Fortinet Technical Tips
- von myky_Description This article describes how to create and use IPS custom signatures for specific requirements, such as limiting access based on the rate to the specific website or application. Some […]
- von AnthonyHDescription This article describes how to setup IPSec Dial up VPN to remotely manage the FortiGate. Scope FortiGate, FortiClient. Solution There are three steps involved in this article that provide […]
- von syaoDescription This article describes how to use a VIP object in FortiGate for bidirectional traffic when the requirement involves a specific Phase 2 selector, without needing to use an IP […]
- von mpandyaDescription This article describes the process of setting up an authentication rule for SSL VPN that is restricted to the specific interface. Scope FortiGate. Solution Below is an explanation of […]
- von nalexiouDescription The article describes the message ID in IKE messages during the IPsec negotiation. Scope FortiOS. Solution The message ID is a 32-bit quantity that is included in every IKE […]
- von mrihaDescription This article describes the difference between min-allowed-ssl-version and unsupported-ssl-version that can be found in the firewall ssl-ssh-profile section. Scope FortiGate, FortiProxy. Solution The unsupported SSL version option handles cases, […]
- Technical Tip: Behavior of SDNS Server IP when Anycast is disabled/enabled under FortiGuard Settingsvon anderson_yeeDescription This article describes the behavior of SDNS Server IP when Anycast is disabled/enabled under FortiGuard settings. Scope FortiGate, DNS Filter. Solution SDNS servers are […]
- von jeraDescription This article describes how to enable 2FA authentication for FortiGate administrators from FortiManager. Scope FortiGate and FortiManager 7.4.3. Solution Navigate to Device Manager -> Device & Groups. Select the […]
- von smayankDescription This article describes verifying if the UDP port is unreachable when troubleshooting the Syslog server. Scope FortiGate. Solution Telnet protocol can be used to check TCP connectivity for IP […]
- von ychiaDescription This article describes that when FortiGate running in HA mode, the Current_HWaddr is modified to become the HA virtual MAC address. Permanent_HWaddr is a MAC address that is not […]
Fortinet Firmware Updates
- FortiADC 7.4.5 B0364 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiExtender 7.4.6 B0254 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiClient 7.2.5 B1053 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiMonitorOnSight 7.2.4 B0013 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiClientEMS 7.2.5 B1061 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiClientMac 7.2.5 B0916 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiClientLinux 7.2.5 B0854 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiClient 7.2.5 B1052 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiGuest 1.2.2 B0126 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiAnalyzer-BigData 7.2.8 B0674 and release notes are available for download from the Support site : https://support.fortinet.com
Fortinet Thread Blog
- When the GeoServer vulnerability CVE-2024-36401 emerged, the FortiGuard Labs gathered related intelligence. This blog highlights the threat actors and how they exploit and use the vulnerability.
- FortiGuard Labs has uncovered a fresh threat – Emansrepo stealer, which is distributed via multiple attack chains for months. Learn more.
- The Underground ransomware has victimized companies in various industries since July 2023. It encrypts files without changing the original file extension. Learn more.
- Fortinet’s FortiGuard Labs caught a phishing campaign in the wild with a malicious Excel document attached to the phishing email. Get a deep analysis of the campaign and how it […]
- A technical analysis of the ongoing ValleyRat multi-stage malware campaign's diverse techniques and characteristics.
- Incident response preparation is not optional. Here are ten activities every organization should consider implementing. Read more.
- FortiGuard Lab reveals a malware "PureHVNC", sold on the cybercrime forum, is spreading through a phishing campaign targeting employees via a python multi-stage loader. Learn more.
- The FortiGuard Labs team has identified a malicious PyPI package affecting all platforms where PyPI packages can be installed. This report discusses its potential impacts and emphasizes the importance of […]
- The FortiGuard Labs Threat Research team recently observed a number of social media posts commenting on a fraud campaign targeting India Post users. Learn more.
- According to new FortiGuard Labs analysis, this year’s Olympics has been a target for a growing number of cybercriminals. This report provides a comprehensive view of planned attacks, such as […]
Cert Bund News
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM WebSphere Application Server ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM WebSphere Application Server ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Maximo Asset Management ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libarchive ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein lokaler Angreifer kann mehrere Schwachstellen im Bluetooth Standard ausnutzen, um Dateien zu manipulieren oder Informationen offenzulegen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux (pcs) ausnutzen, um Informationen offenzulegen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in lxml ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein Angreifer kann eine Schwachstelle in libarchive ausnutzen, um beliebigen Programmcode auszuführen.
Microsoft Exchange Team Blog
- von The_Exchange_TeamSince we released the cloud-based Message Recall for Outlook on Windows in April 2023 (see Cloud-based Message Recall in Exchange Online), we’ve continued to work on improvements and enhanced functionality […]
- von The_Exchange_TeamExchange 2016 is approaching the end of extended support and will be out of support on October 14th, 2025. If you are using Exchange Server 2019, you will be able […]
- von The_Exchange_TeamToday, we are excited to announce enhancements to the Outbound Messages in Transit Security report that help you track and optimize the security of your outbound email. To help you […]
- von The_Exchange_TeamWe wanted to demystify the process of syncing and provisioning of various recipient objects in Exchange Online. Some of this content might be already familiar to you but some will […]
- von The_Exchange_TeamWe are thrilled to announce the Public Preview of Inbound SMTP DANE with DNSSEC, a new capability of Exchange Online that enhances the security of email communications by supporting two […]
- von The_Exchange_TeamIn Part 1 of this series, we talked about cross-tenant (sometimes referred to tenant to tenant or T2T) mailbox migrations. In Part 2, we’ll cover how to troubleshoot issues you […]
- von The_Exchange_TeamWe wanted to tell you that an update was published related to the deprecation of Admin Audit Log cmdlets in Microsoft 365. The update was posted on the Security, Compliance, and […]
- von The_Exchange_TeamCross-tenant mailbox migrations are typically used in mergers and acquisitions ('Company A' buys or merges with 'Company B'), divestitures (part of 'Company A' becomes 'Company B'), and rebranding ('Company A' […]
- von The_Exchange_TeamEnhanced Filtering for Connectors (EFC) helps ensure that emails retain their original IP address and sender information when being routed through various services before being routed to Exchange Online by […]
- von ScottSchnollToday, we are providing an update on our product roadmap for Microsoft Exchange Server, and our next milestones in the Exchange Server journey to support the specific needs of our […]
MSXFAQ Newsfeed
- 04. Sep 24 PoPToken – MSGraph erlaubt neben Bearer auch PoPTokens. Was steckt dahinter?
- 03. Sep 24 Migration zu Exchange Server SE – Der ultimative Wegweiser von Exchange 2007-2019 zu Server SE
- 02. Sep 24 Exchange Extension Attributes – Mit dem Exchange Schema kommen 15+30+5 benutzerdefinierte Felder mit, die sie nur eingeschränkt nutzen sollten
- 01. Sep 24 ConvertFrom-Bearertoken – Bearer Tokens per PowerShell decodieren
- 30. Aug 24 SAML und Preauthentication – Kann ein Reverse Proxy/Proxy mit SSL-Inspection auch die Bearer-Authentication prüfen?
- 28. Aug 24 PS Hashtabellen – Keine Tabelle aber ein flotter indexierter Datenspeicher
- 25. Aug 24 LDAP Security – Bewerten sie die Risiken eines LDAP-Servers und nutzen sie z.B. TLS
- 18. Aug 24 Hybrid Router, LTEBoost, MTU, VPN, Speedport – Wenn DSL durch LTE unterstützt wird und VPNs nicht mehr funktionieren.
- 17. Aug 24 SBS Systemhäuser – Wenn Systemhäuser ihre Kunden auf alter Technik belassen, haben sie bald keine Kunden mehr?
- 15. Aug 24 PowerShell Streams – Neben STDIN/STOUT gibt es fünf weitere Streams. Wozu sind die gut und wie nutzt man sie?