ADOMs (Administrative Domains) allow multiple organizations or departments to be managed independently within a single FortiManager instance. Each ADOM contains its own devices, policies, and settings, preventing conflicts between different environments.
FortiManager supports two types of ADOMs:
| ADOM Type | Purpose |
|---|---|
| Global ADOM | Used for shared policies and objects across multiple ADOMs. |
| Regular ADOM | Contains specific device groups, firewall rules, and configurations. |
Key Difference:
Imagine a Managed Security Provider (MSP) that provides firewall management for multiple customers:
| Customer | ADOM Used | Purpose |
|---|---|---|
| Retail Store Chain | Regular ADOM | Each store has unique network policies. |
| Banking Network | Regular ADOM | Requires strict security policies different from retail. |
| Corporate HQ | Global ADOM | Enforces standard policies across all branch offices. |
Using ADOMs, the MSP can keep customer configurations separate while managing them from one FortiManager.
By default, FortiManager does not enable ADOMs. You must turn them on manually.
Expected Outcome:
Once ADOMs are enabled, you can create separate ADOMs for different environments.
Expected Outcome:
After creating an ADOM, you need to assign devices to it.
Expected Outcome:
One of the biggest advantages of FortiManager is its ability to manage multiple firewalls from a central location. Below are key features that make centralized management efficient.
Example:
A company with 50 branch offices needs to apply a standard web filtering policy across all locations.
Solution:
Expected Outcome:
Example:
A company wants to track all denied traffic across all branch offices.
Solution:
Expected Outcome:
Example:
A company wants to apply the same VPN settings to all branch offices.
Solution:
Expected Outcome:
One of the powerful features of FortiManager is the ability to inherit global policies while allowing custom modifications per ADOM.
Example:
A company enforces strict security rules across all branch offices but allows specific exceptions per location.
Solution:
Expected Outcome:
Managing multiple ADOMs manually can be time-consuming. FortiManager allows policy package cloning, making it easy to duplicate policies across ADOMs.
Example:
A company has three departments (HR, IT, Sales), and each requires similar but slightly different security policies.
Solution:
Expected Outcome:
By default, ADOMs are isolated. However, FortiManager allows certain objects (addresses, services, or policies) to be shared across ADOMs.
Example:
A company wants all branch offices to use a shared VPN gateway, but each site has unique policies.
Solution:
Expected Outcome:
Role-Based Access Control (RBAC) restricts what administrators can access and modify in FortiManager. This ensures that users only have access to the ADOMs and features they need.
| Role Type | Permissions | Use Case |
|---|---|---|
| Super_Admin | Full control over all ADOMs and system settings. | Used for top-level administrators. |
| Restricted_Admin | Limited access to specific ADOMs and policies. | Used for department-specific IT teams. |
| Read-Only_Admin | Can view configurations but cannot make changes. | Used for auditors or compliance officers. |
| API_User | Can access the FortiManager API but not the GUI. | Used for automation and scripting. |
Example:
An organization wants to allow branch office IT staff to manage their own FortiGates, but they should not modify global settings.
Solution:
Expected Outcome:
Even with careful configuration, ADOM-related issues can occur. Below are common problems and solutions.
Possible Causes:
Solution:
Possible Causes:
Solution:
Possible Causes:
Solution:
Expected Outcome:
Possible Causes:
Solution:
Expected Outcome:
What is the purpose of the Global ADOM in FortiManager?
It allows administrators to create global policies and objects that apply across multiple ADOMs.
The Global ADOM acts as a centralized configuration layer above individual ADOMs. Administrators can define objects, policies, and configurations that should be shared across multiple ADOM environments. These global elements can then be applied to local ADOM policy packages. This simplifies large deployments where many ADOMs require consistent security configurations.
Common exam trap:
Global ADOM does not replace local ADOM policies—it supplements them.
Demand Score: 78
Exam Relevance Score: 86
Why would an organization use Global Policy Packages?
To enforce consistent security policies across multiple ADOMs.
Global policy packages allow administrators to define common security rules that should be applied to multiple environments. This ensures that baseline policies such as blocking malicious traffic or enforcing compliance standards are consistent across the entire network infrastructure. Individual ADOMs can still maintain their own local policies for environment-specific requirements.
Demand Score: 74
Exam Relevance Score: 85
How does Global ADOM simplify centralized network management?
It allows shared configuration elements to be defined once and reused across multiple ADOMs.
Instead of creating identical objects or policies in every ADOM, administrators can define them once in the Global ADOM. These configurations are then inherited by other ADOMs when policies are installed. This approach reduces duplication, simplifies policy updates, and ensures consistency across multiple network environments.
Demand Score: 71
Exam Relevance Score: 83
What happens when a Global Policy Package is updated?
The updated policy must be reinstalled on the affected devices to take effect.
FortiManager maintains configurations in its database. When administrators modify a global policy package, the change is stored in the management database but not automatically applied to devices. Administrators must perform a policy installation so the changes are pushed to the managed FortiGate devices.
Demand Score: 70
Exam Relevance Score: 84