This section describes some techniques and best practices that you can use to improve FortiOS security.