Fortinet white logo
Fortinet white logo

FortiNAC Manager

9.4.0

Evaluating rogue hosts

Evaluating rogue hosts

Over time you may have hosts that remain rogues because they do not match any of the rules enabled in the device profiling rules. You may also have hosts that have been categorized incorrectly. At any time you can modify the rules or create additional rules and then re-evaluate hosts. Only those hosts that remain unregistered can be re-evaluated.

If a host has been categorized incorrectly and has been registered, you have two options. Either manually modify the host or delete the host and when it connects to the network again, it will be evaluated by the rules.

Rogues that are no longer connected or are offline are ignored.

  1. Click Users & Hosts > Device Profiling Rules.
  2. Click Run.
  3. A message displays asking if you would like to evaluate rogues. Click Yes to continue.
  4. A new message displays indicating that x number of rogues are being evaluated.
  5. Device profiler compares any rogue hosts to the list of enabled device profiling rules and processes them accordingly. See How it works for additional information.
  6. When the process is complete, click OK to close the message box.

Evaluating rogue hosts

Evaluating rogue hosts

Over time you may have hosts that remain rogues because they do not match any of the rules enabled in the device profiling rules. You may also have hosts that have been categorized incorrectly. At any time you can modify the rules or create additional rules and then re-evaluate hosts. Only those hosts that remain unregistered can be re-evaluated.

If a host has been categorized incorrectly and has been registered, you have two options. Either manually modify the host or delete the host and when it connects to the network again, it will be evaluated by the rules.

Rogues that are no longer connected or are offline are ignored.

  1. Click Users & Hosts > Device Profiling Rules.
  2. Click Run.
  3. A message displays asking if you would like to evaluate rogues. Click Yes to continue.
  4. A new message displays indicating that x number of rogues are being evaluated.
  5. Device profiler compares any rogue hosts to the list of enabled device profiling rules and processes them accordingly. See How it works for additional information.
  6. When the process is complete, click OK to close the message box.