Fortinet black logo

Manager Guide

7.2.0

Locate

Locate

Use this option to locate hosts or users.

Option

Description

Registered Hosts/Devices

Search Type

Drop down menu with the following options:

Devices - Search only records that are registered as a device

Hosts/Users - Search only user records and records that are registered as a host

All - Search all records

Server List

List of servers being managed. Select one or more servers to be included in the search.

Click Select All to select all servers to be included in the search.

Click Save Server Selections to save the list of servers you have selected for the search.

Name

The last name of a user associated with the registered host or the vendor name of a rogue host.

Name (v7.2.6 and greater):

The last name of a user associated with the registered host, the host's vendor name or host name. The wildcard (*) option is also available.

IP Address

The IP Address of the host machine.

Additional Adapter Info

MAC Type

The MAC Type for the host. The available options are: Invalid, Valid or Both.

Connect State

The Connect State of the adapter. Options include: Both, Off line or On line.

Access

The Access state of the adapter. Options include, Enabled, Disabled or Both.

Physical Address

The MAC Address of the adapter on the host.

Media Type

Searches the Media Type field in the Adapter Properties. Typically this would be either wired or wireless.

Access Value

Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually.

Additional Host Info

Host Name

Name of the host machine.

Agent Version

Version number of the Persistent or Dissolvable Agent on the host.

Operating System

Operating system on the host.

Hardware

Hardware type of the host machine.

Host Type

Narrow the search by a specific type of host: All, IP Phone, Registered or Rogue.

Authenticated State

Include hosts on which a user has Authenticated, Not-authenticated or Both.

Security State

Include hosts that are Safe, At Risk or Both.

Persistent Agent

The Persistent Agent usage of the host. Options include:

No Agent — Hosts with no agent.

Agent — Hosts using the Persistent Agent.

Both — Hosts using either the Persistent Agent or the Dissolvable Agent.

Connect State

The Connect State of the adapter. Options include: Both, Off line or On line.

Access

The Access state of the host. Options include, Enabled, Disabled or Both.

Host Role

Name of the Role assigned to the host. Roles are used to group hosts and control their access to the network.

Security & Access Value

Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually.

Additional User Info

First Name

First name of the user associated with the host.

User ID

Unique alphanumeric ID. Typically comes from the directory but if you are not using a directory, this field can be created manually.

Title

User's title, this could be a form of address or their title within the organization.

User Type

Searches both Admin Users and network users. Options include: All, Administrative, Administrator, Operator or Helpdesk. To search network users and guests or contractors, select All.

Sponsor

If the administrative user performing the search has Sponsor privileges, his User Name may be filled in this field. Depending on permissions, a Sponsor's search may be limited to the hosts he created.

Sponsors with the ability to view all accounts can use this field to find hosts created by a specific Sponsor by entering that Sponsor's User Name in this field.

User Role

Name of the Role assigned to the user. Roles are used to group users and control their network access.

Access

The Access state of the user. Options include, Enabled, Disabled or Both.

Security & Access Value

Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually.

Locate

Use this option to locate hosts or users.

Option

Description

Registered Hosts/Devices

Search Type

Drop down menu with the following options:

Devices - Search only records that are registered as a device

Hosts/Users - Search only user records and records that are registered as a host

All - Search all records

Server List

List of servers being managed. Select one or more servers to be included in the search.

Click Select All to select all servers to be included in the search.

Click Save Server Selections to save the list of servers you have selected for the search.

Name

The last name of a user associated with the registered host or the vendor name of a rogue host.

Name (v7.2.6 and greater):

The last name of a user associated with the registered host, the host's vendor name or host name. The wildcard (*) option is also available.

IP Address

The IP Address of the host machine.

Additional Adapter Info

MAC Type

The MAC Type for the host. The available options are: Invalid, Valid or Both.

Connect State

The Connect State of the adapter. Options include: Both, Off line or On line.

Access

The Access state of the adapter. Options include, Enabled, Disabled or Both.

Physical Address

The MAC Address of the adapter on the host.

Media Type

Searches the Media Type field in the Adapter Properties. Typically this would be either wired or wireless.

Access Value

Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually.

Additional Host Info

Host Name

Name of the host machine.

Agent Version

Version number of the Persistent or Dissolvable Agent on the host.

Operating System

Operating system on the host.

Hardware

Hardware type of the host machine.

Host Type

Narrow the search by a specific type of host: All, IP Phone, Registered or Rogue.

Authenticated State

Include hosts on which a user has Authenticated, Not-authenticated or Both.

Security State

Include hosts that are Safe, At Risk or Both.

Persistent Agent

The Persistent Agent usage of the host. Options include:

No Agent — Hosts with no agent.

Agent — Hosts using the Persistent Agent.

Both — Hosts using either the Persistent Agent or the Dissolvable Agent.

Connect State

The Connect State of the adapter. Options include: Both, Off line or On line.

Access

The Access state of the host. Options include, Enabled, Disabled or Both.

Host Role

Name of the Role assigned to the host. Roles are used to group hosts and control their access to the network.

Security & Access Value

Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually.

Additional User Info

First Name

First name of the user associated with the host.

User ID

Unique alphanumeric ID. Typically comes from the directory but if you are not using a directory, this field can be created manually.

Title

User's title, this could be a form of address or their title within the organization.

User Type

Searches both Admin Users and network users. Options include: All, Administrative, Administrator, Operator or Helpdesk. To search network users and guests or contractors, select All.

Sponsor

If the administrative user performing the search has Sponsor privileges, his User Name may be filled in this field. Depending on permissions, a Sponsor's search may be limited to the hosts he created.

Sponsors with the ability to view all accounts can use this field to find hosts created by a specific Sponsor by entering that Sponsor's User Name in this field.

User Role

Name of the Role assigned to the user. Roles are used to group users and control their network access.

Access

The Access state of the user. Options include, Enabled, Disabled or Both.

Security & Access Value

Directory Attribute used when determining which security policy the hosts are scanned against. Data contained in this field is copied from the user's account in the directory to the Security and Access value field on the User, Host and Adapter Properties. It can also be entered manually.