Home
Product Pillars
Network Security
Network Security
FortiGate / FortiOS
FortiGate 5000
FortiGate 6000
FortiGate 7000
FortiProxy
NOC & SOC Management
FortiManager
FortiManager Cloud
FortiAnalyzer
FortiAnalyzer Cloud
FortiMonitor
FortiGate Cloud
Enterprise Networking
Secure SD-WAN
FortiLAN Cloud
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiNAC-F
FortiExtender
FortiExtender Cloud
FortiAIOps
Business Communications
FortiFone
FortiVoice
FortiVoice Cloud
FortiRecorder
FortiCamera
Zero Trust Access
ZTNA
Zero Trust Network Access
FortiClient EMS
SASE
FortiSASE
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Cloud Security
Hybrid Cloud Security
FortiGate Public Cloud
FortiGate Private Cloud
Flex-VM
Cloud Native Protection
FortiCNP
FortiDevSec
Web Application / API Protection
FortiWeb
FortiWeb Cloud
FortiADC
FortiGSLB
SAAS Security
FortiMail
FortiMail Cloud
FortiCASB
Security Operations
SOC Platform
FortiAnalyzer
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
FortiPhish
Advanced Threat Protection
FortiSandbox
FortiSandbox Cloud
FortiNDR
FortiDeceptor
FortiInsight
FortiInsight Cloud
FortiIsolator
Endpoint Security
FortiClient
FortiClient Cloud
FortiEDR
Best Practices
Solution Hubs
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
4-D Resources
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Next Generation Firewall
Hardware Guides
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAI
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiEdge
FortiExtender
FortiGate
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
Product A-Z
AscenLink
AV Engine
AWS Firewall Rules
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiBalancer
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDNS
FortiEDR
FortiExplorer
FortiExplorer Go
FortiExtender
FortiExtender Cloud
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGSLB
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiMonitor 100F
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR Cloud
FortiNDR Private Cloud
FortiNDR Public Cloud
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiScan
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Ordering Guides
Document
Library
Product Pillars
Network Security
Network Security
FortiGate / FortiOS
FortiGate-5000
/
6000
/
7000
FortiProxy
NOC & SOC Management
FortiManager
/
FortiManager Cloud
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiMonitor
FortiGate Cloud
Enterprise Networking
Secure SD-WAN
FortiLAN Cloud
FortiSwitch
FortiAP / FortiWiFi
FortiAP-U Series
FortiNAC-F
FortiExtender
/
FortiExtender Cloud
FortiAIOps
Business Communications
FortiFone
FortiVoice
/
FortiVoice Cloud
FortiRecorder
/
FortiCamera
Zero Trust Access
ZTNA
Zero Trust Network Access
FortiClient EMS
SASE
FortiSASE
Identity
FortiAuthenticator
FortiTrust Identity
FortiToken Cloud
FortiToken
Cloud Security
Hybrid Cloud Security
FortiGate Public Cloud
FortiGate Private Cloud
Flex-VM
Cloud Native Protection
FortiCNP
FortiDevSec
Web Application / API Protection
FortiWeb
/
FortiWeb Cloud
FortiADC
/
FortiGSLB
SAAS Security
FortiMail
/
FortiMail Cloud
FortiCASB
Security Operations
SOC Platform
FortiAnalyzer
/
FortiAnalyzer Cloud
FortiSIEM
/
FortiSIEM Cloud
FortiSOAR
FortiPhish
Advanced Threat Protection
FortiSandbox
/
FortiSandbox Cloud
FortiNDR
FortiDeceptor
FortiInsight
/
FortiInsight Cloud
FortiIsolator
Endpoint Security
FortiClient
/
FortiClient Cloud
FortiEDR
Best Practices
Solution Hubs
Curated links by solution
Cloud
FortiCloud
Public & Private Cloud
Popular Solutions
Secure SD-WAN
Zero Trust Network Access
Secure Access
Security Fabric
Tele-Working
Multi-Factor Authentication
FortiASIC
Operational Technology
MSSP
4-D Resources
Define, Design, Deploy, Demo
Secure SD-WAN
Zero Trust Network Access
Wireless
Switching
Secure Access Service Edge
Next Generation Firewall
Hardware Guides
Filter Products
FortiAnalyzer
FortiAnalyzer Big-Data
FortiADC
FortiAI
FortiAP / FortiWiFi
FortiAP U-Series
FortiAuthenticator
FortiCache
FortiCarrier
FortiController
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiEdge
FortiExtender
FortiGate
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiHypervisor
FortiIsolator
FortiMail
FortiManager
FortiNAC
FortiNDR
FortiProxy
FortiRecorder
FortiRPS
FortiSandbox
FortiSIEM
FortiSwitch
FortiTester
FortiToken
FortiVoice
FortiWAN
FortiWeb
FortiWLC
FortiWLM
Product A-Z
Filter Products
AscenLink
AV Engine
AWS Firewall Rules
FortiADC
FortiADC E Series
FortiADC Manager
FortiADC Private Cloud
FortiADC Public Cloud
FortiAIOps
FortiAnalyzer
FortiAnalyzer BigData
FortiAnalyzer BigData Private Cloud
FortiAnalyzer Cloud
FortiAnalyzer Private Cloud
FortiAnalyzer Public Cloud
FortiAP / FortiWiFi
FortiAP-U Series
FortiAuthenticator
FortiAuthenticator Private Cloud
FortiAuthenticator Public Cloud
FortiBalancer
FortiBridge
FortiCache
FortiCamera
FortiCamera Cloud
FortiCare Elite
FortiCarrier
FortiCASB
FortiCentral
FortiClient
FortiClient Cloud
FortiCloud Services
FortiCNP
FortiConnect
FortiController
FortiConverter Service
FortiConverter Tool
FortiCore
FortiCWP
FortiDAST
FortiDB
FortiDDoS
FortiDDoS-F
FortiDeceptor
FortiDeceptor Private Cloud
FortiDeceptor Public Cloud
FortiDevSec
FortiDNS
FortiEDR
FortiExplorer
FortiExplorer Go
FortiExtender
FortiExtender Cloud
FortiFlex
FortiFone
FortiGate / FortiOS
FortiGate Cloud
FortiGate CNF
FortiGate Private Cloud
FortiGate Public Cloud
FortiGate-5000
FortiGate-6000
FortiGate-7000
FortiGSLB
FortiGuest
FortiHypervisor
FortiInsight
FortiInsight Cloud
FortiIPAM
FortiIsolator
FortiIsolator Public Cloud
FortiLAN Cloud
FortiMail
FortiMail Cloud
FortiManager
FortiManager Cloud
FortiManager Private Cloud
FortiManager Public Cloud
FortiMonitor
FortiMonitor 100F
FortiNAC
FortiNAC-F
FortiNDR
FortiNDR Cloud
FortiNDR Private Cloud
FortiNDR Public Cloud
FortiPAM
FortiPAM Private Cloud
FortiPAM Public Cloud
FortiPhish
FortiPlanner
FortiPolicy
FortiPortal
FortiPortal Public Cloud
FortiPresence
FortiPresence VM
FortiProxy
FortiProxy Private Cloud
FortiProxy Public Cloud
FortiRecon
FortiRecorder
FortiRPS
FortiSandbox
FortiSandbox Cloud
FortiSandbox Private Cloud
FortiSandbox Public Cloud
FortiSASE
FortiScan
FortiSIEM
FortiSIEM Cloud
FortiSOAR
FortiSOAR Cloud
FortiSwitch
FortiSwitch Manager
FortiTap
FortiTester
FortiTester Private Cloud
FortiTester Public Cloud
FortiToken
FortiToken Cloud
FortiTrust Identity
FortiVoice
FortiVoice Cloud
FortiVoice Private Cloud
FortiVoice Public Cloud
FortiWAN
FortiWAN Controller
FortiWeb
FortiWeb Cloud
FortiWeb Manager Private Cloud
FortiWeb Manager Public Cloud
FortiWeb Private Cloud
FortiWeb Public Cloud
FortiWLM
FortiZTP
IPS Engine
Managed FortiGate Service
Overlay-as-a-Service
Security Awareness and Training
SOCaaS
Wireless Controller
Ordering Guides
Search documents and hardware ...
Version:
9.4.0
9.2.0
9.1.0
Version:
8.8.0
8.7.0
8.6.0
Version:
8.5.2
8.3.0
Table of Contents
What's new in FortiNAC 8.8.0
FortiNAC
Introduction
DNS configuration
IPv6 support
Login procedure
Connection errors
Internet access
Licenses
Events and alarms
FortiNAC Control Manager
Evaluation license keys
Navigation
Filters
Search
Search and filter options
Find containers or devices
Menus
Manage bookmarks
User preferences
Passwords
Time stamps and time zones
Analytics
Icons
Certificates
Manage hosts and ports
Locate
Guest accounts
Send messages to hosts
Dashboard
Adding panels
Alarms
Host Summary
User Summary
Network Device Summary
License Information
Performance
Persistent Agent Summary
Security Summary
Scans
Summary
Views
Settings
Control
Access point management
Allowed domains
Web proxy
Quarantine
Identification
NAT detection
Rogue DHCP server detection
Vendor OUIs
Network device
Persistent Agent settings
Global updates
Credential configuration
Security management
Status notifications
Transport configurations
USB detection
Security
Portal SSL
Certificate management
System communication
Email settings
Log receivers
MDM services
Mobile providers
Patch management
Proxy settings
SNMP
Syslog management
Security event parsers
Trap MIB files
Vulnerability scanner
Security Fabric Connection
System management
Database archive
Backup or restore a database
License management
NTP and time zone
High availability
Power management
Backup to a remote server
System backups
Updates
Agent packages
Updating CentOS
System update
User/host management
Aging
Allowed hosts
Device profiler
MAC address exclusion
Authentication
Automatic authentication
Google authentication
Google Developer's Console
Add or modify account settings
Enable push notifications
Directories
Requirements
Structure and synchronization
Configuration
Delete a directory
Schedule synchronization
Preview
Create a keystore for SSL or TLS
RADIUS
Manage settings
802.1x environments
Order of precedence
Configure RADIUS settings
Set defaults
Set domain mappings
Configure local domain list
Failover process
Validate redundant RADIUS
Local RADIUS Server
Configure Local RADIUS Server settings
RADIUS Attribute Groups
Roaming guests
Portal configuration
Registration Approval (Version 8.8.2 and above)
Splash page
Portal content editor
Edit style sheets
Export portal content
Import portal content
Upload images
Sample portal page
Using special characters
Configuration
Host inventory
Multiple portals
Create a portal
Copy a portal
Select a default portal
Edit portal settings
Delete a portal
Configure authentication credentials
Portal configuration - version 1 settings
Content fields
Global properties
Registration
Authentication
Remediation
VPN portal
Isolation portal
Dead end portal
Policy failure portal
Agent portal
EasyConnect portal
Host inventory portal
Device profiler
Process
Implementation
Rules
Managing rules
Best practices
Adding a rule
Deleting a rule
Copying a rule
Evaluating rogue hosts
WinRM Device Profile Requirements and Setup
Profiles for device managers
Add an administrator
Events and alarms
Profiled devices
Monitor devices
View and register known devices
Learning about hosts on the network
Isolate unknown devices
Control access based on device types
View logs and reports
FortiGate sessions
Policies
Policy assignment
Policy details
Policy simulator
User/host profiles
Filter example
Profile example
Profiles in use
Delete a profile
Portal policies
Implementation
Manage policies
Add or modify a policy
Delete a policy
Authentication policies
Manage policies
Add or modify a policy
Delete a policy
When no profile or policy exists
Authentication configurations
Add or modify a policy
Delete a configuration
Network access policies
Implementation
Manage policies
Add or modify a policy
Delete a policy
Network access configurations
Add or modify a configuration
Configurations in use
Delete a configuration
Endpoint compliance policies
Determining host operating system
Add or modify a policy
Delete a policy
Endpoint compliance configurations
Add or modify a configuration
Configurations in use
Delete a configuration
Chaining configuration scans
Supplicant EasyConnect policies
Requirements
Manage policies
Add or modify a policy
Delete a policy
Supplicant configurations
Add or modify a configuration
Configurations in use
Delete a configuration
Remediation configurations
Add a scan
View scan status
Clear scanned hosts list
Modify or remove a scan
Scans
Scan on connect
Scan hosts without enforcing remediation
Delayed remediation
Add or modify a scan
Delete a scan
Scans in use
Schedule a scan
Custom scans
Create a scan
Scan categories
Windows
macOS
Linux
Severity level
Use case
Scan parameters
Antivirus parameters - Windows
Antivirus parameters - macOS
Operating system parameters - Windows
Operating systems parameters - macOS
Endpoint compliance
Implementation
Agent overview
Dissolvable Agent
Passive Agent
Registration
Manage configurations
Add or modify configuration
Delete configuration
Copy configuration
IP ranges
Test a directory user
Administrative templates for GPO
CLI arguments
Persistent Agent
Installion for Windows
Installation for macOS
Installation for Linux
Using the Persistent Agent
Using Windows domain logon credentials
GPO settings for high availability
Certificate validation
Upgrade the Persistent Agent
Logging
Mobile Agent
Agent server communications
SSL certificates
DNS server configuration
Agent server discovery
Persistent Agent on Windows
Persistent Agent on macOS
Persistent Agent on Linux
Host logging for agent security
Auto-definition updates
Role management
Configuration
Assigning roles
Roles view
Add a role
Modify or delete roles
Role in use
Network device roles
Add role mappings
Modify or delete role mapping
Guest manager
Implementation
Guest/contractor templates
Visitor types
Create templates
Endpoint compliance policies for guests
Modify templates
Copy templates
Delete templates
Administrator profile
Add a guest manager profile
Add a guest kiosk profile
Add a guest self registration profile
Administrators
Portal page setup
Printer settings for guest badges
Events and alarms
Sponsors
Guest/contractor accounts
Create guest/contractor accounts
Create bulk or multiple accounts
Bulk guest import
Provide login information
Conference accounts
Guest account details
Guest/contractor login
Using a kiosk
Kiosk browser
Log into a kiosk
Account creation
Account activation
Kiosk shut down
Guest self registration
Requesting an account
Approve or deny a request
Sponsor Approval Email Links
Self registration requests
Automated Threat Response (ATR)
Implementation
Security rules
Add or modify a rule
Delete a rule
Triggers
Add a trigger
Delete a trigger
Add or modify filters
Delete a filter
Security actions
Add or modify an action
Delete an action
Add or modify activities
Delete an activity
Security alarms
Security events
Vendor severity levels
User View
Configure table columns and tooltips
Search settings
User drill-down
User properties
Add or modify a user
Delete a user
Add users to groups
Group membership
Guest account details
Set user expiration date
Administrator profiles
Default administrator profiles
Permissions list
Add an administrator profile
Modify administrator profiles
Delete an administrator profile
Copy an administrator profile
Administrator profile mappings
Mappings process
Add or modify a mapping
Delete a mapping
Administrators
Add an administrator
Modify an administrator
Delete an administrator
Copy an administrator
Modify an administrator profile
User theme
Limit access with groups
Set privileges based on directory groups
Add administrators to groups
Group membership
Configure secure mode
Import and export data
Import archived data
Import hosts, users or devices
Sample import files
Import from a .csv file
Import from a previous version
Import an administrator
Import IP ranges
CLI import tool
Create .csv files for device import
Import devices with the CLI tool
Import port descriptions
Export data
Topology
Topology tree contact status
Network summary
Customer icon
Configure container for devices
Rename the customer icon
Container icon
Add or modify a device
Add or modify a pingable device
Add or modify the Palo Alto User-ID agent as a pingable
Convert all pingables to hosts
Discovery
Discovery results
Device view
Delete a device
Replace a device using the same IP address
Convert devices to hosts
Device group membership
Local management
Move a device to a different container
Network access/VLANs
Poll for contact status
Poll for L2 (hosts) information
L2 polling
L3 polling
Ports and hosts
Device properties
Modify multiple device properties
Pingable device properties
View role membership
Set device mapping for unknown SNMP devices
Update device mapping
Firewall session polling
Modifying Switch Components in a Stack
Device configuration
Delete a device
Resync Interfaces
Model configuration
Global model configuration
Set CDP polling
Wired devices and 802.1X
Secure port/static port overview
Ports view
Update ports view
View connection details
Add ports to groups
Modify multiple ports
Group membership
Remove ports from multiple groups
Port properties
Port uplink types
SSID view
SSID configuration
Modify multiple SSIDs
Logical networks
Configuring logical networks
Assigning access values and CLIÂ configurations
Configuring network access policies
Hosts, adapters, and applications
USB/Thunderbolt external Ethernet adapters
Host View
Settings
Drill-down settings
Properties
Host health and scanning
Application inventory
Add or modify a host
Delete a host
Enable or disable hosts
Add IP phones
Add hosts to groups
Group membership
Register a host as a device
Run the agentless scanner
Set host expiration date
Send a message to a host
Host registration and user authentication
Adapter View
View and search settings
Properties
Device identity
Enable or disable an adapter
Modify an adapter
Aging out host or user records
Application view
Device identity
Containers
Configure container for devices
Network devices
Network device groups
Groups view
Add groups
Copy a group
Delete a group
Limit user access with groups
Modify a group
Group membership
Show group members
Group in use
Aging hosts in a group
System groups
Customer defined groups
Admin auditing
Configuration
Accessing the auditing log
Scheduler
Add a task
Add other scheduled tasks
Copy a task
Delete a task
Modify a task
Run task now
Event management
Enable and disable events
Event thresholds
Log events to an external log host
Examples of syslog messages
View events currently mapped to alarms
Events
Event notes
Events and alarms list
Alarms
Show or hide alarm details
Map events to alarms
Add or modify alarm mapping
Bulk modify alarm mappings
Delete alarm mapping
Reports
Standard report templates
Preview standard report templates
Guest registrations report
Registrations report
Scan results report
Custom reports
Add a custom report
Preview a custom report
Modify a custom report
Remove a custom report
Schedule reports
Archived reports
Scan results view
Show details
Archive and clear all scans
Archive and clear selected scans
Connections
CLI configuration
Configuration in use
Show configuration
Port based and host based configurations
Add or modify a configuration
Sample configurations
Implement configurations
Apply a port based configuration via model configuration
Apply a host based configuration via the model configuration
Apply a CLI configuration using a role
Apply a CLI configuration using a network access policy
Apply a CLI configuration using a scheduled task
Port changes view
Requirements for ACL based configurations
Create the Cisco extended ACL
Apply the ACL to the physical interface
Poll the switch/router
High availability
Server communication
Using a shared IP address (Layer 2)
Servers on different subnets (Layer 3)
Connectivity configuration
Primary and secondary configuration
Update software
High availability concepts
Startup
Monitor
Control sequence
Recovery
Stop the primary server
Troubleshooting tips
Determine which appliance has the shared IP
Determine appliance status
Confirm database replication
Verify license key
Receive data from external devices
Send SMS messages
Wireless security
Auto-configured data
SSID mappings
Secure SSID for guest management
Open SSID for guest management
Secure SSID for device onboarding
Open SSID for device onboarding
Home
FortiNAC 8.8.0
Administration Guide
Administration Guide
What's new in FortiNAC 8.8.0
FortiNAC
Introduction
DNS configuration
IPv6 support
Login procedure
Connection errors
Internet access
Licenses
Events and alarms
FortiNAC Control Manager
Evaluation license keys
Navigation
Filters
Search
Search and filter options
Find containers or devices
Menus
Manage bookmarks
User preferences
Passwords
Time stamps and time zones
Analytics
Icons
Certificates
Manage hosts and ports
Locate
Guest accounts
Send messages to hosts
Dashboard
Adding panels
Alarms
Host Summary
User Summary
Network Device Summary
License Information
Performance
Persistent Agent Summary
Security Summary
Scans
Summary
Views
Settings
Control
Access point management
Allowed domains
Web proxy
Quarantine
Identification
NAT detection
Rogue DHCP server detection
Vendor OUIs
Network device
Persistent Agent settings
Global updates
Credential configuration
Security management
Status notifications
Transport configurations
USB detection
Security
Portal SSL
Certificate management
System communication
Email settings
Log receivers
MDM services
Mobile providers
Patch management
Proxy settings
SNMP
Syslog management
Security event parsers
Trap MIB files
Vulnerability scanner
Security Fabric Connection
System management
Database archive
Backup or restore a database
License management
NTP and time zone
High availability
Power management
Backup to a remote server
System backups
Updates
Agent packages
Updating CentOS
System update
User/host management
Aging
Allowed hosts
Device profiler
MAC address exclusion
Authentication
Automatic authentication
Google authentication
Google Developer's Console
Add or modify account settings
Enable push notifications
Directories
Requirements
Structure and synchronization
Configuration
Delete a directory
Schedule synchronization
Preview
Create a keystore for SSL or TLS
RADIUS
Manage settings
802.1x environments
Order of precedence
Configure RADIUS settings
Set defaults
Set domain mappings
Configure local domain list
Failover process
Validate redundant RADIUS
Local RADIUS Server
Configure Local RADIUS Server settings
RADIUS Attribute Groups
Roaming guests
Portal configuration
Registration Approval (Version 8.8.2 and above)
Splash page
Portal content editor
Edit style sheets
Export portal content
Import portal content
Upload images
Sample portal page
Using special characters
Configuration
Host inventory
Multiple portals
Create a portal
Copy a portal
Select a default portal
Edit portal settings
Delete a portal
Configure authentication credentials
Portal configuration - version 1 settings
Content fields
Global properties
Registration
Authentication
Remediation
VPN portal
Isolation portal
Dead end portal
Policy failure portal
Agent portal
EasyConnect portal
Host inventory portal
Device profiler
Process
Implementation
Rules
Managing rules
Best practices
Adding a rule
Deleting a rule
Copying a rule
Evaluating rogue hosts
WinRM Device Profile Requirements and Setup
Profiles for device managers
Add an administrator
Events and alarms
Profiled devices
Monitor devices
View and register known devices
Learning about hosts on the network
Isolate unknown devices
Control access based on device types
View logs and reports
FortiGate sessions
Policies
Policy assignment
Policy details
Policy simulator
User/host profiles
Filter example
Profile example
Profiles in use
Delete a profile
Portal policies
Implementation
Manage policies
Add or modify a policy
Delete a policy
Authentication policies
Manage policies
Add or modify a policy
Delete a policy
When no profile or policy exists
Authentication configurations
Add or modify a policy
Delete a configuration
Network access policies
Implementation
Manage policies
Add or modify a policy
Delete a policy
Network access configurations
Add or modify a configuration
Configurations in use
Delete a configuration
Endpoint compliance policies
Determining host operating system
Add or modify a policy
Delete a policy
Endpoint compliance configurations
Add or modify a configuration
Configurations in use
Delete a configuration
Chaining configuration scans
Supplicant EasyConnect policies
Requirements
Manage policies
Add or modify a policy
Delete a policy
Supplicant configurations
Add or modify a configuration
Configurations in use
Delete a configuration
Remediation configurations
Add a scan
View scan status
Clear scanned hosts list
Modify or remove a scan
Scans
Scan on connect
Scan hosts without enforcing remediation
Delayed remediation
Add or modify a scan
Delete a scan
Scans in use
Schedule a scan
Custom scans
Create a scan
Scan categories
Windows
macOS
Linux
Severity level
Use case
Scan parameters
Antivirus parameters - Windows
Antivirus parameters - macOS
Operating system parameters - Windows
Operating systems parameters - macOS
Endpoint compliance
Implementation
Agent overview
Dissolvable Agent
Passive Agent
Registration
Manage configurations
Add or modify configuration
Delete configuration
Copy configuration
IP ranges
Test a directory user
Administrative templates for GPO
CLI arguments
Persistent Agent
Installion for Windows
Installation for macOS
Installation for Linux
Using the Persistent Agent
Using Windows domain logon credentials
GPO settings for high availability
Certificate validation
Upgrade the Persistent Agent
Logging
Mobile Agent
Agent server communications
SSL certificates
DNS server configuration
Agent server discovery
Persistent Agent on Windows
Persistent Agent on macOS
Persistent Agent on Linux
Host logging for agent security
Auto-definition updates
Role management
Configuration
Assigning roles
Roles view
Add a role
Modify or delete roles
Role in use
Network device roles
Add role mappings
Modify or delete role mapping
Guest manager
Implementation
Guest/contractor templates
Visitor types
Create templates
Endpoint compliance policies for guests
Modify templates
Copy templates
Delete templates
Administrator profile
Add a guest manager profile
Add a guest kiosk profile
Add a guest self registration profile
Administrators
Portal page setup
Printer settings for guest badges
Events and alarms
Sponsors
Guest/contractor accounts
Create guest/contractor accounts
Create bulk or multiple accounts
Bulk guest import
Provide login information
Conference accounts
Guest account details
Guest/contractor login
Using a kiosk
Kiosk browser
Log into a kiosk
Account creation
Account activation
Kiosk shut down
Guest self registration
Requesting an account
Approve or deny a request
Sponsor Approval Email Links
Self registration requests
Automated Threat Response (ATR)
Implementation
Security rules
Add or modify a rule
Delete a rule
Triggers
Add a trigger
Delete a trigger
Add or modify filters
Delete a filter
Security actions
Add or modify an action
Delete an action
Add or modify activities
Delete an activity
Security alarms
Security events
Vendor severity levels
User View
Configure table columns and tooltips
Search settings
User drill-down
User properties
Add or modify a user
Delete a user
Add users to groups
Group membership
Guest account details
Set user expiration date
Administrator profiles
Default administrator profiles
Permissions list
Add an administrator profile
Modify administrator profiles
Delete an administrator profile
Copy an administrator profile
Administrator profile mappings
Mappings process
Add or modify a mapping
Delete a mapping
Administrators
Add an administrator
Modify an administrator
Delete an administrator
Copy an administrator
Modify an administrator profile
User theme
Limit access with groups
Set privileges based on directory groups
Add administrators to groups
Group membership
Configure secure mode
Import and export data
Import archived data
Import hosts, users or devices
Sample import files
Import from a .csv file
Import from a previous version
Import an administrator
Import IP ranges
CLI import tool
Create .csv files for device import
Import devices with the CLI tool
Import port descriptions
Export data
Topology
Topology tree contact status
Network summary
Customer icon
Configure container for devices
Rename the customer icon
Container icon
Add or modify a device
Add or modify a pingable device
Add or modify the Palo Alto User-ID agent as a pingable
Convert all pingables to hosts
Discovery
Discovery results
Device view
Delete a device
Replace a device using the same IP address
Convert devices to hosts
Device group membership
Local management
Move a device to a different container
Network access/VLANs
Poll for contact status
Poll for L2 (hosts) information
L2 polling
L3 polling
Ports and hosts
Device properties
Modify multiple device properties
Pingable device properties
View role membership
Set device mapping for unknown SNMP devices
Update device mapping
Firewall session polling
Modifying Switch Components in a Stack
Device configuration
Delete a device
Resync Interfaces
Model configuration
Global model configuration
Set CDP polling
Wired devices and 802.1X
Secure port/static port overview
Ports view
Update ports view
View connection details
Add ports to groups
Modify multiple ports
Group membership
Remove ports from multiple groups
Port properties
Port uplink types
SSID view
SSID configuration
Modify multiple SSIDs
Logical networks
Configuring logical networks
Assigning access values and CLIÂ configurations
Configuring network access policies
Hosts, adapters, and applications
USB/Thunderbolt external Ethernet adapters
Host View
Settings
Drill-down settings
Properties
Host health and scanning
Application inventory
Add or modify a host
Delete a host
Enable or disable hosts
Add IP phones
Add hosts to groups
Group membership
Register a host as a device
Run the agentless scanner
Set host expiration date
Send a message to a host
Host registration and user authentication
Adapter View
View and search settings
Properties
Device identity
Enable or disable an adapter
Modify an adapter
Aging out host or user records
Application view
Device identity
Containers
Configure container for devices
Network devices
Network device groups
Groups view
Add groups
Copy a group
Delete a group
Limit user access with groups
Modify a group
Group membership
Show group members
Group in use
Aging hosts in a group
System groups
Customer defined groups
Admin auditing
Configuration
Accessing the auditing log
Scheduler
Add a task
Add other scheduled tasks
Copy a task
Delete a task
Modify a task
Run task now
Event management
Enable and disable events
Event thresholds
Log events to an external log host
Examples of syslog messages
View events currently mapped to alarms
Events
Event notes
Events and alarms list
Alarms
Show or hide alarm details
Map events to alarms
Add or modify alarm mapping
Bulk modify alarm mappings
Delete alarm mapping
Reports
Standard report templates
Preview standard report templates
Guest registrations report
Registrations report
Scan results report
Custom reports
Add a custom report
Preview a custom report
Modify a custom report
Remove a custom report
Schedule reports
Archived reports
Scan results view
Show details
Archive and clear all scans
Archive and clear selected scans
Connections
CLI configuration
Configuration in use
Show configuration
Port based and host based configurations
Add or modify a configuration
Sample configurations
Implement configurations
Apply a port based configuration via model configuration
Apply a host based configuration via the model configuration
Apply a CLI configuration using a role
Apply a CLI configuration using a network access policy
Apply a CLI configuration using a scheduled task
Port changes view
Requirements for ACL based configurations
Create the Cisco extended ACL
Apply the ACL to the physical interface
Poll the switch/router
High availability
Server communication
Using a shared IP address (Layer 2)
Servers on different subnets (Layer 3)
Connectivity configuration
Primary and secondary configuration
Update software
High availability concepts
Startup
Monitor
Control sequence
Recovery
Stop the primary server
Troubleshooting tips
Determine which appliance has the shared IP
Determine appliance status
Confirm database replication
Verify license key
Receive data from external devices
Send SMS messages
Wireless security
Auto-configured data
SSID mappings
Secure SSID for guest management
Open SSID for guest management
Secure SSID for device onboarding
Open SSID for device onboarding
8.8.0
9.4.0
9.2.0
9.1.0
8.8.0
8.7.0
8.6.0
8.5.2
8.3.0
Download PDF
Copy Doc ID
dc02a854-ab11-11ea-8b7d-00505692583a:752218
Copy Link
Delete configuration
Select
Policy > Passive Agent Configuration
.
Select a configuration and click
Delete
.
A message displays asking if you are sure. Click
Yes
to continue.
Previous
Next
Delete configuration
Select
Policy > Passive Agent Configuration
.
Select a configuration and click
Delete
.
A message displays asking if you are sure. Click
Yes
to continue.
Previous
Next
Link
PDF
TOC