FortiClient 6.0.0 (Windows)

Moonhorse

Level 37
Verified
Top Poster
Content Creator
Well-known
May 29, 2018
2,608
I test it at malcode database
operablock.png


Well atleast its working with opera, maybe just fails to block those threats youre visiting to
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
You probably only need to enable ATP+ web filter + antivirus during installing

ATP = sandbox + dynamic threat protection, you can disable sandbox since youre using comodo firewall if you want to

Also anti-exploit becomes redundant, so you may disable it aswell since youre running OSA

Great thanks. Very helpful.

Application firewall and single sign on are useful only if you use it in managed mode (connected to FortiGate)

Thanks for the images. Just what I was wanting to know.

Couple of questions:

1. If I don't use the Forticlient sandbox, anti-exploit, is the a-v worth installing just for signatures?
2. How is Fortinet with just anyone using Forticlient? Looks like it's meant to be complimentary to their other products, so this is why I ask.

Thanks for this help, and I may have a question about the configuration changes @ForgottenSeer 58943 recommended...
 

Moonhorse

Level 37
Verified
Top Poster
Content Creator
Well-known
May 29, 2018
2,608
@AtlBo forticlient av is worth installing, if you want to have light performance + signature based av. Since youre using cf, you probably dont have hips on..so you will be lacking behaviour blocker against new threats?

Well if youre advanced user, you will know your needs but i would be using as you
-comodo firewall
- any av with behaviour blocker; avast, AVG,kaspersky( systemawatcher) , bitdefender, qihoo , maybe tweaked windows defender etc.
- fortinet web filter
- OSA

But if you replace forticlient av with any other antivirus opinion the web filter of forticlient will become bit redundant because most antiviruses can block malware sites well and netcraft will do enough for phishing,

@stefanos might be conflicting with your existing software?
 

stefanos

Level 28
Verified
Top Poster
Well-known
Oct 31, 2014
1,712
@AtlBo forticlient av is worth installing, if you want to have light performance + signature based av. Since youre using cf, you probably dont have hips on..so you will be lacking behaviour blocker against new threats?

Well if youre advanced user, you will know your needs but i would be using as you
-comodo firewall
- any av with behaviour blocker; avast, AVG,kaspersky( systemawatcher) , bitdefender, qihoo , maybe tweaked windows defender etc.
- fortinet web filter
- OSA

But if you replace forticlient av with any other antivirus opinion the web filter of forticlient will become bit redundant because most antiviruses can block malware sites well and netcraft will do enough for phishing,

@stefanos might be conflicting with your existing software?
yes my friend. For chrome is the best web filter. At Opera not working well. I have the same problem with K9 at Opera. Malwarebytes extension at opera works perfect. I stay with extensions at opera
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
@AtlBo forticlient av is worth installing, if you want to have light performance + signature based av. Since youre using cf, you probably dont have hips on..so you will be lacking behaviour blocker against new threats?

I have the HIPs on in Safe Mode. Even then, the system watcher element of things is a lacking, but I don't think I need more. OSArmor is so good at cutting malware off before BB becomes an issue, so maybe I will try this:

1. Comodo
-Firewall
-HIPs (Safe Mode)
-Sandbox
2. FortiClient
-A-V
*Sigs
-Web-Filter
3. NVT OSArmor
-All Options (plan to back off some, since don't want to see location blocks in the logs when I can see activity/behavior blocks instead)
4. AppCheck Anti R/W
-Had it for a while now
5. NVT ERP
-I use it like HIPs basically for the chance to whitelist command-line.

Sounds crowded, but it's my main "esperiment", so I don't mind. It's also the PC I use the most. All the apps are super light-weight, so it's not using RAM or processor as far as I can see.
 

imuade

Level 12
Verified
Top Poster
Well-known
Jul 29, 2018
566
Great thanks. Very helpful.
Thanks for the images. Just what I was wanting to know.

Couple of questions:

1. If I don't use the Forticlient sandbox, anti-exploit, is the a-v worth installing just for signatures?
2. How is Fortinet with just anyone using Forticlient? Looks like it's meant to be complimentary to their other products, so this is why I ask.

Thanks for this help, and I may have a question about the configuration changes @ForgottenSeer 58943 recommended...

For what I have understood, FortiClient works much better with FortiGate and FortiSandbox, but its signatures are pretty good even if you just have FortiClient.
The anti-exploit module is based on behavior, even if it's not very strong. But it shouldn't make any problem if you keep it enable.
About the config changes, you first have to backup your setting, then open the .conf file (for example with WordPad), search for the entry you wanna modify and change the value. Once done, save the .conf file and restore it from the settings.

I have the HIPs on in Safe Mode. Even then, the system watcher element of things is a lacking, but I don't think I need more. OSArmor is so good at cutting malware off before BB becomes an issue, so maybe I will try this:

1. Comodo
-Firewall
-HIPs (Safe Mode)
-Sandbox
2. FortiClient
-A-V
*Sigs
-Web-Filter
3. NVT OSArmor
-All Options (plan to back off some, since don't want to see location blocks in the logs when I can see activity/behavior blocks instead)
4. AppCheck Anti R/W
-Had it for a while now
5. NVT ERP
-I use it like HIPs basically for the chance to whitelist command-line.

Sounds crowded, but it's my main "esperiment", so I don't mind. It's also the PC I use the most. All the apps are super light-weight, so it's not using RAM or processor as far as I can see.

This is really overkill o_O
My suggestion:
  1. FortiClient (my modules) + Comodo FW (cruelsister's settings)
  2. FortiClient (my modules) + OSA (or ERP) + AppCheck + WFC (or W10FC or Simplewall)
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
This is really overkill o_O
My suggestion:
  1. FortiClient (my modules) + Comodo FW (cruelsister's settings)
  2. FortiClient (my modules) + OSA (or ERP) + AppCheck + WFC (or W10FC or Simplewall)

It is, I agree. I only run all of this "for science and knowledge" sake. I gather alot of useful knowledge on the protection scopes of various security programs. I wouldn't recommend it for most individuals. Also, I don't install hoards of software.

OSA and ERP work very differently, although there is a of course overlap, many times. This is one reason I plan to trim back the settings in OSA over time. The problem with that is that the information that some executable is dropping and running something in AppData or whatever is something I would like to see for now. Well, when the Comodo HIPs are added I know this sounds crazy, but for now it's what I will use.

I have a few questions about FortiClient GUI and settings, but I like the application so far:

1. How do I change the settings mentioned by @ForgottenSeer 58943? EDIT I see your answer in the previous post thanks @imuade
2. Under the Malware Protection settings (top right)->A-V module->Block malicious websites all of the check boxes are green. Then, on Web Security main page the same, but in the Web Security settings they are green but can be changed. It says the green indicates allow the sites. The options are Allow, Block, Warn, Monitor. Does this indicate that they are allowed by default? OK, but unexpected, and I see the options there I have for changing if I need to so no problem. Wondering is there is a better way than all block. Also, what is monitor just out of curiosity?
3. Is grayware worth monitoring for?
 
Last edited:
  • Like
Reactions: simmerskool

imuade

Level 12
Verified
Top Poster
Well-known
Jul 29, 2018
566
It is, I agree. I only run all of this "for science and knowledge" sake. I gather alot of useful knowledge on the protection scopes of various security programs. I wouldn't recommend it for most individuals. Also, I don't install hoards of software.

OSA and ERP work very differently, although there is a of course overlap, many times. This is one reason I plan to trim back the settings in OSA over time. The problem with that is that the information that some executable is dropping and running something in AppData or whatever is something I would like to see for now. Well, when the Comodo HIPs are added I know this sounds crazy, but for now it's what I will use.

I have a few questions about FortiClient GUI and settings, but I like the application so far:

1. How do I change the settings mentioned by @ForgottenSeer 58943? EDIT I see your answer in the previous post thanks @imuade
2. Under the Malware Protection settings (top right)->A-V module->Block malicious websites all of the check boxes are green. Then, on Web Security main page the same, but in the Web Security settings they are green but can be changed. It says the green indicates allow the sites. The options are Allow, Block, Warn, Monitor. Does this indicate that they are allowed by default? OK, but unexpected, and I see the options there I have for changing if I need to so no problem. Wondering is there is a better way than all block. Also, what is monitor just out of curiosity?
3. Is grayware worth monitoring for?
1. No problem :)
2. I remember some were blocked by default, but I'm not sure. Monitor should mean that the website isn't blocked, but you can see on the log that it has been accessed
3. Why not? You can always allow them if you are sure it's a false positive :)
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
OK, the vulnerability scan is very good. For laughs, has anyone run this on an unpatched system? I would love to find out how FortiClient would handle that situation. It could be a very interesting way to see how to get a limited number of patches that will do the job from a security perspective...or at least in Fortinet's opinion "do the job". In some cases, I could understand why someone might go for this kind of thing if it existed and if the concept was safe to trust.

The program seems very smooth and clean, and it's more what I have been looking for from an a-v than anything else I have seen to date...all things considered. Thanks for all the helpful information and tips.
 

Tume

Level 2
Verified
Mar 30, 2018
68
OK, the vulnerability scan is very good. For laughs, has anyone run this on an unpatched system? I would love to find out how FortiClient would handle that situation. It could be a very interesting way to see how to get a limited number of patches that will do the job from a security perspective...or at least in Fortinet's opinion "do the job". In some cases, I could understand why someone might go for this kind of thing if it existed and if the concept was safe to trust.

The program seems very smooth and clean, and it's more what I have been looking for from an a-v than anything else I have seen to date...all things considered. Thanks for all the helpful information and tips.

It will tell you that you have vulnerabilities and offer to fix them aka. installing newest update. Works great to me :)
 
  • Like
Reactions: simmerskool

stefanos

Level 28
Verified
Top Poster
Well-known
Oct 31, 2014
1,712
OK, the vulnerability scan is very good. For laughs, has anyone run this on an unpatched system? I would love to find out how FortiClient would handle that situation. It could be a very interesting way to see how to get a limited number of patches that will do the job from a security perspective...or at least in Fortinet's opinion "do the job". In some cases, I could understand why someone might go for this kind of thing if it existed and if the concept was safe to trust.

The program seems very smooth and clean, and it's more what I have been looking for from an a-v than anything else I have seen to date...all things considered. Thanks for all the helpful information and tips.
I was angry and nervous about these installations and uninstallations. But I found the solution. I am back to my lovely 360TS:)
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
I was angry and nervous about these installations and uninstallations. But I found the solution. I am back to my lovely 360TS:)

I can understand why. The BB in 360 brings good information to the user. For me, Comodo covers also with HIPs. HIPs covers the same areas and also some others. However, 360 logs are great and better than Comodo imo. Sandbox is still a hole in my life when it comes to MS Office sadly for me. I still like this setup better for now.

360 is very good no doubt, especially the smoothness of the run-time execution of the program...
 
Last edited:

TairikuOkami

Level 35
Verified
Top Poster
Content Creator
Well-known
May 13, 2017
2,497
OK, the vulnerability scan is very good. For laughs, has anyone run this on an unpatched system?
It seems, that the scan shows the number of vulnerabilities rather than the number of missing updates. Still pretty informative (links, etc).
 

Attachments

  • capture_08292018_201921.jpg
    capture_08292018_201921.jpg
    55.3 KB · Views: 416
  • capture_08292018_202209.jpg
    capture_08292018_202209.jpg
    99.8 KB · Views: 551
  • capture_08292018_202243.jpg
    capture_08292018_202243.jpg
    99 KB · Views: 436

stefanos

Level 28
Verified
Top Poster
Well-known
Oct 31, 2014
1,712
I can understand why. The BB in 360 brings good information to the user. For me, Comodo covers also with HIPs. HIPs covers the same areas and also some others. However, 360 logs are great and better than Comodo imo. Sandbox is still a hole in my life when it comes to MS Office sadl y for me. I still like this setup better for now.

360 is very good no boubt, especially the smoothness of the run-time execution of the program...
And is light. Extremely light. Comodo on my system slow down the applications and the boot time.And block many times safe things
 

AtlBo

Level 28
Verified
Top Poster
Content Creator
Well-known
Dec 29, 2014
1,711
It seems, that the scan shows the number of vulnerabilities rather than the number of missing updates. Still pretty informative (links, etc).

Thankyou for doing this. You really inspired me with the post.

I ran this on a barely patched W7 installation and came up with this after running the vulnerability scanner in FortiClient:

3 FortiClient Critical Vulnerabilities.png

1 FortiClient Critical Vulnerabilities.png

I noticed next to the updates in the list view, there was a number at the end of each listed OS vulnerability:

2 FortiClient Critical OS Vulnerabilities.png

Maybe this is the number of updates to install. So, for "Critical" in this case, OS vulnerabilities, maybe the number of updates to install is the number of vulnerabilities. I will have to see. I have this almost fresh installation (a few updates/IE 11) imaged, so I am going to "Fix Now" to see the results. There are only OS vulnerabilities showing here.

This seems to be a VERY cutting type of application, and I like that very much from an a-v. Simple (REALLY simple) and very clinical protection from an endpoint specialist. A few good and straightforward modules that appear to function reliably and on a lighter than air base platform. On detection, real-time a-v scanning is finding keyfinders that everyone finds and that I should remove and will. All my PCs have stickers anyway.

Many very good elements to this approach by Fortinet. It must speak highly for their overall endpoint product. The web filter is the best web control set I have seen available for general use to date. Really like the filter is an understatement. I really like all of the modules and pulled together this way too.

How about this:
AppGuard
FortiClient
SysHardener
?

I'll rerun the scan after the "Fix Now" is over. It's running and downloading on the PC now. Should be interesting to see how it functions, but it looks mostly like another way to get Windows Updates so far.
 

stefanos

Level 28
Verified
Top Poster
Well-known
Oct 31, 2014
1,712
Thankyou for doing this. You really inspired me with the post.

I ran this on a barely patched W7 installation and came up with this after running the vulnerability scanner in FortiClient:

View attachment 196870

View attachment 196868

I noticed next to the updates in the list view, there was a number at the end of each listed OS vulnerability:

View attachment 196869

Maybe this is the number of updates to install. So, for "Critical" in this case, OS vulnerabilities, maybe the number of updates to install is the number of vulnerabilities. I will have to see. I have this almost fresh installation (a few updates/IE 11) imaged, so I am going to "Fix Now" to see the results. There are only OS vulnerabilities showing here.

This seems to be a VERY cutting type of application, and I like that very much from an a-v. Simple (REALLY simple) and very clinical protection from an endpoint specialist. A few good and straightforward modules that appear to function reliably and on a lighter than air base platform. On detection, real-time a-v scanning is finding keyfinders that everyone finds and that I should remove and will. All my PCs have stickers anyway.

Many very good elements to this approach by Fortinet. It must speak highly for their overall endpoint product. The web filter is the best web control set I have seen available for general use to date. Really like the filter is an understatement. I really like all of the modules and pulled together this way too.

How about this:
AppGuard
FortiClient
SysHardener
?

I'll rerun the scan after the "Fix Now" is over. It's running and downloading on the PC now. Should be interesting to see how it functions, but it looks mostly like another way to get Windows Updates so far.
You need bb with forticlient. I thing only with Comodo FW you are secure enough.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top