Results for techdocs


How do I find out who's on my network?

This is part two of our look at the User layer, which focuses on user authentication. If you missed it, make sure to read part 1 to find about how you can protect your network from your users’ own actions. Also, you can catch up on the entire Layered Security series by either reading my past blog posts or checking out the PDF version, which will be updated to include the User Layer soon. The User Layer: Part 2 Last time we talked about user education, as well as a range of FortiOS security features that you can use to protect...

By Victoria MartinAugust 24, 2015


How Can I Keep Users From Doing Things They Shouldn't?

We've now reached the User layer in our Layered Security series. This article is part one of two, because there's a lot going on with this layer. If you haven’t been following this series, you can catch up by using the link above or by checking out the PDF version, which contains all previous articles.   The User Layer (Part 1) We’ve finally reached the user layer, which in many ways is the most important and also the most difficult. As mentioned before, 80-90% of the threats to your network can come...

By Victoria MartinApril 18, 2015


How Do I Keep Network Devices Secure?

Next up in the Layered Security series is the Device layer. If you haven’t been following this series, you can catch up by either reading my other blog posts (using the link above), or by checking out the PDF version, which contains all articles that have been written up to this point. The Device Layer While wired networks certainly have their own challenges (many of the precautions here are applicable to wired devices), it is wireless that really changed this layer’s landscape. The biggest change that came with wireless...

By Victoria MartinJanuary 28, 2015

Business and Technology

Introducing the FortiGate Cookbook Website

The FortiGate Cookbook website, found at, was launched at the end of 2014. You can now enjoy the Cookbook, and all its step-by-step recipes for using a FortiGate, in a whole new way. If you want to jump right to the website, go right ahead and use the link above. But if you'd like to learn more first, check out the following video website walkthrough:   As you can see in the video, the Cookbook website offers a number of great features to help you accomplish your networking goals, such as: Videos...

By Victoria MartinJanuary 28, 2015

Industry Trends

With Great Power Comes A...Thick Manual?

Actually, at Fortinet it's called a cookbook. And yes, it's pretty thick. I hate manuals. When I put together IKEA furniture, I only break out their cryptic pictogram instructions as a last resort. And when I get new hardware in my hands, the manual only comes out when I break something. Which I tend to do. What good is tinkering if you can’t break something and then fix it, right? So, not surprisingly, I glanced at the quickstart guide when Fortinet sent me a FortiGate 90D-POE NGFW and FortiAP thin access point to test...

By Chris DawsonJanuary 16, 2015


How Do I Protect Against External Attacks?

In this entry of the layered security series, we look at layer 3, the network layer. The network layer Network layer security focuses on external threats that are able to bypass the firewall layer. Your FortiGate has two main features that deal with these threats: the Intrusion Prevention System (IPS) and Denial of Service (DoS) protection. What are IPS and DoS protection? IPS protects your network by actively seeking and blocking external threats before they can reach your network devices. These attacks are able to bypass the firewall because...

By Victoria MartinNovember 21, 2014


How Do I Create a Firewall Policy? (Part 2)

It's time for part two of our look at firewalls, as we continue our series on layered security. The first part can be found here. Firewall Policies: How to Build a Better Policy As networks become more advanced, so do the demands placed upon your firewall. As such, it is equally important to know how to make a firewall policy work, and to make it work well. Improve Your Design Just because a firewall policy works doesn't mean that it's design is perfect. Since firewalls play such a key role in keeping your network secure, it's important to...

By Victoria MartinJuly 11, 2014


How do I secure the DNS Layer?

Now that we've had a look at layered security, it's time to talk about each layer individually to figure out the steps you should take to secure your network. First and foremost is the DNS layer, the first "wall" of security that protects your network from attacks. DNS 101 Domain Name System (DNS) is used like a phonebook to help your computer find websites by translating a domain name to a website's IP address. For example, the domain name is translated to the IP address, which lets your computer successfully...

By Victoria MartinMarch 02, 2014