This chapter describes some techniques and best practices that you can use to improve FortiOS security.