Archive for Cybersecurity - page 42

Fortigate VPN SSL Hardening Guide

Table of Contents Introduction Change the default SSL VPN port 10443/443 to anything else Do not use local users for authentication, and if using – keep passwords elsewhere or/and enable MFA Enable Multi-Factor Authentication for VPN users Limit access to VPN SSL portal to specific…

Continue reading →

Fortigate as DNS authoritative server with DNS database

Table of Contents Configuration Debug and diagnostics diag test application dnsproxy 8 diag test application dnsproxy 3 diagnose test app dnsproxy 2 diagnose test app dnsproxy 7 diagnose test app dnsproxy 6 diagnose test app dnsproxy 9 Windows DNS commands dnscmd server-name-or-IP /zoneinfo domain-name dnscmd…

Continue reading →

Fortinet Releases Security Updates for FortiManager

Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber threat actor could exploit this vulnerability to take control of an affected system. Users and administrators are encouraged to review the following Fortinet Security Bulletin and apply the necessary updates: FG-IR-24-425…

Continue reading →

How Public-Private Collaborations Contribute to Cybercrime Disruption

Fortinet is proud to be part of numerous collaborative efforts to disrupt global cybercrime operations. Learn more. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Fortigate cannot delete VDOM or other object in use problem solution

I file it under “feature, not a bug” category – you are trying to delete some object, say VDOM, which is NOT actually used anywhere, but the Fortigate throws an error command fail. Return code -23. Fortigate keeps reference count of all objects at all…

Continue reading →

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-12356 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) Command Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks…

Continue reading →

Don’t Overlook These Key SSE Components

Learn about the key SSE features to consider outside of the well-established basics. Source link Author: Fortinet Article used for cyber security disclosure.

Continue reading →

Fortinet Support – Tips on opening tickets with their TAC to make them more effective

Table of Contents Introduction There are 2 ways to open a ticket – via phone, and on the web, use both of them, if needed. Have someone NSE 4 certified to open the ticket – gets you straight to the Level 2 Support. Ongoing communication…

Continue reading →

Page 42 of 169 ← First ... 40 41 42 43 44 ... Last →