Fortinet Document Library

Version:

Version:


Table of Contents

Administration Guide

Download PDF
Copy Link

User View

The user view is part of a four tabbed window that includes adapters, hosts, users, and applications. Use this view to add, delete, modify, locate and manage users on your network. Users include network users, guest or contractor users and Administrators. Administrators can also be managed from the administrators view. Administrator are also network users, therefore, they are included in the users view with a slightly different icon. See Icons for information on each icon.

If you have an LDAP or Active Directory configured, user information is added from the directory as users register on the network. The FortiNAC database is periodically synchronized with the directory to make sure that data is the same in both places. User information from the directory is matched to user information in the FortiNAC database based on user ID. If you manually create a user with an ID that is the same as a user in the directory, then directory data will overwrite your manually entered data.

The relationship between users, hosts, and adapters is hierarchical. Users own or are associated with one or more hosts. Hosts contain one or more Adapters or network interfaces that connect to the network. By displaying User, Host and Adapter data in a tabbed window, the relationships are maintained. For example, if you search for a host with IP address 192.168.5.105, you are in fact searching for the IP address of the adapter on that host. When the search displays the host, you can click on the Adapters tab, the search is automatically re-run and you see the adapter itself. If there is an associated user, you can click on the Users tab to re-run the search and see the associated user.

Click on the arrow in the left column to drill-down and display the hosts associated with the selected user. Hover over the icon in the Status column to display a tooltip with detailed information about this user. For settings, see Search settings.

Settings

Field

Definition

Address

Users's street address.

Allowed Hosts

The number of hosts that can be associated with or registered to this user and connect to the network. There are two ways to reach this total.

If the host is scanned by an agent or if adapters have been manually associated with hosts, then a single host with up to five adapters counts as one host.

If the host is not scanned by an agent or if the adapters have not been associated with specific hosts, then each adapter is counted individually as a host. In this scenario one host with two network adapters would be counted as two hosts.

Numbers entered in this field override the default setting in System > Settings > Network Device. Blank indicates that the default is used. See Network device.

If an administrator exceeds the number of hosts when registering a host to a user, a warning message is displayed indicating that the number of Allowed Hosts has been incremented and the additional hosts are registered to the user.

City

User's city of residence.

Created Date

Date the user record was created in the database. Options include Before, After, and Between.

Delete Hosts When User Expires

Indicates whether hosts registered to this user should be deleted from the database when the user's record ages out of the database.

Email

User's email address.

Expiration Date

Controls the number of days a user is authorized on the network. Options include Before, After, Between, Never, and None. The user is deleted from the database when the date specified here has passed. The date is automatically calculated based on the information entered when Aging is configured. See Aging out host or user records.

Delete Hosts When User Expires

Indicates whether hosts owned by this user should be deleted when the user ages out of the database. It is recommended that you set this to Yes.

Inactivity Date

Controls the number of days a User is authorized on the network. Options include Before, After, Between, Never, and None. User is deleted from the database when the date specified here has passed. The date is continuously recalculated based on the information entered in the Days Inactive field. See Aging out host or user records or Set user expiration date.

Inactivity Limit

Number of days the user must remain continuously inactive on the network to be removed from the database. See Aging out host or user records or Set user expiration date.

Last Login/Logout

Date of the last time the user logged into or out of the network or the FortiNAC admin UI. This date is used to count the number of days of inactivity. Options include Before, After, Between, and Never.

Last Name

User's last name.

Mobile Number

User's mobile phone number. Can be used to send SMS messages based on alarms. Requires the Mobile Provider to send SMS messages.

Mobile Provider

Provider or carrier for user's mobile phone.

Notes

Notes about this user.

Phone

User's telephone number.

User Role

Role assigned to the user. Roles are attributes of users and are used as filters for user/host profiles. See Role management.

User Security & Access Value

Value that typically comes from a field in the directory, but can be added manually. This value groups users and can be used to determine which role to apply to a user or which policy to use when scanning a user's computer. The data in this field could be a department name, a type of user, a graduation class, a location or anything that distinguishes a group of users.

State

User's state of residence.

Status

Current or last known status is indicated by an icon. See Icons. Hover over the icon to display additional details about this User in a tool tip.

Access: Indicates whether user is enabled or disabled.

Title

User's title, this could be a form of address or their title within the organization.

Type

Type of user. Allows you to differentiate between network users and guest/contractor users.

User ID

Unique alphanumeric ID. If you are using a directory for authentication, this should match an entry in the directory. If it does not, FortiNAC assumes that this user is authenticating locally and asks you for a password.

When using a directory for authentication, fields such as name, address, email, are updated from the directory based on the user ID when the database synchronizes with the directory. This is true regardless of how the user is created and whether the user is locally authenticated or authenticated through the directory. If the user ID matches a user ID in the directory, the FortiNAC database is updated with the directory data.

Postal Code

User's zip code based on their state of residence.

Last Modified By

User name of the last user to modify the user.

Last Modified Date

Date and time of the last modification to this user.

Navigation, menus, options, and buttons

For information on selecting columns displayed in the user view see Configure table columns and tooltips. Some menu options are not available for all Users. Options may vary depending on user state.

Field

Definition

Quick Search

Enter a single piece of data to quickly display a list of users. Search options include: IP address, MAC address, host name, User Name, and user ID. Drop-down arrow on the right is used to create and use custom filters.

If you are doing a wild card search for a MAC address you must include colons as separators, such as, 00:B6:5*. Without the separators the search option cannot distinguish that it is a MAC address.

When quick search is enabled, the word Search appears before the search field. When a custom filter is enabled, Edit appears before the search field.

Right click options

User Properties

Opens the Properties window for the selected user. See User properties.

Add Users To Groups

Add the selected user(s) to one or more group(s). See Add users to groups.

Delete Users

Deletes the selected user(s) from the database. See Delete a user.

Disable Users

Disables the selected user (s) preventing them from accessing the network regardless of the host they are using. Hosts registered to a disabled user will remain disabled regardless of the logged on user (if different).

Enable Users

Enables the selected user(s) if they were previously disabled. Restores network access.

Group Membership

Displays groups in which the selected user is a member.

If the User is also an administrator, separate options are displayed for administrator Groups and User Groups. Options are Group Membership (User) and Group Membership (Administrator).

Guest Account Details

Displays account details for the selected guest record, such as: user ID, account status, sponsor, account type, start and end dates, availability, role, authentication, security policy, account duration, reauthentication period, success URL, and the guest's password. See Guest account details.

Modify User

Opens the Modify User window. See Add or modify a user.

Policy Details

Opens the Policy Details window and displays the policies that would apply to the selected user at this time, such as endpoint compliance policies, network access policies or Supplicant Policies. See Policy details.

Set Expiration

Launches a tool to set the date and time for the user to age out of the database. See Set user expiration date.

Set Role

Assigns a role to the selected user. See Role management.

Show Audit Log

Opens the admin auditing log showing all changes made to the selected item.

For information about the admin auditing log, see Admin auditing.

Note

You must have permission to view the admin auditing log. See Add an administrator profile.

Show Events

Displays all events for the selected user.

Collapse All

Collapses all records that have been expanded.

Expand Selected

Expands selected user records to display host information.

Buttons

Import/Export

Import and Export options allow you to import users into the database from a CSV file or export a list of selected hosts to CSV, Excel, PDF, or RTF formats. See Import hosts, users or devices or Export data.

Options

Displays the same series of menu picks displayed when the right-mouse button is clicked on a selected user.

User View

The user view is part of a four tabbed window that includes adapters, hosts, users, and applications. Use this view to add, delete, modify, locate and manage users on your network. Users include network users, guest or contractor users and Administrators. Administrators can also be managed from the administrators view. Administrator are also network users, therefore, they are included in the users view with a slightly different icon. See Icons for information on each icon.

If you have an LDAP or Active Directory configured, user information is added from the directory as users register on the network. The FortiNAC database is periodically synchronized with the directory to make sure that data is the same in both places. User information from the directory is matched to user information in the FortiNAC database based on user ID. If you manually create a user with an ID that is the same as a user in the directory, then directory data will overwrite your manually entered data.

The relationship between users, hosts, and adapters is hierarchical. Users own or are associated with one or more hosts. Hosts contain one or more Adapters or network interfaces that connect to the network. By displaying User, Host and Adapter data in a tabbed window, the relationships are maintained. For example, if you search for a host with IP address 192.168.5.105, you are in fact searching for the IP address of the adapter on that host. When the search displays the host, you can click on the Adapters tab, the search is automatically re-run and you see the adapter itself. If there is an associated user, you can click on the Users tab to re-run the search and see the associated user.

Click on the arrow in the left column to drill-down and display the hosts associated with the selected user. Hover over the icon in the Status column to display a tooltip with detailed information about this user. For settings, see Search settings.

Settings

Field

Definition

Address

Users's street address.

Allowed Hosts

The number of hosts that can be associated with or registered to this user and connect to the network. There are two ways to reach this total.

If the host is scanned by an agent or if adapters have been manually associated with hosts, then a single host with up to five adapters counts as one host.

If the host is not scanned by an agent or if the adapters have not been associated with specific hosts, then each adapter is counted individually as a host. In this scenario one host with two network adapters would be counted as two hosts.

Numbers entered in this field override the default setting in System > Settings > Network Device. Blank indicates that the default is used. See Network device.

If an administrator exceeds the number of hosts when registering a host to a user, a warning message is displayed indicating that the number of Allowed Hosts has been incremented and the additional hosts are registered to the user.

City

User's city of residence.

Created Date

Date the user record was created in the database. Options include Before, After, and Between.

Delete Hosts When User Expires

Indicates whether hosts registered to this user should be deleted from the database when the user's record ages out of the database.

Email

User's email address.

Expiration Date

Controls the number of days a user is authorized on the network. Options include Before, After, Between, Never, and None. The user is deleted from the database when the date specified here has passed. The date is automatically calculated based on the information entered when Aging is configured. See Aging out host or user records.

Delete Hosts When User Expires

Indicates whether hosts owned by this user should be deleted when the user ages out of the database. It is recommended that you set this to Yes.

Inactivity Date

Controls the number of days a User is authorized on the network. Options include Before, After, Between, Never, and None. User is deleted from the database when the date specified here has passed. The date is continuously recalculated based on the information entered in the Days Inactive field. See Aging out host or user records or Set user expiration date.

Inactivity Limit

Number of days the user must remain continuously inactive on the network to be removed from the database. See Aging out host or user records or Set user expiration date.

Last Login/Logout

Date of the last time the user logged into or out of the network or the FortiNAC admin UI. This date is used to count the number of days of inactivity. Options include Before, After, Between, and Never.

Last Name

User's last name.

Mobile Number

User's mobile phone number. Can be used to send SMS messages based on alarms. Requires the Mobile Provider to send SMS messages.

Mobile Provider

Provider or carrier for user's mobile phone.

Notes

Notes about this user.

Phone

User's telephone number.

User Role

Role assigned to the user. Roles are attributes of users and are used as filters for user/host profiles. See Role management.

User Security & Access Value

Value that typically comes from a field in the directory, but can be added manually. This value groups users and can be used to determine which role to apply to a user or which policy to use when scanning a user's computer. The data in this field could be a department name, a type of user, a graduation class, a location or anything that distinguishes a group of users.

State

User's state of residence.

Status

Current or last known status is indicated by an icon. See Icons. Hover over the icon to display additional details about this User in a tool tip.

Access: Indicates whether user is enabled or disabled.

Title

User's title, this could be a form of address or their title within the organization.

Type

Type of user. Allows you to differentiate between network users and guest/contractor users.

User ID

Unique alphanumeric ID. If you are using a directory for authentication, this should match an entry in the directory. If it does not, FortiNAC assumes that this user is authenticating locally and asks you for a password.

When using a directory for authentication, fields such as name, address, email, are updated from the directory based on the user ID when the database synchronizes with the directory. This is true regardless of how the user is created and whether the user is locally authenticated or authenticated through the directory. If the user ID matches a user ID in the directory, the FortiNAC database is updated with the directory data.

Postal Code

User's zip code based on their state of residence.

Last Modified By

User name of the last user to modify the user.

Last Modified Date

Date and time of the last modification to this user.

Navigation, menus, options, and buttons

For information on selecting columns displayed in the user view see Configure table columns and tooltips. Some menu options are not available for all Users. Options may vary depending on user state.

Field

Definition

Quick Search

Enter a single piece of data to quickly display a list of users. Search options include: IP address, MAC address, host name, User Name, and user ID. Drop-down arrow on the right is used to create and use custom filters.

If you are doing a wild card search for a MAC address you must include colons as separators, such as, 00:B6:5*. Without the separators the search option cannot distinguish that it is a MAC address.

When quick search is enabled, the word Search appears before the search field. When a custom filter is enabled, Edit appears before the search field.

Right click options

User Properties

Opens the Properties window for the selected user. See User properties.

Add Users To Groups

Add the selected user(s) to one or more group(s). See Add users to groups.

Delete Users

Deletes the selected user(s) from the database. See Delete a user.

Disable Users

Disables the selected user (s) preventing them from accessing the network regardless of the host they are using. Hosts registered to a disabled user will remain disabled regardless of the logged on user (if different).

Enable Users

Enables the selected user(s) if they were previously disabled. Restores network access.

Group Membership

Displays groups in which the selected user is a member.

If the User is also an administrator, separate options are displayed for administrator Groups and User Groups. Options are Group Membership (User) and Group Membership (Administrator).

Guest Account Details

Displays account details for the selected guest record, such as: user ID, account status, sponsor, account type, start and end dates, availability, role, authentication, security policy, account duration, reauthentication period, success URL, and the guest's password. See Guest account details.

Modify User

Opens the Modify User window. See Add or modify a user.

Policy Details

Opens the Policy Details window and displays the policies that would apply to the selected user at this time, such as endpoint compliance policies, network access policies or Supplicant Policies. See Policy details.

Set Expiration

Launches a tool to set the date and time for the user to age out of the database. See Set user expiration date.

Set Role

Assigns a role to the selected user. See Role management.

Show Audit Log

Opens the admin auditing log showing all changes made to the selected item.

For information about the admin auditing log, see Admin auditing.

Note

You must have permission to view the admin auditing log. See Add an administrator profile.

Show Events

Displays all events for the selected user.

Collapse All

Collapses all records that have been expanded.

Expand Selected

Expands selected user records to display host information.

Buttons

Import/Export

Import and Export options allow you to import users into the database from a CSV file or export a list of selected hosts to CSV, Excel, PDF, or RTF formats. See Import hosts, users or devices or Export data.

Options

Displays the same series of menu picks displayed when the right-mouse button is clicked on a selected user.