Device

Management

To edit a device

1Go to Management > Device.

2In the Device section, select Edit.

3Enter the appropriate information for the following:

New Quota (G)

Enter the total amount of disk space that the device is allowed to

 

use.

New Daily

Volume (M)

Comments

Enter the amount of disk space that the device is allowed to consume per day.

Enter any comments or descriptions for that device, if applicable.

4Select Submit.

Authorizing the service on devices

You can authorize current registered devices or when adding devices to the service contract from the Device menu. Authorizing devices on the portal web site establishes the connection and communication between the device and the service.

To authorize service on a device

1Go to Management > Device.

2In the Device section, beside the device that you want, select Enable in the Action column.

3Enter the appropriate information for the following:

New Quota (G) Enter the total amount of disk space that the device is allowed to use.

New Daily

Volume (M)

Comments

Enter the amount of disk space that the device is allowed to consume per day.

Enter any comments or descriptions for that device, if applicable.

4Select Submit.

A green check mark appears in the Connected column if the authorization was successful. If not, an orange X appears in the Connected column. If the orange X appears, you must go to the device’s web-based manager to reconnect to the service. For more information about connecting to the service, see“Configuring remote logging and central management” on page 17.

De-authorizing the service on devices

You can de-authorize the service associated with a device from the Device menu to disable all connection and communication between the device and the service.

To de-authorize a device from using the service

1Go to Management > Device.

2In the Device section, beside the device that you want, select Disable. A message similar to the following appears:

Are you sure to disable device <fortigate_name>?

3Select OK.

 

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

38

13-12000-406-20081031

Page 38
Image 38
Fortinet 1.2.0 manual Authorizing the service on devices, De-authorizing the service on devices

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.