EasyManuals Logo

Fortinet FortiGate Series Administration Guide

Fortinet FortiGate Series
764 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #702 background imageLoading...
Page #702 background image
Monitoring endpoints Endpoint NAC
FortiGate Version 4.0 MR1 Administration Guide
702 01-410-89802-20090903
http://docs.fortinet.com/Feedback
Column Settings Select the columns to display in the list. You can also determine the
order in which they appear. For more information, see “Using column
settings to control the columns displayed” on page 103 and
“Web-based manager icons” on page 105.
Clear All Filters Clear any column display filters you might have applied.
Filter icons Edit the column filters to filter or sort the endpoints list according to the
criteria you specify. For example, you could add a filter to the Detected
Software column to display all endpoints running BitTorrent software.
For more information, see “Adding filters to web-based manager lists”
on page 99.
View icon View details about a selected endpoint. Select this icon to display the
information about the endpoint found by the FortiClient application.
Exempt Temporarily icon Exempt the selected endpoint from endpoint NAC. This means an
endpoint that is blocked and added to the endpoint list can temporarily
access network services through the FortiGate unit. When you select
this icon you can specify how long the end point is exempted from
endpoint NAC. The default exempt duration is 600 seconds.
Restore to Blocked State
icon
Re-enable blocking access to a temporarily exempted endpoint.
Information columns Select Column Settings determine which of the following columns to
display. All information that appears in the columns is reported by the
FortiClient application running on the endpoint, unless otherwise noted.
AV signature The version of the FortiClient antivirus signatures installed on the
endpoint.
Computer Manufacturer The name of the manufacturer of the endpoint.
Computer Model The model name of the endpoint.
CPU Model The CPU running on the endpoint.
Description The description of the endpoint.
Detected Software The software applications detected on this endpoint. See “Configuring
application detection lists” on page 697.
You can control the applications that appear in the Detected Software
column by editing the Detected Software filter. See “Adding filters to
web-based manager lists” on page 99.
FortiClient Version The version of the FortiClient application running on the endpoint.
Host Name The host name of the endpoint.
Installed FCT Features The FortiClient features enabled on the endpoint.
IP Address The IP address of the endpoint as found from the communication
session. The FortiClient application is not required to obtain this
information.
Last User The last user to log in to the endpoint.
Last Update The time that the status of the endpoint was last verified by the
FortiGate unit. The FortiClient application is not required to obtain this
information.
Memory Size The amount of memory installed on the endpoint.
OS Version The version of the operating system running on the endpoint.
System Uptime The system up time of the endpoint.
Traffic Volume/Attempts If the endpoint is compliant, this column displays the amount of data
passed through the FortiGate unit by communication sessions
originating from the endpoint. If the endpoint is non-compliant, this
column displays the number of times the endpoint has attempted to
connect through the FortiGate unit. The FortiClient application is not
required to obtain this information.

Table of Contents

Other manuals for Fortinet FortiGate Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Fortinet FortiGate Series and is the answer not in the manual?

Fortinet FortiGate Series Specifications

General IconGeneral
ModelFortiGate Series
CategoryFirewall
ThroughputVaries by model
InterfacesVaries by model
Concurrent SessionsVaries by model
VPN SupportYes
High AvailabilityYes
Firewall ThroughputVaries by model
VPN ThroughputVaries by model
IPS ThroughputVaries by model
NGFW ThroughputVaries by model
Threat Protection ThroughputVaries by model
New Sessions per SecondVaries by model
Power SupplyVaries by model
Security FeaturesFirewall, IPS, Application Control, Web Filtering, Antivirus, VPN
Virtual DomainsYes
Form FactorDesktop, Rackmount

Related product manuals