Management

Settings

 

My Profile

Display the admin user’s profile information, such as

 

 

email address and security questions. The admin

 

 

user is the default user of the service contract and

 

 

has read and write privileges, similar to the admin

 

 

administrator on a device. This user can only edit

 

 

My Profile; the admin user cannot delete his or her

 

 

own profile.

 

Add User

Add a portal user login. For more information, see

 

 

“Adding, editing and removing administrators” on

 

 

page 52.

 

User Name

The name of the user that has access to the portal

 

 

web site. This is usually the person’s first and last

 

 

name. Use the email address of the user to log in to

 

 

the portal web site.

 

Email

The email address used when logging in to the

 

 

portal.

 

Role

The specified role of the user. The roles for users

 

 

are:

 

 

Admin – read and write privileges

 

 

Non-Admin– read privileges only

 

 

e-Discovery– access to only the e-Discovery

 

 

menu.

 

Action

Select Delete to remove a user from the list.

 

 

Select Edit to change the user’s information.

 

 

These actions do not appear next to your own

 

 

account. If you want to edit this account, see

 

 

“Editing your login profile” on page 53.

Alert Profile

Use this section to view and configure alert profiles. For more

 

information, see “Configuring an alert profile” on page 55.

 

Create Profile

Add a new alert profile.

 

Name

The name of the alert profile.

 

Description

The number of occurrences and the time frame that

 

 

they occur in.

 

Email

The email address of the receiver of an alert profile.

 

Actions

Select Delete to remove an alert profile.

 

 

Select Edit to change an alert profile.

Note: In high availability (HA) clusters, daily quota that is assigned in HA clusters will be added up for each member transparently on the FortiOS side; however, at the same time, the current volume on each member is also counted together by the primary unit.

Adding, editing and removing administrators

If multiple users will be accessing the service portal, you can add those users to the account from the User Information area.

User roles define access privileges, and can be Non-Admin (read-only permissions), Admin (full permissions), or e-Discovery (read and write permissions for the e-Discovery menu).

Email addresses should be kept current. A user can retrieve a forgotten password by entering the email address configured for his or her account. If the email address is no longer functional, the user will not be able to retrieve the password, and an Admin role user must instead delete and recreate the user account.

From the Settings menu, an Admin user can update the user’s email address, user name, or role but not passwords or security questions. The user must update his or her own password and security questions by selecting Edit.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

 

13-12000-406-20081031

53

Page 53
Image 53
Fortinet 1.2.0 manual Adding, editing and removing administrators

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.