Fortinet Technical Tips
- von edyrmishiDescription This article describes how, when a RAID-enabled FortiGate joins an existing cluster, the primary unit shuts down automatically with the message 'secondary and primary have different hdisk status, Shutdown […]
- von nweckelDescription This article describes how to prevent ESP error logs from being sent to FortiAnalyzer. Scope FortiGate v7.2.4 or more recent with FortiAnalyzer Logging. Solution From FortiOS v7.2.4, the ESP packet handling […]
- von FortiArtDescription This article describes how to allow Splashtop application traffic to pass through FortiGate. Scope FortiGate. Solution Scenario: Splashtop is a remote desktop application. In cases where there is […]
- von vschmitt_FTNTDescription This article describes the API endpoint to modify the password of local users. The method PUT on existing users will not work to modify the password field. The […]
- von mhemambikaDescription The error message 'Fail to update IPSA driver status!' commonly appears after a scheduled update, particularly when updating to v7.4.6, on devices including the 40F, 60F, 80F, and 100F […]
- von syordanovDescription This article describes how to schedule and disable/enable FortiGate interfaces. Scope FortiOS v6.4, v7.0, v7.2, v7.4, v7.6. Solution Sometimes is needed to do a scheduled disable/enable the interface to […]
- von ybenaichaDescription This article describes that f there is a mix of firewall policies using users and groups, the priority is to check users first then groups for SSL VPN […]
- von nithincsDescription This article describes the role of 'set exact-match' in the access-list rule. Scope FortiGate. Solution In the access-list rule, along with the prefix or wildcard, there is the option […]
- von nithincsDescription This article describes how to set wildcard and prefix options in access-list and call access list in route-map for route advertisement in BGP. Scope FortiGate Solution Access-list is used […]
- von princesDescription This article describes how to create a local DNS database and make FortiGate respond to local DNS queries. Scope FortiGate. Solution In some use cases, users need FortiGate to […]
Fortinet Firmware Updates
- FortiAP 7.6.1 B0941 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiNAC-F 7.6.2 B0715 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiVoice 7.0.6 B0249 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiAnalyzer 7.2.10 B1682 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiManager 7.2.10 B1682 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiOS 7.2.11 B1740 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiWeb 7.4.7 B0685 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiRecorder 7.2.3 B0257 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiDDoS-F 7.0.4 B0746 and release notes are available for download from the Support site : https://support.fortinet.com
- FortiGuest 2.0.0 B0205 and release notes are available for download from the Support site : https://support.fortinet.com
Fortinet Thread Blog
- Explore how FortiSandbox 5.0 detected this malware, the behavioral indicators it leveraged for identification, and Snake Keylogger's technique to evade detection and analysis.
- Get insights into the Lynx ransomware, which is considered the successor to the INC ransomware. This double-extortion ransomware has threatened more than 90 organizations worldwide, including those in the healthcare […]
- FortiGuard Labs reverse engineers a malware’s binaries to look into what the malware is actually doing.
- FortiGuard Labs observes a threat actor using a LNK file to deploy Coyote attacks, unleashing malicious payloads and escalating the risk to financial cybersecurity.
- An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.
- An example of a recent phishing attempt and how to spot the obvious phishing tell-tales.
- Get detailed tactics associated with EC2 Grouper and how Lacework FortiCNAPP can be leveraged to detect this threat.
- FortiGuard Labs recently noticed that attackers still use and deliver two different botnets via D-Link exposing a HNAP interface weakness. Learn more.
- In this FortiGuard analysis, we examine the Python scripts behind two malicious packages, outline their behaviors, and provide insights into their potential impact.
- Fortinet contributes to major INTERPOL and AFRIPOL cybercrime operations arrests of members of cybercrime groups operating across Africa. These individuals specialize in ransomware, digital extortion, online scams, and Business Email […]
Cert Bund News
- Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um seine Privilegien zu erhöhen.
- Ein lokaler Angreifer kann eine Schwachstelle in zlib ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen und einen Denial-of-Service-Zustand zu erzeugen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Gitea ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Golang Go im "x/net/html" Paket ausnutzen, um einen Denial of Service Angriff durchzuführen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuführen und um nicht näher beschriebene Effekte zu erzielen.
- Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder nicht spezifizierte Effekte zu erzeugen.
- Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Grub ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Microsoft Exchange Team Blog
RSS-Fehler: A feed could not be found at `https://techcommunity.microsoft.com/plugins/custom/microsoft/o365/custom-blog-rss?tid=6850040437866647932&board=Exchange&size=25`; the status code is `404` and content-type is `text/html; charset=utf-8`
MSXFAQ Newsfeed
- 17. Feb 25 RemoteMailbox Provisioning – Anlegen von Exchange Online Postfächer per PowerShell mit einem Sonderfall
- 16. Feb 23 Aktuelle Events und Veranstaltungen – Sprecher auf der Infinity 365 in Salzburg (23.-25. Juni 2025) bestätigt.
- 15. Feb 25 DMARC einführen – So sichern Sie in fünf Schritten ihre Domain per DMARC ab
- 13. Feb 25 SSDP – Simple Service Discovery – So sucht Windows nach Geräten in Netzwerk und wie sie selbst scannen können
- 12. Feb 25 DASHOST.EXE und UDP-Sturm – Viele UDP-Pakete auf Port 2222 und 3298. Was steckt dahinter?12. Feb 25 DASHOST.EXE und UDP-Sturm – Viele UDP-Pakete auf Port 2222 und 3298. Was steckt dahinter?
- 11. Feb 25 Exchange mit ADFS – Bye Bye Kerberos, NTLM, Basic, Form und alle über ADFS und SAML? Möglich aber auch sinnvoll?
- 10. Feb 25 Updates für Exchange 2019 – CU15 ist verfügbar, TLS 13. Windows 2025 Support u.a.
- 09. Feb 25 Remigration – Was dabei zu beachten ist – Der Begriff "Remigration" ist 2024/2025 in aller Munde aber was bedeutet er eigentlich?
- 06. Feb 25 Gast-Konto oder Kontakt? – Tenantübergreifende Zusammenarbeit. Der Unterschied zwischen Gast und Kontakte
- 06. Feb 25 ShowinAddressbook und HiddenFromAddressListsEnabled – Objekte in Exchange Online, EntraID u.a. verbergen. richtige und falsche Wege