Adding a FortiClient installer
|
|
After you add a FortiClient installer to FortiClient EMS, you cannot edit it. You can delete the deployment package from FortiClient EMS, and edit the installer outside of FortiClient EMS. You can then add the edited installer to FortiClient EMS. |
You can create an installer or installer config file, or upload a packaged installer to add a FortiClient deployment package.
To create an installer or install config file:
- Go to Deployment & Installers > FortiClient Installer and click Add.
-
On the General tab, configure the options depending on the type of FortiClient installer you are using:
- To use an official FortiClient installer, keep the Create a manual installer option disabled under Advanced Options at the bottom and set the following options:
Option
Description
Online Installer Name
Enter the desired installer name.
Add Note
Click to add a note to the installer. In the Notes field, enter any details about the installer.
Release
Select the FortiClient release version to install.
Patch
Select the specific FortiClient patch version to install.
Hotfix
If a hotfix is available for the selected patch, the Hotfix dropdown list appears. See Adding a FortiClient hotfix installer.
Auto update to the Latest Patch
If a hot fix is not available for the selected patch, this field displays Auto update to the Latest Patch. Enable to repackage the installer to the latest patch release.
If a hotfix is available for the selected patch, you can select several options. See Adding a FortiClient hotfix installer.
Repackaged Installer Files
Configure which installer files to include.
- To manually create a FortiClient installer, enable the Create a manual installer option under Advanced Options at the bottom and set the following options:
Option
Description
Release
Select from the following options:
- Upload packaged installer—Manually upload a repackaged installer provided by TAC.
- Use custom installer—Select from a list of previously uploaded custom installers or upload a new custom installer as follows:
- Click Add.
- Specify the custom installer name.
Browse to select 64-bit/32-bit Window and/or Linux/macOS custom installers in ZIP or MSI format.
You can download FortiClient installers (in ZIP format) from Fortinet Customer Service & Support., which requires a support account with a valid support contract. To upload an
.msifile, you must package the installer as an.msifile.- For Windows and Linux, you can also select Include ARM and browse to select the ARM installer files.
- Click Upload.
Manual Installer Name
Enter the desired custom installer name.
- To use an official FortiClient installer, keep the Create a manual installer option disabled under Advanced Options at the bottom and set the following options:
- Click Next. On the Features tab, set the following options. For features that are not available for all operating systems, the dialog displays the icons for the operating systems that the feature is available:

Available options may differ depending on the features you have enabled or disabled in Feature Select.
See Feature Select. If you enable a feature in the deployment package that is disabled in Feature Select, the feature is installed on the endpoint, but is disabled and does not appear in the FortiClient GUI. For example, when Web Filter is disabled in Feature Select, if you enable Web Filtering in a deployment package, the deployment package installs Web Filter on the endpoint. However, the Web Filter feature is disabled on the endpoint and does not appear in the FortiClient GUI.
- Click Next. On the Advanced tab, set the following options:
Option
Description
Enable desktop shortcut
Configure the FortiClient deployment package to create a desktop shortcut on the endpoint.
Enable start menu shortcut
Configure the FortiClient deployment package to create a Start menu shortcut on the endpoint.
Include MSI installer files
Enable to include MSI installer files for FortiClient (Windows).
Enable Installer ID
Configure an installer ID. Select an existing installer ID or enter a new installer ID. If creating an installer ID, select a group path or create a new group in the Group Path field. FortiClient EMS automatically groups endpoints according to installer ID group assignment rules.
If you manually move the endpoint to another group after EMS places it into the group defined by the installer ID group assignment rule, EMS returns the endpoint to the group defined by the installer ID group assignment rule.
In an environment with a large number of endpoints, since you can configure each deployment package with only one installer ID, it may be inefficient to create a deployment package for each installer ID.
Enable Endpoint VPN Profile
Select an endpoint VPN profile to include in the installer. EMS applies the VPN profile to the endpoint once it has installed FortiClient. This option is necessary if users require VPN connection to connect to EMS.
Enable Endpoint System Profile
Select an endpoint system profile to include in the installer. EMS applies the system profile to the endpoint once it has installed FortiClient. This option is necessary if it is required to have certain security features enabled prior to contact with EMS.
Invalid Certificate Action
Select the action to take when FortiClient attempts to connect to EMS with an invalid certificate:
- Warn: warn the user about the invalid server certificate. Ask the user whether to proceed with connecting to EMS, or terminate the connection attempt. FortiClient remembers the user's decision for this EMS, but displays the warning prompt if FortiClient attempts to connect to another EMS (using a different EMS FQDN/IP address and certificate) with an invalid certificate.
- Allow: allows FortiClient to connect to EMS with an invalid certificate.
- Deny: block FortiClient from connecting to EMS with an invalid certificate.
- Click Next. The Telemetry tab displays the hostname and IP address of the FortiClient EMS server, which manage FortiClient once it is installed on the endpoint.
- Do one of the following:
- If you selected Create installer, Click Finish. The FortiClient deployment package is added to FortiClient EMS and displays on the Deployment Installers > FortiClient Installer pane. The deployment package may include .exe (64-bit), .msi, .dmg, .rpm, and .deb files depending on the configuration. The end user can download these files to install FortiClient on their machine with the desired configuration.
- If you selected Create installer config file, click Download. This downloads a config.json file to your device. You can upload this file to a cloud server to create a custom deployment package.
To upload packaged installers:
- Go to Deployment & Installers > FortiClient Installer.
- Click Add.
- On the General tab, set the following options:
Option
Description
Online Installer Name
Enter the desired installer name.
Add Note
Click to add a note to the installer. In the Notes field, enter any details about the installer.
Release
Select Upload packaged installer.
Repackaged installer
Browse to and select the installer file.
- Click Next. On the Features tab, set the following options. For features that are not available for all operating systems, the dialog displays the icons for the operating systems that the feature is available:

Available options may differ depending on the features you have enabled or disabled in Feature Select.
See Feature Select. Option
Description
Zero Trust Telemetry
Enabled by default and cannot be disabled. Installs FortiClient with Telemetry enabled.
Secure Access Architecture Components
Install FortiClient with SSL and IPsec VPN enabled. Disable to omit SSL and IPsec VPN support from the FortiClient deployment package.
If you enable this feature for a deployment package and include a preconfigured VPN tunnel in the included endpoint profile, users who use this deployment package to install FortiClient can connect to this preconfigured VPN tunnel for three days after their initial FortiClient installation. This is useful for remote users, as it allows them to connect to the corporate network to activate their FortiClient license. If the user does not activate their FortiClient license within the three days, all FortiClient features, including VPN, stop working on their device.
Vulnerability Scan
Enabled by default and cannot be disabled. Installs FortiClient with Vulnerability Scan enabled.
Advanced Persistent Threat (APT) Components
Install FortiClient with APT components enabled. Disable to omit APT components from the FortiClient deployment package. Includes FortiSandbox detection and quarantine features.
Malware
Enable any of the following features:
- AntiVirus, Anti-Exploit, Removable Media Access
- Anti-Ransomware
- Cloud Based Malware Outbreak Detection
Disable to exclude features from the FortiClient installer.
Web and Video Filtering
Enable any of the following features:
- Web Filtering
- Video Filtering
Disable to exclude features from the FortiClient installer.
Application Firewall
Enable or disable Application Firewall in the FortiClient installer.
Single Sign-On Mobility Agent
Enable or disable single sign-on mobility agent in the FortiClient installer.
Zero Trust Network Access
Enable or disable zero trust network access (ZTNA) in the FortiClient installer. The ZTNA feature is always installed on a macOS endpoint, regardless of whether this option is enabled or disabled.
Privileged Access Agent
Enable or disable privileged access agent in the FortiClient installer.
If you enable a feature in the deployment package that is disabled in Feature Select, the feature is installed on the endpoint, but is disabled and does not appear in the FortiClient GUI. For example, when Web Filter is disabled in Feature Select, if you enable Web Filtering in a deployment package, the deployment package installs Web Filter on the endpoint. However, the Web Filter feature is disabled on the endpoint and does not appear in the FortiClient GUI.
- Click Next. On the Advanced tab, set the following options:
Option
Description
Enable desktop shortcut
Configure the FortiClient deployment package to create a desktop shortcut on the endpoint.
Enable start menu shortcut
Configure the FortiClient deployment package to create a Start menu shortcut on the endpoint.
Installer Files
Enable to include MSI installer files for FortiClient (Windows).
Enable Installer ID
Configure an installer ID. Select an existing installer ID or enter a new installer ID. If creating an installer ID, select a group path or create a new group in the Group Path field. FortiClient EMS automatically groups endpoints according to installer ID group assignment rules.
If you manually move the endpoint to another group after EMS places it into the group defined by the installer ID group assignment rule, EMS returns the endpoint to the group defined by the installer ID group assignment rule.
In an environment with a large number of endpoints, since you can configure each deployment package with only one installer ID, it may be inefficient to create a deployment package for each installer ID.
Enable Endpoint VPN Profile
Select an endpoint VPN profile to include in the installer. EMS applies the VPN profile to the endpoint once it has installed FortiClient. This option is necessary if users require VPN connection to connect to EMS.
Enable Endpoint System Profile
Select an endpoint system profile to include in the installer. EMS applies the system profile to the endpoint once it has installed FortiClient. This option is necessary if it is required to have certain security features enabled prior to contact with EMS.
Invalid Certificate Action
Select the action to take when FortiClient attempts to connect to EMS with an invalid certificate:
- Warn: warn the user about the invalid server certificate. Ask the user whether to proceed with connecting to EMS, or terminate the connection attempt. FortiClient remembers the user's decision for this EMS, but displays the warning prompt if FortiClient attempts to connect to another EMS (using a different EMS FQDN/IP address and certificate) with an invalid certificate.
- Allow: allows FortiClient to connect to EMS with an invalid certificate.
- Deny: block FortiClient from connecting to EMS with an invalid certificate.
Invitation
Select an invitation to include in the deployment package. If you have not created an invitation, you can create one by clicking Create Invitation. See Invitations.
- Click Next. The Telemetry tab displays the hostname and IP address of the FortiClient EMS server, which manage FortiClient once it is installed on the endpoint.
- Do one of the following:
- If you selected Create installer, Click Finish. The FortiClient deployment package is added to FortiClient EMS and displays on the Deployment Installers > FortiClient Installer pane. The deployment package may include .exe (64-bit), .msi, .dmg, .rpm, and .deb files depending on the configuration. The end user can download these files to install FortiClient on their machine with the desired configuration.
- If you selected Create installer config file, click Download. This downloads a config.json file to your device. You can upload this file to a cloud server to create a custom deployment package.