FortiGate Cloud-22.3-Administration Guide
FortiGate Cloud-22.3-Administration Guide
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change log 6
Introduction 7
Functions 7
Requirements 8
Getting started with FortiGate Cloud 10
License types 13
Feature comparison 14
Upgrading to FortiGate Cloud 2.0 15
New layout (beta) 15
Deployment 18
Inventory 21
FortiDeploy 23
FortiCloud and FortiDeploy keys 25
FortiCloud key 25
FortiDeploy key 26
Network Overview 27
Group management 31
Management 33
Config 34
Managing FortiAP, FortiSwitch, and FortiExtender devices 35
Backup 38
Upgrade 40
Script 41
Manage Scripts 43
Analysis 44
FortiView 44
FortiView charts reference 47
Monitor 49
Logs from FortiGate 49
Logview 50
Event Management 52
Reports 53
Reports reference 53
Report configurations 56
SandBox 58
Dashboard 59
Files and On-Demand Records 59
Setting 60
Accounts and users 61
Creating an account 61
User management 61
2022-07-13 Initial release. See What's new for a list of enhancements for this release.
FortiGate Cloud is a cloud-based software-as-a-service offering a range of management, reporting, and analytics for
FortiGate next generation firewalls. FortiGate Cloud simplifies the initial deployment, setup, and ongoing management of
FortiGate with SD-WAN functions, FortiSwitch, FortiAP, and FortiExtender with zero-touch provisioning, providing you
with visibility of your entire deployment. FortiGate Cloud grows with your requirements from a single FortiGate to a
complete managed security services management solution for thousands of devices across multiple customers. With
FortiGate Cloud, you can do the following:
l Manage FortiGate and FortiWifi devices, including configuration, backup, firmware upgrade, and running scripts
l Use Remote Access to easily connect to a device without physical connection
l Run full web, event, and traffic analysis on your FortiGates
l Review different types of past-date logs from your FortiGates
l Create, schedule, and customize a full range of reports
l Receive email alerts on device and network events as configured
To add subaccounts and subaccount users under your primary account, you can upgrade your regular account to a
multitenancy account. See Multitenancy on page 68.
FortiGate Cloud also integrates other Fortinet services: Cloud Sandbox and FortiDeploy. See SandBox on page 58 and
FortiDeploy on page 23.
For information about FortiGate Cloud new features, see the FortiGate Cloud Release Notes.
Functions
Function Description
Function Description
FortiView log viewer Real-time log viewing with filters and download capability.
Drilldown analysis Real-time location, user, and network activity analysis, and alert profiles.
Report generator Create custom report templates and schedule reports in different formats to
display location-based analytics or illustrate network usage platforms.
Device management Scheduled configuration backup and history and script management.
If using multitenancy license, includes group management.
Antivirus (AV) submission Shows the status of suspicious files undergoing cloud-based sandbox analysis.
Remote access Access device configuration from web browser, modify configuration, and push
changes through to device through the network.
FortiGate virtual domain (VDOM) Support for VDOMs configured in FortiGate devices.
support
Firmware upgrade Remotely upgrade FortiOS on FortiGate devices and FortiAP, FortiSwitch, and
FortiExtender devices connected to the FortiGate.
Event management Set up email alerts for specific network structure emergencies, such as FortiGate
Cloud losing connection to the device, or the device's power supply failing.
Regions Datacenters located in Canada, Germany, and Japan for better performance and
GDPR compliance for international customers.
FortiGate Cloud includes the Global, Europe, and Japan regions.
FortiGate Cloud Sandbox includes the Global, Europe, U.S., and Japan regions.
Requirements
The following items are required before you can initialize FortiGate Cloud:
Requirement Description
FortiCloud account Create a FortiCloud account if you do not have one. Launching FortiGate Cloud requires a
FortiCloud account. A primary FortiCloud account can invite other users to launch FortiGate
Cloud as secondary administrator/regular users. Some customers may be using their
FortiCloud or FortiCare account. Merging these accounts to your FortiCloud account is
strongly recommended.
Internet access You must have Internet access to create a FortiGate Cloud instance and to enable devices to
communicate with and periodically send logs to FortiGate Cloud.
The following summarizes the FortiGate models and FortiOS versions that different FortiGate Cloud features support:
FortiGate Cloud supports all high-end, mid-range, and entry-level FortiGate models. You can find more information
about FortiGate models and specifications on the Fortinet website. All FortiWifi models support FortiGate Cloud.
The following table lists port numbers that outbound traffic requires. On request, Fortinet can supply the destination IP
addresses to add to an outbound policy, if required.
After activating your FortiCloud SSO account and ensuring that you have met all requirements in Requirements on page
8, go to one of the following to access FortiGate Cloud:
Region URL
Global https://forticloud.com
Europe https://europe.forticloud.com
When you initially log in to the FortiGate Cloud portal, the login page displays. The login page displays all accounts that
you have access to. The page lists regions that each account can access. You can also search for an account using the
serial number of a FortiGate deployed on that account. Click the Access link beside the desired account.
If the FortiGate Cloud account does not have a FortiCloud ID or does not exist in FortiCare, FortiGate Cloud displays a
registration dialog when you log in to the account. After you enter all required information and click Register, the account
is registered to FortiCare.
After you access the desired account, the FortiGate Cloud portal displays the Network Overview page. You can access
notifications regarding maintenance, multitenancy expiration, and unregistered devices from the FortiCloud banner at
the top of the page. You can access FortiGate Cloud documentation from the ? icon on the lower banner.
The Network Overview page displays the list of devices that are currently deployed to FortiGate Cloud. From the left
pane, you can access other options including scripts, reporting, and account settings features.
The following describes the portal options available from the left pane:
Option Description
Network Overview Network Overview displays a list of devices that are currently deployed to
FortiGate Cloud. For details on actions available in Network Overview, see
Network Overview on page 27.
Management Manage Scripts: Create script files to check device status or get bulk configuration
information quickly. See Manage Scripts on page 43.
Report Create and alter report configurations and their settings. These report
configurations are available for all deployed devices. See Report configurations
on page 56.
Inventory View a centralized inventory of all FortiGate and FortiWifi devices from all
FortiGate Cloud instances in a domain group, regardless of datacenter. See
Inventory on page 21.
Account Setting Add and manage FortiGate Cloud administrator accounts. See Account Setting
on page 64.
Add FortiGate Add a FortiGate or FortiWiFi device to FortiGate Cloud using a FortiCloud key.
See To deploy a FortiGate/FortiWifi to FortiGate Cloud using the FortiCloud key:
on page 18.
FortiGate Cloud also provides the device-specific Analysis, SandBox, and Management modules. To access Analysis,
SandBox, and Management, select the desired device in Network Overview, then click the desired link.
Option Description
Analysis Monitor and log your device's traffic for centralized oversight of traffic and security
events. See Analysis on page 44
SandBox Upload and analyze files that FortiGate AV marks as suspicious to Cloud
Sandbox. See SandBox on page 58.
Management Remotely manage FortiGate and FortiWiFi devices that are connected to the
FortiGate Cloud service. See Management on page 33.
For details on remotely accessing a device, see To remotely access a device: on
page 33.
You do not need a support contract to enable the service. However, you must register each
device on the Fortinet Support site. You cannot enable FortiGate Cloud (free or subscribed)
without registering each device in your network.
You can enjoy the free subscription of FortiGate Cloud on any FortiGate or FortiWifi device, or purchase an annual-
subscription-based license with a one-, two-, or three-year service term. A FortiGate Cloud license entitles devices to
advanced features including the IOC service, as well as one-year log retention compared to the seven-day log retention
with the free subscription. With the SandBox feature, a device can upload up to 100 suspicious files/URLs per day to
Cloud Sandbox through FortiGate Cloud without a Cloud Sandbox license. You can increase the daily limit by adding a
Cloud Sandbox service license.
To activate FortiGate Cloud, you must acquire a subscription license based on the SKUs listed in the following table:
Description SKU
Other services
For the IOC license, activation on device requires FortiOS 5.4.2 or later. The IOC service requires an existing FortiGate
Cloud subscription.
You must purchase a subscription for each FortiGate in a high availability (HA) cluster. FortiGate Cloud handles each
device separately regardless of configuration. FortiGate Cloud accepts inbound logs from each device independently
and cannot detect whether connected devices are in an HA cluster. Though multiple HA clustered devices theoretically
send identical logs to FortiGate Cloud, if one device stops logging or cannot reach FortiGate Cloud, the other devices do
not send logs on its behalf.
The Cloud Sandbox feature has paid and free tiers. For devices with a paid Cloud Sandbox license, FortiGate Cloud
supports 365 days of records and file submission limits, based on the model. For the free tier, FortiGate Cloud supports
limited file submissions (100 per day/2 per minute) and up to seven days of records for FortiGates running FortiOS 6.2
and earlier versions.
For pricing information, contact your Fortinet partner or reseller.
Feature comparison
FortiGate Cloud offers a different feature set depending on whether or not the device has a paid subscription. The
following chart shows the features available for FortiGate Cloud for these scenarios:
Management No Yes
Scripts No Yes
Multitenancy No No
To enable multitenancy, you must use a multitenancy account. The multitenancy account supports all features included
in the table. For devices without a paid subscription, the multitenancy account supports three configuration deployments.
* As the Management tab is disabled for devices without paid subscriptions under regular accounts, you can access
backup and firmware upgrade options for these devices using the Config icon in Network Overview. See Backup on
page 38 and Upgrade on page 40 for descriptions of these options.
A new FortiGate Cloud 2.0 is available to upgrade your FortiGate Cloud environment to. The FortiGate Cloud 2.0
provides the following features:
l New centralized dashboard
l Enhanced user experience with a new modern theme and smoother performance
l Full real-time FortiOS configuration management and log analysis for paid tier devices
l Centralized logging, analytics, and reports powered by FortiAnalyzer Cloud
l Read-only configuration view for free tier devices
1. Add FortiGates with a FortiGate Cloud subscription (FortiGate Cloud Management, Analysis, and 1 Year Log
Retention) to your FortiCloud account.
2. Upgrade all FortiGates with a subscription to FortiOS 7.0.2 or a later version. FortiGate Cloud 2.0 allows FortiGates
without a subscription to have any version of FortiOS installed.
3. Log in to your FortiGate Cloud environment.
4. The portal displays an upgrade dialog. Read and select the acknowledgment checkboxes, then click Proceed with
Upgrade. The dialog only displays for the first user who logs in to an account that is eligible for upgrade. If you do not
see the upgrade dialog, click the Upgrade button in the upper right corner. The upgrade typically takes five minutes.
If the upgrade cannot complete after 30 minutes, it times out and you can restart the upgrade procedure.
FortiGate Cloud 2.0 does not support multitenancy-enabled accounts.
See the FortiGate Cloud 2.0 Administration Guide for details on FortiGate Cloud 2.0.
FortiGate Cloud 22.3.b introduces a new layout. This layout is currently in beta. You can switch between the new beta
layout and the old layout by using the New Layout (Beta) toggle on the top banner.
Area Description
Dashboard Presents general information of the supported Fortinet products in list or map
view.
Inventory Import a new product key and view and manage account assets.
Configuration Create and edit a report configuration, and add and edit a script.
You can drill down on a device from Dashboard in one of the following ways:
l Double-click the device serial number.
l Click FortiGateCloud in the top left corner to expand the device list, then select the device.
The following describes how to access the key FortiGate Cloud functions for the device with the new beta layout. You
can view summary widgets on the FortiView summary page. Analysis features include FortiView, monitor, log view,
event management, and reports.
Management features are available to FortiGates with a FortiCloud Service subscription. Clicking Management opens a
new browser tab for management features.
You can deploy FortiGate Cloud using one of the following methods:
l FortiCloud key
l FortiDeploy bulk key
l FortiOS GUI
After deploying FortiGate Cloud using one of the methods described, complete basic configuration by doing the
following:
1. Create a firewall policy with logging enabled. Configure log uploading if necessary.
2. Log in to FortiGate Cloud using your FortiCloud account.
For FortiGates that are part of a high availability (HA) pair, you must activate FortiGate Cloud
on the primary FortiGate. Activate FortiGate Cloud on the primary FortiGate as To deploy a
FortiGate/FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 19 describes. FortiGate
Cloud activation on the primary FortiGate activates FortiGate Cloud on the secondary
FortiGate. Local FortiGate Cloud activation on the secondary FortiGate will fail.
After the device is successfully deployed, the device key becomes invalid. You can only
use the key once to deploy a device.
To deploy multiple FortiGate/FortiWifi devices to FortiGate Cloud using a FortiDeploy bulk key:
1. In the FortiCloud portal, ensure that you have a product entitlement for FortiGate Cloud for the desired FortiGate or
FortiWifi.
2. In FortiOS, do one of the following:
a. Go to Security Fabric > Settings, and enable Central Management. Click FortiGate Cloud.
b. In the Dashboard, in the FortiGate Cloud widget, the Status displays as Not Activated. Click Not Activated.
3. Click the Activate button.
4. In the Activate FortiGate Cloud panel, for Account, select FortinetOne.
5. In the Email and Password fields, enter the email address and password associated with the FortiCloud account.
7. This should have automatically enabled Cloud Logging. Ensure that Cloud Logging was enabled. If it was not
enabled, enable it, then set Type to FortiGate Cloud.
8. At this point you can access Analysis and SandBox features for this device. To access Management features, you
must authorize the FortiGate in FortiGate Cloud by entering the a local superadministrator username and password
when prompted. After authorization, you can manage that FortiGate from FortiGate Cloud.
9. You must set the central management setting to FortiCloud, as this is the initial requirement for enabling device
management features.
You can disconnect your account from the dashboard in your FortiGate/FortiWifi.
1. In the FortiOS Dashboard FortiGate Cloud widget, the Status appears as Activated. Click Activated, then click the
Logout button.
2. In the confirmation dialog, click OK. This detaches the FortiGate/FortiWifi from the account and stops uploading
logs.
To move a FortiGate/FortiWifi that is already deployed to FortiGate Cloud to another account and retain its historical
data, you must follow these instructions.
1. Log in to the FortiGate Cloud portal using the account that the FortiGate/FortiWifi is currently deployed on.
2. Click the Config icon for the desired device.
3. Click Migrate Existing Data.
4. In the Account ID field of the Migrate Existing Data dialog, enter the desired new account. Click Submit.
5. In FortiOS, go to Security Fabric > Settings. Log out of the FortiGate Cloud account that the FortiGate/FortiWifi is
currently deployed on.
6. Deploy the device to FortiGate Cloud using the new account by following the instructions for To deploy a
FortiGate/FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 19.
After moving a FortiGate to another FortiGate Cloud account, you must also transfer that FortiGate to the same account
in FortiCare.
Inventory
Inventory displays a centralized inventory of all FortiGate and FortiWifi devices from all FortiGate Cloud instances in a
domain group, regardless of region. For example, if you are accessing Inventory from the European region, you see the
region of a connected FortiGate Cloud instance from the global region.
Inventory is divided into tabs: FortiGate Inventory, FortiCare Inventory, FortiGate Cloud Deployed, and FortiManager
Deployed. You can filter each list by searching for the device serial number in the SN searchbar.
If you have added devices using the FortiDeploy bulk key, the FortiGate Inventory, FortiGate Cloud Deployed, and
FortiManager Deployed tabs allow you to filter the device list by the FortiDeploy bulk key, and display a Bulk Key column
in the device list.
FortiGate Inventory
FortiGate Inventory displays the inventory of all FortiGate and FortiWifi devices imported by FortiCloud key or
FortiDeploy bulk key to FortiGate Cloud, including each device's subscription status. The inventory provides a
centralized view of all devices imported into the Europe and global services. From here, you can deploy devices to
FortiGate Cloud or FortiManager, if configured. You can also delete an imported device from the inventory.
7. Go to FortiManager Deployed. The Status column displays the current status of the deployment process. Once the
Status column displays that the process is complete, these devices are deployed to FortiManager, and you can view
their serial numbers on the FortiManager Deployed tab. Once deployed to FortiManager, FortiGate Cloud has no
control over the device. You cannot manage the device in FortiGate Cloud until you set central management back to
FortiGate Cloud.
FortiCare Inventory
FortiCare Inventory displays the devices that are registered to FortiCare under the account's primary administrator email
address with a verified key. Only the primary administrator can view and deploy these devices from the FortiCare
Inventory to FortiGate Cloud. To deploy FortiCare devices to FortiGate Cloud, follow the instructions described in To
deploy a device to FortiGate Cloud: on page 21, from the FortiCare Inventory tab. To deploy FortiCare devices to
FortiManager, follow the instructions described in To deploy a device to FortiManager: on page 21 from the FortiCare
Inventory tab.
The FortiGate Cloud Deployed and FortiManager Deployed tabs displays all FortiGate and FortiWifi devices deployed to
FortiGate Cloud and FortiManager, respectively. The tabs also display the devices' subscription statuses and the date
and time that they were deployed to FortiGate Cloud or FortiManager. Click a device serial number to access Analysis,
Management, and SandBox functions for that device.
The FortiGate Inventory tab provides a centralized view of all devices imported into the Europe and global services.
However, after you deploy a FortiGate to FortiGate Cloud, you can only view the FortiGates deployed to the service that
you are currently logged in to on the FortiGate Cloud Deployed tab. For example, if you are currently logged in to the
Europe service, the FortiGate Cloud Deployed tab only displays FortiGates deployed to the FortiGate Cloud Europe
service.
FortiDeploy is a product built into FortiGate Cloud for zero-touch provisioning when devices are deployed locally or
remotely. FortiDeploy provides automatic connection of FortiGates to be managed by FortiGate Cloud or a
FortiManager.
At time of purchase, you can order a FortiDeploy SKU in addition to your FortiGate Cloud subscription.
When you visit the FortiGate Cloud portal and enter the FortiDeploy bulk key, you see a list of serial numbers from the
order that contained the FortiDeploy SKU. After you confirm that the devices are connected, you can perform basic
configuration on the devices remotely, such as sending a FortiManager IP address to all remote FortiGates, so that the
FortiManager can manage them remotely.
FortiDeploy support starts the moment you send an email to [email protected]. You can also contact [email protected] if
you have already purchased a FortiGate Cloud subscription and want to purchase FortiDeploy to add to your existing
subscription.
FortiDeploy requires a FortiGate model that supports the zero-touch provisioning (autojoin) feature.
FortiGate/FortiWiFi/POE desktop and 1U models up to 100F support the zero touch provisioning feature. For other
models, FortiDeploy supports one-touch provisioning. For these models, you must configure DHCP on the port of
choice. The FortiDeploy server can push FortiManager settings to devices that fulfill this requirement. It is recommended
for trained personnel to handle larger deployments. FortiDeploy is available for devices running FortiOS 5.2.2 and later.
From FortiOS 5.2.3 and later, the auto-join-forticloud option is enabled by default. It must be enabled for
FortiDeploy to function correctly. You can ensure that the option is enabled by running the following commands:
config system fortiguard
set auto-join-forticloud enable
end
After changing this setting, restart the device and ensure that the device is sending traffic to FortiGate Cloud to verify that
you have configured it correctly.
If your device is connected to FortiGate Cloud but not cloud-managed, ensure that central management is set to
FortiGuard:
config system central-management
set type fortiguard
end
Reboot the device, log into FortiGate Cloud, and see if you can manage the device.
The default address of the internal or LAN interface is the 192.168.1.0/24 subnet. IP conflicts can occur with
departmentalization devices. You can unset each device's default IP address:
config system interface
edit internal
You can change the web-based management interface's internal interface IP address in Network > Interfaces.
The following table summarizes the differences between FortiCloud and FortiDeploy key usage:
FortiCloud key
A FortiCloud key is printed on a sticker attached to the top surface of a FortiGate/FortiWiFi. You can use this key for one
of the following:
l Directly add a new individual device to a FortiGate Cloud account.
l Import the key to a FortiGate Cloud account inventory.
See To deploy a FortiGate/FortiWifi to FortiGate Cloud using the FortiCloud key: on page 18
Either action allows the next autojoin request from the device. After the device successfully connects to FortiGate Cloud,
its FortiCloud key becomes invalid.
FortiDeploy key
A FortiDeploy key is purchased with a SKU to load one or multiple new FortiGate/FortiWiFi(s) to a FortiGate Cloud
account inventory. See To deploy multiple FortiGate/FortiWifi devices to FortiGate Cloud using a FortiDeploy bulk key:
on page 19. This load action allows autojoin requests from all devices on the FortiDeploy key. Once you use a
FortiDeploy key to load devices to a FortiGate Cloud account, you cannot reuse it to reload the devices. Autojoin is
always allowed for a device added by FortiDeploy key.
You see the Network Overview page when you first open the FortiGate Cloud interface. From the Network Overview
page, you can add a FortiGate as described in To deploy a FortiGate/FortiWifi to FortiGate Cloud using the FortiCloud
key: on page 18. A user with an admin role can also go to the Inventory on page 21 pages or the device-specific Analysis
on page 44, Management on page 33, SandBox on page 58 pages. A user with a regular role or subaccount admin role
(multitenancy) can only go to the Analysis on page 44 and SandBox on page 58 pages. You can view the device CPU
and memory usage under the Status column.
The Network Overview page provides the following information about devices. You can select a device's serial number
or name to access analysis tools for that device. Network Overview displays the following device information in both list
and map views. To configure which information to be visible in list view, click Customize Columns.
l Model/serial number
l Fortinet product type
l Firmware version
l Status (If the device is connected through a management tunnel)
l SD-WAN status
l Last compiled report and last log uploaded
l Subscription expiry date
l DHCP clients
l In/out traffic
l Indicators of compromise
l Configuration status
l Public IP address
l Subaccount
l Last time a configuraiton backup was created
l For devices that are paired in a high availability configuration, a peer icon appears beside the serial number. You
You can download a .csv file of device information by clicking the Export button.
You can select Map View to view the device list as a map. This allows you to see the geographic location of the deployed
devices. You can also place a device at a desired location on the map that does not need to correspond to the device's
actual geographic location. You can also view the map in satellite view.
You can toggle on Show FortiManager Deployed to view devices deployed to FortiManager. You can then click on a
displayed device to access its Sandbox page.
To access devices deployed to another region, click the Devices in Other Regions icon in the upper right corner.
FortiGate Cloud displays a dialog with a list of devices deployed in other regions.
1. Go to Network Overview.
2. Click the Config icon for the desired device.
3. Click Undeploy.
4. In the confirmation dialog, click YES.
5. You have the option to place a unit where the FortiGate was deployed. The unit contains historical data and a serial
number that starts with U.
An admin user can undeploy a device from one service, then deploy it from another service. For example, an admin user
can undeploy a device from the global service, then deploy the same device to the Europe service.
The device may automatically join back to the account due to the autojoin feature. See FortiCloud and FortiDeploy keys
on page 25.
You can use this function to transfer historical data to an authorized new account when moving the device to that
account.
1. Click the Config icon for the desired device.
2. Click Migrate Existing Data.
3. In the Account ID field, enter the desired account ID.
4. Click Submit.
The display timezone only affects log data view for the FortiGate and does not affect the FortiGate's configured
timezone. You can modify the FortiGate's display timezone after it has already been set.
1. Go to Network Overview.
2. Click the Config icon beside the desired device, then click Display Timezone.
3. From the Display Timezone for Device dropdown list, select the desired timezone. Click Submit. The FortiGate
Cloud GUI shows the FortiGate's display timezone in the upper right corner.
1. Go to Network Overview.
2. Click the Config icon for the desired device, then click Rename.
3. In the Device Name field, enter the desired name. Click Submit.
You can move a FortiGate from the global service to the Europe service, or vice-versa. The example illustrates moving a
FortiGate Cloud from the global service to the Europe service.
1. Log in to the FortiGate Cloud global service.
2. Undeploy the FortiGate:
a. Click the Config icon for the desired device.
b. Click Undeploy.
c. In the confirmation dialog, click YES.
d. You have the option to place a unit where the FortiGate was deployed. The unit contains historical data and a
serial number that starts with U.
An admin user can undeploy a device from one service, then deploy it from another service. For example, an admin
user can undeploy a device from the global service, then deploy the same device to the Europe service.
After a device under a non-multitenancy account is undeployed, the device cannot automatically join back to any
account due to the autojoin feature being disabled, even after an admin user deploys the device to another service.
You must reactivate FortiGate Cloud on the device GUI using your account email address and password.
3. Go to Inventory and confirm that the FortiGate is now listed under inventory.
4. Log in to the FortiGate Cloud Europe service.
5. Go to Inventory. Select the desired FortiGate, then click Deploy to FortiGate Cloud.
6. Log in to the FortiOS GUI. Reactivate FortiGate Cloud by following To deploy a FortiGate/FortiWifi to FortiGate
Cloud in the FortiOS GUI: on page 19.
As the Management tab is disabled for devices without paid subscriptions under regular
accounts, you can access backup and firmware upgrade options for these devices using the
Config icon in Network Overview. See Backup on page 38 and Upgrade on page 40 for
descriptions of these options.
Group management
When you select multiple devices on the Network Overview page, you can perform group management actions. You can
apply actions to a group of FortiGate and FortiWifi devices, simplifying administrative tasks. If you only select paid
devices, the dropdown list displays all available actions. If your selection includes a free device, only the Schedule
Report and Set Display Time Zone options are available. Some group management actions require that you enable
management on the selected device. See Management on page 33.
Some actions are not unique to group management and are described elsewhere in this document in the context of use
on a single device. For descriptions of these functions, see the following topics:
On the Management tab, you can remotely manage FortiGate and FortiWiFi devices that are connected to the FortiGate
Cloud service.
To access the Management tab, select the desired device in Network Overview, then click Management.
When you access the Management tab for a new or newly factory reset device with no password configured, you must
configure the device admin password to access the Management interface.
The template feature is discontinued, except for accounts that have a paid device license and template already in use.
Remote access is only available for a device that has Management enabled and the management tunnel is up.
1. Click the Remote Access icon for the desired device.
2. Enter the username and password of a user with super_admin profile.
3. FortiGate Cloud displays a popup where you can provide the FortiGate web GUI port. The popup is prepopulated
with the default values of 443 or the last updated port number from the device. If the port value in the popup is
correct, click OK to remotely access the FortiGate. Otherwise, enter the correct value in the popup to remotely
access the FortiGate from FortiGate Cloud.
4. Click OK.
5. A login page pops up for the user to enter the local username and password. A user with a prof_admin profile is
allowed to remotely access a virtual domain (VDOM)-enabled device only if the user profile has access to the
management VDOM.
You must first enable the management tunnel on your device before you can see any management functions. On the
device, run the following CLI commands:
config system central-management
set mode backup
set type fortiguard
end
Config
In Config, you can access a pared-down version of the remote device's management interface to configure major
features as if you were accessing the device itself. For descriptions of the configuration options, see the FortiOS
documentation.
The configuration you see in FortiGate Cloud does not autorefresh. FortiGate Cloud displays a notification if the current
local FortiGate configuration differs from the latest configuration uploaded to FortiGate Cloud. You can overwrite the
FortiGate Cloud configuration with the current local FortiGate configuration by clicking Import, or merge the two
configurations by clicking Merge. If you are merging the configurations and there is a conflict between them (for example,
an option is enabled locally on the FortiGate but disabled in FortiGate Cloud), FortiGate Cloud keeps the local FortiGate
Cloud configuration for that option. You can then make any changes you want to reflect on the device and click Deploy to
push the configuration to the device.
In the case that your device configuration version does not match the firmware version, FortiGate Cloud may display a
Device config version does not match device firmware version message. You can click the Import button to synchronize
the configurations.
FortiGate Cloud also supports CLI configuration using FortiExplorer over websocket with FortiOS 6.4.1 and later
versions.
FortiGate Cloud supports configuring and deploying SD-WAN for FortiOS 5.6, 6.0, and 6.2, and SD-WAN zones for 6.4.
8. Wait for the configuration to download to the device. When it completes, a deployment log appears, showing you the
changes as they appear in the CLI.
You can use FortiGate Cloud to manage FortiAP, FortiSwitch, and FortiExtender devices that are connected to a
FortiGate deployed to FortiGate Cloud. If these devices are already connected to the FortiGate when the FortiGate
connects to FortiGate Cloud, and FortiGate Cloud creates the FortiSwitch and FortiExtender profiles based on their
uploaded configurations, while the FortiAP profile is predefined. If these devices are not already connected to FortiGate,
you can preauthorize them by adding their serial number and selecting a predefined profile.
Managing FortiAPs
1. (Optional) Create an SSID by going to Management > Config > FortiAP > SSIDs. Creating an SSID is only
necessary if a radio on the FortiAP profile is configured to use a manual SSID.
2. (Optional) Create a FortiAP profile by going to Management > Config > FortiAP > FortiAP Profiles. You can also use
the default profile instead of creating a new profile. To configure the SSID that you created, select Manual for
SSIDs, then select the SSID from the dialog.
3. Create the managed FortiAP:
a. Go to Management > Config > FortiAP > Managed APs.
b. Select Create New > Managed APs.
c. Configure the FortiAP as desired, then click Save.
4. The new managed FortiAP displays in Management > Config > FortiAP > Managed APs. Deploy the configuration to
the FortiGates.
Managing FortiSwitches
1. Create a FortiSwitch profile by going to Management > Config > FortiSwitch > FortiSwitch Profile, then clicking
Create New.
2. Create the managed FortiSwitch:
a. Go to Management > Config > FortiSwitch > Managed FortiSwitches.
b. Select Create New.
c. Configure the FortiSwitch as desired, then click Save.
3. The new managed FortiSwitch displays in Management > Config > FortiSwitch > Managed FortiSwitches. Deploy
the configuration to the FortiGates.
Managing FortiExtenders
1. Create a FortiExtender interface by going to Management > Config > Network > Interfaces, then clicking Create
New > FortiExtender.
2. Create a FortiExtender profile by going to Management > Config > FortiExtender > FortiExtender Profiles, then
clicking Create New.
3. Create the FortiExtender:
a. Go to Management > Config > FortiExtender.
b. Select Create New.
c. From the FortiExtender Profiles dropdown list, select the profile that you configured in step 2. Configure other
fields as desired, then click Save.
4. The new managed FortiSwitch displays in Management > Config > FortiSwitch > Managed FortiSwitches. Deploy
the configuration to the FortiGates.
1. Create a FortiExtender interface by going to Management > Config > Network > Interfaces, then clicking Create
New > FortiExtender.
2. Create a FortiExtender profile by going to Management > Config > FortiExtender > FortiExtender Profiles, then
clicking Create New.
3. Go to Management > Config > FortiExtender.
4. Select the newly joined FortiSwitch, then select Edit.
5. From the FortiExtender Profiles dropdown list, select the profile that you configured in step 2. Edit other fields as
desired, then click Save.
Backup
In Backup, you can back up, Edit, View, Compare (to other revisions), Download, Restore (to device), and Delete
revisions. You can filter the revision list by firmware version or created time. You can also search for a specific backup.
You cannot restore backups for FortiGates that are running FortiOS 6.2.3.
Option Description
3. Click Apply.
Upgrade
In Upgrade, you can see the current firmware version installed on the device, and update to newer stable versions if they
are available. The upgrade path that FortiGate Cloud displays may differ from the upgrade path that FortiGuard displays.
1. Go to Management > Config > FortiAP > Managed APs, > FortiSwitch > Managed FortiSwitches, or FortiExtender >
FortiExtender.
2. For the desired device, click Upgrade.
3. In the Upgrade dialog, select Upload.
4. Click Choose File.
5. Browse to and upload the desired firmware file.
Script
In Script, you can create and run script files on connected remote devices to check device status or get bulk
configuration information quickly.
3. For the desired script, click the Deploy icon, and select a time to automatically deploy the script to the device.
4. To cancel the scheduled run, click the Cancel icon next to the scheduled time.
5. FortiGate Cloud records that script's output. You can read it by clicking View Result.
Manage Scripts
In Manage Scripts, you can create script files to check device status or get bulk configuration information quickly.
To add a script:
The Analysis tab provide tools for monitoring and logging your device's traffic, providing you centralized oversight of
traffic and security events.
To access the Analysis tab, select the desired device in Network Overview, then click Analysis.
FortiView
The default FortiView page is the summary view, which uses widgets to show a general overview of what is happening
with your device. You can add new widgets by selecting Add Widget.
Each widget is a customizable box, showing certain information about the device. You can do the following with widgets:
l Click a widget title and drag it to move it around.
l Delete a widget by selecting the X icon.
l Set the refresh rate of widgets by selecting the dropdown list beside the refresh icon.
Threats
Top Threats Displays which threats trigger the most At least one of the following: IPS, AV,
detection events on the network. AntiSpam, DLP, or Anomaly
Detection.
Top Applications by Threat Score Compares which applications have the Application Control
most traffic compared to their threat
score, based on the device's
Application Control settings.
Top DLP By Rules Counts the DLP events that the device DLP
detects, sorted by DLP rule.
Traffic Analysis
Websites
Top Web Categories Compares which web filtering categories Web Filtering
are most frequently used, based on the
device's Web Filtering settings.
Top Users/IP by Browsing Time in Compares which users visit which IP Web Filtering
Seconds addresses most frequently in the
greatest ratio. You can click a user to
see which IP addresses they visit.
DNS
FortiView offers log information, reformatted into easily navigable charts, in a style similar to FortiView in FortiOS.
You can select a time period to view data for:
l Last 60 minutes
l Last 24 hours
l Last 7 days
l Last 30 days
l Specified time period
You can set the chart's refresh rate by clicking the Refresh icon. By using the Add Filter dropdown list, you can filter the
chart by various factors. Individual chart entries may also allow you to filter by that entry's data by selecting a filter icon on
the right, or drill down to see all related log data, such as all log data through that interface.
User Dashboard
The User Dashboard displays the number of users/entities that fit into the following security categories:
l Visited high risk websites
l Infected by malware
l Targeted by malware
l Targeted by spam
l Violated data leak rules
l Used high-risk applications
l Targeted by attacks
l Attacked by protocol intrusion
You can click each category to view the list of users/entities affected. You can drill down further to view the list of
incidents for each user/entity and the logs for each incident.
FSBP Dashboard
The FSBP Dashboard displays security rating results for the device, in the following categories:
l Overall Score
l Maturity Milestones
l Top Achievement
l Top Todo
l History Trend
The FSBP Dashboard is only available for devices that support the Security Rating feature.
Threats
Chart Description
Chart Description
l Malicious web sites detected by web filtering.
l Malware/botnets detected by antivirus.
Traffic Analysis
Chart Description
Application Displays the top applications used on the network including the application name,
category, bandwidth (sent/received), sessions, and risk level.
Cloud Application Displays the top cloud applications used on the network.
Source Displays the highest network traffic by source IP address and name, bandwidth
(sent/received), sessions, and risk level.
User Displays the highest network traffic by user in terms of bandwidth sent/received,
sessions, and risk level.
Destination Displays the highest network traffic by destination IP addresses, the applications
used to access the destination, bandwith sent/received, sessions, and risk level.
Policy Hits Lists the policy hits by policy, device name, VDOM, number of hits, bytes, and last
used time and date.
Website
Chart Description
Website Displays the top allowed and blocked website domains on the network. You can
also view by source. You can filter by threat level.
Web Category Displays the top website categories. You can filter by threat level.
Chart Description
Browsing User/IP Displays the top web-browsing users and their IP addresses by total browsing
time duration. You can also view by category or domain. You can filter by threat
level.
System Events
Chart Description
System Activity Displays events on the managed devices, their severity, and number of incidents.
You can filter by user or severity level.
Admin Session Displays the users who logged into managed devices, the number of
configuration changes they performed, number of admin sessions, and their total
duration of logged-in time. You can also view by login interface. You can filter by
severity level.
Failed Login Displays the users who failed to log into managed devices. You can also view by
login interface. You can filter by severity level.
VPN Events
Chart Description
Site to Site Displays the names of VPN tunnels with IPsec that are accessing the network.
SSL and Dialup Displays the users who are accessing the network by using an SSL or IPsec VPN
tunnel.
Failed VPN Login Displays the users who failed to log in successfully via VPN.
Monitor
Logs from FortiGate
The Logs from FortiGate chart displays the daily amount of logs that FortiGate Cloud has received from the FortiGate for
the past seven days. For each day of data, the chart also displays the type of logs that FortiGate Cloud has received,
such as traffic, antivirus, and so on.
Logview
Logview offers more detailed log information, access to individual log data, and downloadable log files. You can select a
category of logs to view from the list on the left.
You can select a time period to view data for. You can view log data older than seven days only for devices that have a
FortiGate Cloud subscription. For devices with a free subscription, FortiGate Cloud grays out any dates beyond a seven-
day period:
l Last 60 minutes
l Last 24 hours
l Last 7 days
l Last 30 days
l Specified time period
The Time column displays the raw log time, which may not correspond to the display time zone that you configured for
FortiGate Cloud. To convert the raw log time to the FortiGate Cloud display time zone, add or subtract the time offset
provided in the Time column. In the example above, log 1 was recorded at 03:10:56. The (-0700) in the Time column
shows the time difference between the raw log time and Greenwich mean time. Since in the example, the display time
zone is the same as Greenwich mean time, you can then conclude that log 1 was recorded at 10:10:56 (03:10:56 +
07:00:00) in the display time zone.
You can set the chart's refresh rate by selecting the Change Refresh Period icon. By using the Add Filter dropdown list,
you can filter the log list by various factors. Selecting Column Setting allows you to customize the default log view. By
selecting Log Files, you can see the raw log data files and manually download them. The box in the lower right allows
you to move through pages of log data by clicking the arrows or entering a page number.
To download logs:
1. In Analysis > Logview, go to the desired log in the left navigation pane.
2. Click Log Files in the upper right corner.
3. Select the checkboxes for the desired logs. You can download up to five log files at once.
4. Click the Download button. A .gz archive file containing the logs that you selected in step 3 is downloaded.
You can download various types of raw logs from FortiGate Cloud. The log filename format is as follows:
<log type>_MultiLogs_<download timestamp>.gz
For example, for a traffic log, the filename would be tlog_MultiLogs_1592503586.gz.
The log filename format uses a shortened identifier for each log type:
Anomaly mlog
AntiSpam slog
AntiVirus vlog
Attack alog
CIFS ilog
Content clog
DLP dlog
DNS olog
GTP glog
Netscan nscan
SSH/SSL hlog
Traffic tlog
VOIP plog
For example, consider an Application Control log that is generated for the period between October 23, 2021 and
November 2, 2021 for a FortiGate with the serial number "FGT123". The first log in the file has a timestamp of 6:09 PM,
while the last log in the file has a timestamp of 9:32 AM. The log file name is as follows:
FGT123_rlog_20211023-1809-20211101-0932.log.gz
Event Management
In Event Management, you can set up email alerts for specific network structure emergencies, such as the device's
power supply failing. The page defaults to All Events in the left menu, which lists all past emergency events. Select Event
Handlers to configure the alert settings.
You can enable events to track by selecting their checkboxes. If you want to receive an alert email when they occur,
select the checkbox under Send Alert Email and enter the email address to send the alert email to. To send the alert
email to multiple email addresses, you can enter multiple email addresses in the Send Alert Email fields, separating each
email address with a comma.
Select the gear icon to configure each Event Handler directly and set the logged severity level.
Reports
Reports generates custom reports of specific traffic data, and can email them to specified addresses. Select a report to
see a list of collected reports of that type. By default, there is a preconfigured Summary Report and a Web Activity
Report.
To schedule a report:
Reports reference
Report Description
DNS The default version of this report displays the following charts:
l Queried Botnet C&C domains and IP addresses
FSBP The default version of this report displays results based on the device's security
rating result:
l Fabric components audited
l Maturity milestones
Report Description
l Achievements and to-do list
The FSBP Dashboard is only available for devices that support the Security
Rating feature. If the device does not have any Security Rating results, all charts
show no data.
High Bandwidth Application Shows you applications that may affect network performance by using high
Usage bandwidth, allowing you to quickly pinpoint high bandwidth usage and violation of
corporate policies.
This report focuses on peer-to-peer applications (such as BitTorrent, Xunlei,
Gnutella, Filetopia), file sharing and storage applications (such as Onebox,
Google Drive, Dropbox, Apple Cloud), and voice/video applications (such as
YouTube, Skype, Spotify, Vimeo, Netflix).
You cannot edit this report.
Summary The default version of this report displays the following sections:
l Threat Analysis
l Traffic Analysis
l Web Activities
l VPN Analysis
l System Activity
Web Activity The default version of this report displays the following charts:
l Most Visited Web Categories
Cyber Threat Assessment An enhanced version of the Summary Report. Displays the following sections:
l User Productivity
l Application Usage
l Web Usage
Report Description
What is New Weekly Report This report displays new emerging devices, applications, vulnerabilities, and
viruses during the past week. You can only schedule FortiGate Cloud to run this
report weekly. Displays the following sections:
l New Device
l New Applications
l New Vulnerability
l New Virus
Admin and System Events This report displays admin login information and system event information.
Report Displays the following sections:
l Admin Login
l Login Summary
l Login Summary By Date
l List of Failed Logins
l System Events
l Events by Severity
l Critical Severity Events
l High Severity Events
lMedium Severity Events
You cannot edit this report.
VPN Report This report displays VPN-related information. Displays the following sections:
l Summary
l SSL VPN
l Top Sources of SSL VPN Tunnels by Bandwidth
l Top SSL VPN Tunnel Users by Bandwidth
l Top SSL VPN Web Mode Users by Duration
l Top SSL VPN Users by Duration
l IPsec VPN
l Top Site-to-Site IPsec Tunnels by Bandwidth
l Top Dialup IPsec Tunnels by Bandwidth
l Top Dialup IPsec Users by Bandwidth
lTop Dialup IPsec Users by Duration
You cannot edit this report.
Report configurations
You can create and alter report configurations and their settings from Report. You can Add new reports or Edit existing
ones. Both open an editing interface, which allows you to edit the report content and add or remove sections.
This feature is available for multitenancy and non-multitenancy accounts.
When a report configuration is scheduled for more than 15 devices, you can click ... in the Scheduled Devices column to
open a window where you can view all scheduled devices.
1. Go to Report.
2. Click Create Report Config in the upper right, and choose to create a blank report, default Summary or Web Activity
Report, copy an existing report, or import an external template. Click Submit.
3. To add a chart, click the gear icon and select Add Chart.
4. In the Predefined Chart List dialog, select the desired chart. You can further customize the chart by clicking
Customize. Click Save.
5. Click the gear icon to add Descriptions, and Titles to the current section, or new 1- or 2-column sections.
6. Click Settings. You can upload a report logo and set the report language.
7. Click Save.
8. Select Run, and view the finished report.
1. Go to Report.
2. Click Settings for the desired report. You can upload a report logo and set the report language. Click Submit.
1. Go to Report.
2. Click Delete for the desired report. Deleting the report config deletes all associated reports from FortiGate Cloud.
Click YES in the confirmation dialog to continue with the deletion.
Cloud Sandbox is a service that uploads and analyzes files that FortiGate antivirus (AV) marks as suspicious.
In a proxy-based AV profile on a FortiGate, the administrator selects Inspect Suspicious Files with FortiGuard Analytics
to enable a FortiGate to upload suspicious files to FortiGuard for analysis. Once uploaded, the file is executed and the
resulting behavior analyzed for risk. If the file exhibits risky behavior or is found to contain a virus, a new virus signature
is created and added to the FortiGuard AV signature database. The next time the FortiGate updates its AV database it
has the new signature. The turnaround time on Cloud SandBoxing and AV submission ranges from ten minutes for
automated SandBox detection to ten hours if FortiGuard Labs is involved.
FortiGuard Labs considers a file suspicious if it exhibits some unusual behavior, yet does not contain a known virus. The
behaviors that FortiGate Cloud Analytics considers suspicious change depending on the current threat climate and other
factors.
The FortiGate Cloud console enables administrators to view the status of any suspicious files uploaded: pending, clean,
malware, or unknown. The console also provides data on time, user, and location of the infected file for forensic analysis.
SandBoxing is available in both free and paid FortiGate Cloud subscriptions.
The SandBox tab collects information that the Cloud Sandbox service compiles. Cloud Sandbox submits files to
FortiGuard for threat analysis. You can configure your use of the service and view analyzed files' results.
You must enable Cloud SandBoxing on the FortiGate and submit a suspicious file for the SandBox tab to become visible.
FortiGate Cloud Sandbox regions include Global, Europe, U.S., and Japan.
To set up Sandbox:
Dashboard
Widget Description
System Status Quick view of the current state of the AV databases and load.
Top 5 Targeted Hosts (Last 24 Displays which hosts received the most threats during the last 24 hours.
Hours)
Scan Result (Today and Past 7 Shows the last eight days of results and their risk levels. You can toggle the
Days) display of clean files in the chart by selecting the checkmark in the lower right of
the widget.
Top 20 File Types (Last 24 Displays the most commonly analyzed file types in the last 24 hours of scanning.
Hours)
Files Records displays files that your connected device's AV has flagged as suspicious, which have been uploaded to
FortiGate Cloud for FortiGuard analysis. In On-Demand, you can manually upload files for FortiGuard analysis, and view
the analysis results. These pages may not appear if you do not have the Cloud Sandbox service enabled on the
connected device.
You can select an analysis level and click the file names for more information. On-Demand also has an Export option,
which allows you to export a CSV or PDF of on-demand results, and Upload File, where you can manually upload a file
for analysis.
The maximum file size is 10 MB. The processing time may vary based on the file size.
Setting
FortiGate Cloud supports the unified FortiCloud account for login to access the portal. The user who created the
account, which this guide refers to as the primary user, can log in to FortiGate Cloud using their email ID as the
username and the password that they chose when creating the account.
Creating an account
You can register a new FortiCloud account using the Register button on the landing page.
User management
The primary user can add users to the account using the following methods:
Identity and Access Management Add users to the FortiCloud account with role-based access control in FortiGate
(IAM) user Cloud using the FortiCloud IAM service. See IAM users on page 62.
FortiGate Cloud user Add FortiGate Cloud-only users. See FortiGate Cloud users on page 62.
FortiGate Cloud does not support subusers added via the FortiCare legacy user management system. IAM users are the
recommended approach.
IAM users
FortiCloud IAM supports creating IAM users and allowing access to FortiGate Cloud using the admin or read-only
access role. The following summarizes the functions available for each access role:
Creating an IAM user
IAM users with admin or read-write roles can create additional IAM users.
1. Log in to the FortiCare IAM portal using your FortiCloud account. This should be the same account as the FortiGate
Cloud primary user email account.
2. Go to IAM Users, then click Add IAM User.
3. Populate the fields as desired, then click Next.
4. Under Cloud Management & Service, add FortiGate.
5. A new entry appears. Edit it and give the user admin or read-only access. See Accounts and users on page 61 for
details on the access types. Click Confirm.
6. Download the CSV file to obtain the IAM user credentials.
Signing in as an IAM user
Primary users can create FortiGate Cloud users with admin and regular (read-only) permission roles with access to
different functionalities.
For information on multitenancy-enabled accounts and adding subaccounts and users to subaccounts, see Multitenancy
on page 68.
1. Go to Account Setting.
2. Click the Add User button.
3. Enter the new admin/user's email address and name.
4. From the Region dropdown list, select the desired region for this user to have access to.
5. From the Role dropdown list, select whether they are an admin (total control over the FortiGate Cloud interface) or a
regular user (limited control, monitoring only).
6. For Manage Sub Account, select All, or select Selected to decide which subaccounts the admin/user has access to.
7. Select Submit. The admin/user receives an email prompting them to set their account password and log in.
1. Log in to FortiGate Cloud using the FortiGate Cloud account that you want to replace. In the upper right of the
FortiGate Cloud interface, click Account Setting. In the list of users, ensure that the new email address is not already
in use.
2. Add a new admin user, using the desired new email address. Follow the instructions in To add more FortiGate
Cloud users: on page 63 to add the new admin user.
3. Select Set as primary.
Account Setting
You can add and manage users from Account Setting. Account Setting includes different user types, including IAM and
FortiGate Cloud account users. Account Setting displays a key icon beside the primary account.
Column Description
Login ID Email address that the user uses to log in to the FortiGate Cloud portal. This
column also displays the region that each user can access and their role. If
multitenancy is activated, this column also displays the subaccounts that the user
can access.
User Type Displays the type of user. User types include the following:
l IAM: see IAM users on page 62.
l API: an API user only has the ability to call the FortiGate Cloud API.
Column Description
2-Factor Enable two-factor authentication for the user. Two-factor authentication is only
available for FortiGate Cloud and IAM users. Enabling two-factor authentication
by selecting the checkbox in this column is only available for FortiGate Cloud
users. For IAM users, you can enable two-factor authentication by selecting
Security Credentials from the top-right dropdown list.
User Name Name of the user associated with the user account. You may want to edit a
username to make it easier to identify who is using that account. You can edit the
username by clicking the Edit icon in the Action column.
Status Status of the user account. The status can be one of the following:
l Active: user who has activated their account.
l Pending: user to whom an activation email has been sent, but has not
Action Edit or delete the user, or remove them from their current region. Available
options depend on the role of the user account that you are currently logged in to
FortiGate Cloud with.
The Audit Log displays a log of actions that users have performed on the FortiGate Cloud portal. You can filter the page
to only view logs for actions for a certain date range, module, or action type. The log displays information for the following
modules:
Module Actions
Account l Adding, deleting, and editing subaccounts, account users, and subaccount
users
l Moving devices to subaccounts
l Setting an account as the primary account
Device deployment Undeploying, deleting, adding, bulk adding, and deploying devices to FortiGate
Cloud or FortiManager
The following information is available for each action. You can configure which columns display:
l Time when the action occurred
l User who completed the action
l Module that the action falls under
l Action type
l Subject that the action was performed on
l Other details as available
The multitenancy account is a FortiGate Cloud premium account designed for managed security service providers. A
multitenancy account is a one- or five-year service for an administrator to create and manage multiple subaccounts. It
also allows you to move devices between these accounts. You can allocate administrators to each subaccount with full
or read-only access, allowing more control over a managed service's provisioning.
To activate multitenancy:
1. Contact your Fortinet partner or reseller, requesting the following SKU: FCLE-10-FCLD0-161-02-DD. They email
you a multitenancy activation code.
2. In FortiGate Cloud, select Account Setting.
3. Under the admin/user list, select Activate multi-tenancy feature.
4. Enter the activation code, and click Submit.
1. On the Inventory page, select Import FortiCloud Key or Import Bulk Key to add multiple FortiGate Cloud licenses at
once.
After the device is successfully deployed, the device key becomes invalid. You can only
use the key once to deploy a device.
2. On the FortiGate Inventory subpage, select one or multiple devices, and select Deploy to FortiGate Cloud. Select
the subaccount for the selected devices. You can also select a timezone for the devices.
3. Click Deploy. The devices are moved to the FortiGate Cloud Deployed subpage.
Assigning a device to a new subaccount keeps the device data in FortiGate Cloud, including
logs, reports, and configuration backup, and moves this data to the new subaccount. To delete
this data, you must undeploy your device from FortiGate Cloud, then assign it to the desired
subaccount.
To manage subaccounts:
1. The Network Overview page lists subaccounts in a dropdown list. To manage a subaccount, click the desired
subaccount. From the dropdown list, select the desired management action.
2. Go to Account Setting. You can view all accounts associated with this FortiGate Cloud. Use the dropdown list to
view Global, SubAccount, or All Users. You can see that users have different roles. For descriptions of the roles,
see User roles on page 70.
4. In the Account Setting > Edit User dialog, for Manage Sub Account, select Selected. Select the desired subaccounts
for this user to manage.
User roles
The multitenancy account includes different user roles. You can view users and their roles by clicking the Account
Setting icon. For multitenancy accounts, admins and regular users can select single or multiple subaccounts.
IOC alerts administrators about newly found infections and threats to devices in their network. By analyzing UTM logging
and activity, IOC provides a comprehensive overview of threats to the network.
IOC detects three threat types, based on the evolving FortiGuard database:
Unknown Threats that the signature has detected but are not associated with any known
malware
A subscription grants access to IP address allowlisting, which allows you to narrow your malware search by excluding
safe IP addresses and domains, and alert emails to notify you directly of detected network threats. You can also view
infected devices' full IP addresses, allowing you to better control their access to your network.
You must enable the IOC column in Network Overview. See Network Overview on page 27.
To access IOC:
1. In the FortiGate list, look to the right. A bomb icon is visible. Click the bomb icon.
The following provides instructions on how to access and call the FortiGate Cloud API. You can find all supported
API calls at the FortiGate Cloud REST API documentation.
For FortiGate Cloud API calls, the host address depends on the server environment as follows:
Global www.forticloud.com
Europe europe.forticloud.com
Japan jp.forticloud.com
All API calls that this guide includes uses the global environment as an example.
1. If the management feature is not already enabled on the desired FortiGate, enable it by calling devices/
{sn}/management. The following provides an example:
Request:
curl -H "Content-Type: application/json" -H "Authorization: Bearer EXAMPLETOKEN" -X PUT
-d '{"management":true, "username":"xxx", "password":"xxx"}'
https://forticloud.com/forticloudapi/v1/devices/FGT60D461xxxxxxx/management
2. You can proxy any FortiOS API via FortiGate Cloud. The format for calling FortiOS APIs from FortiGate Cloud is as
follows:
https://www.forticloud.com/forticloudapi/v1/fgt/<SN>/<FortiOS API>
The following provides an example request where the FortiGate serial number is FGT60D461xxxxxxx and the API
being called is /api/v2/monitor/fortiguard/service-communication-stats, which retrieves historical
statistics for communication with FortiGuard services.
Request:
Do the following:
1. Ensure that you can log into FortiGate Cloud via a web browser using the same username and password that you
attempted to activate FortiGate Cloud with on the FortiOS GUI.
2. Confirm that the FortiGate can ping logctr1.fortinet.com or globallogctrl.fortinet.net. This is the Anycast FortiADC
hostname for devices running FortiOS 6.2.5 or FortiOS 6.4.
3. Connect via Telnet to the resolved IP address from step 2 using port 443.
4. Ensure that the FortiGate Cloud account password length is less than 20 characters.
5. If running FortiOS 5.4 or older versions, ensure that the FortiGate Cloud account password does not include special
characters, as these FortiOS versions do not support this.
6. If the FortiGate is a member of a high availability (HA) pair, ensure that you activate FortiGate Cloud on the primary
device. Activate FortiGate Cloud on the primary FortiGate as To deploy a FortiGate/FortiWifi to FortiGate Cloud in
the FortiOS GUI: on page 19 describes. FortiGate Cloud activation on the primary FortiGate activates FortiGate
Cloud on the secondary FortiGate. Local FortiGate Cloud activation on the secondary FortiGate will fail.
7. Enable FortiGate Cloud debug in the CLI. The get command displays the device timezone, while the diagnose
debug console timestamp enable command shows the date timestamp for the debug logs.
config system global
get
end
diagnose debug console timestamp enable
execute fortiguard-log domain
diagnose debug app forticldd -1
diagnose debug enable
execute fortiguard-log login email password
Email any debug output to [email protected].
8. If you see the HTTP 400 error, enable HTTP debug with the diagnose debug app httpsd -1 command.
Why can I log into the FortiGate Cloud but not activate the FortiGate
Cloud account in FortiOS with the same credentials?
FortiOS 5.4 and older versions do not support passwords with special characters. If you are running FortiOS 5.4 or an
older version and attempting to activate a FortiGate Cloud account with a password that includes special characters, the
activation fails. You must remove special characters from the password, or upgrade to FortiOS 5.6 or a later version.
See To replace a FortiGate Cloud user account ID with a new email address: on page 63.
See To move a FortiGate/FortiWifi deployed to FortiGate Cloud to another account: on page 20.
Activate FortiGate Cloud on the primary FortiGate as To deploy a FortiGate/FortiWifi to FortiGate Cloud in the FortiOS
GUI: on page 19 describes. FortiGate Cloud activation on the primary FortiGate activates FortiGate Cloud on the
secondary FortiGate. Local FortiGate Cloud activation on the secondary FortiGate will fail.
You can also disable HA on both devices, activate FortiGate Cloud on each device, then enable HA.
1. Check the FortiGate network settings and ensure that port 443 is not blocked.
2. Connect via Telnet to logctrl1.fortinet.com or globallogctrl.fortinet.net (if FortiOS supports Anycast) through port
443.
3. In the FortiOS GUI, activate FortiGate Cloud as To deploy a FortiGate/FortiWifi to FortiGate Cloud in the FortiOS
GUI: on page 19 describes.
This message means that the device has already been added to an account inventory. Another user may have tried to
add the device to another account. If you cannot find the device on the Inventory page, contact [email protected].
The FortiCloud key is for one-time use only. Log into the FortiGate and activate FortiGate Cloud as To deploy a
FortiGate/FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 19 describes instead. If you cannot connect to the
FortiOS GUI, contact [email protected] to reenable the key.
When a new FortiGate is added to FortiGate Cloud, it is dispatched to the global or Europe region based on its IP
address geolocation. If the FortiGate warranty region is Japan, it is dispatched to the Japan region.
You must set the FortiOS central management setting to FortiCloud. The management tunnel status must be up. See
How can I see management tunnel status in FortiOS? on page 76. See To remotely access a device: on page 33.
The migrate notice appears when FortiOS detects different email addresses used for FortiCare and FortiGate Cloud.
FortiOS has a known issue that it is case-sensitive when verifying an email address. For example, FortiOS may consider
[email protected] and [email protected] as different email addresses. Contact [email protected] to ensure both
accounts use all lower-case letters.
1. Ensure that the FortiManager settings are correct and the device can connect to FortiManager.
2. Confirm that the central management setting on the device is set to FortiCloud.
3. Ensure that the device can connect to logctrl1.fortinet.com via port 443.
4. Import the device to the inventory by FortiCloud key. See To deploy a FortiGate/FortiWifi to FortiGate Cloud using
the FortiCloud key: on page 18.
5. Deploy the device to FortiManager, then power up the device. If the device is already powered up, run execute
fortiguard-log join.
6. If the FortiCloud key has been used and is invalid for reuse, log into the device GUI and activate FortiGate Cloud as
To deploy a FortiGate/FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 19 describes.
Gather debug logs for the following commands, then send the debug output to [email protected]:
execute telnet <Log server IP address> 514
diagnose test app forticldd 1
diagnose test app miglogd 6
diagnose debug app miglogd -1
diagnose debug enable
Ensure that you can see logs in the FortiGate Cloud portal.
In poor network conditions, increase the timeout period to avoid connection timeout:
config log fortiguard setting
set conn-timeout 120
end
Ensure that the scheduled report has been generated and that the email address has been added. See Reports on page
53.
l Go to Security Profiles > AntiVirus. Ensure that Suspicious Files Only or All Supported Files is enabled.
l Go to Security Profiles > AntiVirus. Ensure that Suspicious Files Only or All Supported Files is enabled.
l Go to Policy & Objects > IPv4 Policy. Enable antivirus for the policy in use.
FortiGate Cloud uses the TCP ports 80, 443, 514, 541, and UDP ports 5246/5247. IP address ranges differ depending
on the region:
Germany 154.52.10.0/24
France 154.45.6.0/24
Backup does not have storage limits. For licensed devices, the retention period is one year. For unlicensed devices, the
retention period is seven days.
Automatic backup is either per session or day. FortiGate setting changes from FortiOS or FortiGate Cloud trigger
backup. If there is no changes to FortiGate settings, FortiGate Cloud does not perform a backup. See To enable auto
backup: on page 39.
This is a new feature to sync a FortiGate device's geolocation information between the FortiOS GUI, FortiGate Cloud,
and the Asset Management portal. When a new device is being provisioned, or there is a change in a provisioned
device's IP address, or a user moves a device to another location on the map view, its new geolocation attributes will be
pushed to the device via the management tunnel with username as FortiGateCloud. Since the geolocation database
may not be entirely accurate, it is possible that a device is placed at a wrong location on the map, but you can move the
device to its correct location on Map View.
To synchronize the local hostname on a FortiGate and in FortiGate Cloud, compare the times of the FortiGate Cloud
portal change and the local hostname modification on the device GUI. Use whichever time is the latest.
l When you change the hostname within the FortiGate Cloud portal, FortiGate Cloud pushes the change to the device
via the management tunnel.
l When you change the hostname within the device GUI, the device only sends the new hostname to FortiGate Cloud
with its next FCP UpdateMgr request.
To ensure that FortiGate Cloud can immediately reflect hostname changes, you can run the diagnose fdsm
contract-controller-update command in the CLI after changing the hostname:
Copyright© 2022 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.