Setup

Configuring a device to use the service

2Select the Expand Arrow beside Analysis & Management Service Options to reveal the available options.

3Enter the service account ID in the Account ID field.

The service account ID entered here will be used to identify that the device is associated with that service account.

4Select Apply.

In the FortiGuard Subscription Services area of the FortiGuard page, you should see a green checkmark in the Analysis & Management Service row, as in Figure 4. You should also see a green checkmark on the System dashboard of your device, under License Information (beside Analysis and Management Service). If you see an orange X, your device is not properly connected; if you see a gray X, your device is not connected. For more information, see “Verifying the connectivity between the service and the device” on page 17.

After successfully configuring your device, you also need to enable central management, and, if applicable, configure remote logging. For more information, see “Configuring remote logging and central management” on page 17.

Verifying the connectivity between the service and the device

The device connects to the Fortinet Distribution Network (FDN) to validate connectivity with that Service Account ID. After successful validation, the options for configuring and using the service become available on the device’s web-based manager. You should also see a green check mark beside Analysis and Management Services under License Information in the System dashboard of the device.

If you have not yet authorized the device to use the service, the service license status may appear to be Expired or Not Registered, and the device will not be able to connect to the service. To authorize the device, see “Authorizing the service on devices” on page 38.

If you have authorized the device from the portal web site, but the device is still unable to connect, verify that the device’s system time and time zone are correct. If these are incorrect, the SSL connection will fail; you must then enter the correct system time and zone on the FortiGate unit. For more information, see the FortiGate Administration Guide.

Configuring remote logging and central management

After configuring the Service Account ID on the device’s web-based manager, you need to also configure central management and, if applicable, logging. The service provides both central management of the device as well as logging and reporting capabilities.

The following procedures describe how to enable and configure both remote logging and central management.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

 

13-12000-406-20081031

17

Page 17
Image 17
Fortinet 1.2.0 manual Configuring remote logging and central management

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.