in the following procedure is recommended to ensure that endpoints can connect to EMS. |
Following is the recommended upgrade path for when FortiClient and/or EMS older than 7.2.0 exists in production. You must complete the following steps:
- Upgrade EMS to 7.2.0.
- Upgrade FortiClient to 7.2.0.
- Apply a valid certificate to EMS.
- Configure the invalid certificate action as warn.
To upgrade EMS to 7.2.0:
- Upgrade EMS to 7.2.4 as the Upgrade Path describes.
- Go to System Settings > EMS Settings.
- Disable Use SSL certificate for Endpoint Control.
- Go to Endpoint Profiles > Manage Profiles.
- Select a System Settings profile.
- Configure Invalid Certificate Action as Allow.
-
Save the configuration.
-
Repeat steps 4-7 for all profiles.
To upgrade FortiClient to 7.2.0:
- Create an installer:
- In EMS, go to Deployment & Installers > FortiClient Installer.
- Click Add.
- On the Version tab, you can choose to create a deployment package that uses an official installer or custom installer. Do one of the following:
- If you want to use an official installer, do the following:
- Select Choose an official release.
- From the Release dropdown list, select 7.2.
- From the Patch dropdown list, select 7.2.0.
- If you want to use a custom installer, do the following:
- Select Choose a custom installer.
- Select an existing FortiClient 7.2.0 custom installer from the Custom Installer dropdown list, or use the Add Installer option to add a new 7.2.0 installer.
- If you want to use an official installer, do the following:
- Click Next.
- In the Name and Notes fields, enter the desired values. Click Next.
- On the Features tab, enable all desired features. Click Next.
- On the Advanced tab, from the Invalid Certificate Action dropdown list, select Allow. Configure other fields as desired, then click Next.
- Click Finish.
- Create a deployment configuration:
- Go to Deployment & Installers > Manage Deployment.
- Click Add.
- In the Endpoint Groups field, click Edit. In the Add Endpoint Groups dialog, select all groups that contain endpoints to upgrade to 7.2.0.
- For Action, select Install.
- From the Deployment Package dropdown list, select the package that you created earlier.
- Enable Start at a Scheduled Time and configure the desired time.
- Ensure that Enable the Deployment is enabled.
- Configure other fields as desired, then save the deployment configuration.
At the scheduled time, EMS deploys the FortiClient 7.2.0 upgrade to all endpoints groups that you configured for the deployment. FortiClient upgrades to 7.2.0 on the endpoints. After upgrade, FortiClient reconnects to EMS. FortiClient does not display an error or warning as it reconnects to EMS.
To apply a valid certificate to EMS:
- In EMS, go to System Settings > EMS Settings.
- You can add an SSL certificate to EMS in one of the following ways:
Method
Description
Automated
The Automated Certificate Management Environment (ACME), as defined in RFC 8555, is used by the public Let's Encrypt certificate authority to provide free SSL server certificates. You can configure EMS to use certificates that are managed by Let's Encrypt.
Upload
Manually upload an SSL certificate.
For either method, you must ensure that the certificate satisfies the criteria in Endpoint communication security to ensure that communication between FortiClient and EMS is secure.
Do one of the following:
- Configure an automated SSL certificate:
- Go to System Settings > EMS Settings.
- Ensure that Remote HTTPS access and Redirect HTTP request to HTTPS are enabled.
Ensure that ports 80 and 443 are accessible from the Internet by going to https://<EMS FQDN> in a browser. If the ports are accessible, the browser displays the EMS login page.
- In the SSL certificate field, click the Import SSL certificate button.
- Select Automated.
- In the Domain field, enter the EMS FQDN. For the Let's Encrypt server to issue the certificate, the public DNS server must resolve the EMS FQDN to the EMS public IP address.
- In the Email field, enter a valid email address.
- If desired, enable Auto Renew. When Auto Renew is enabled, EMS automatically renews the certificate before expiry.
- Select the checkbox to agree to Let's Encrypt's terms of service. Click Import.
- Manually upload an SSL certificate:
- Configure an automated SSL certificate:
- After all endpoints have upgraded to FortiClient 7.2.0 and EMS is using a valid certificate, go to System Settings > EMS Settings and enable Use SSL certificate for Endpoint Control. When you enable this option, endpoints still running FortiClient 7.0.1 and older versions can no longer connect to this EMS. If they were previously connected, they now show as offline.
To configure the invalid certificate action as warn:
- In EMS, go to Endpoint Profiles > Manage Profiles.
- Select a profile.
- On the System Settings tab, configure Invalid Certificate Action as Warn.
- Save the profile.
- After FortiClient receives the configuration change, observe if FortiClient displays a warning about the certificate being invalid. If you do not observe connection issues when Invalid Certificate Action is set to Warn, you can optionally change the setting to Deny.