This section provides a detailed walkthrough of Central Management, focusing on FortiManager, FortiAnalyzer, and Security Fabric Integration.
FortiManager is a centralized management solution for Fortinet devices, including FortiGate. It simplifies configuration, policy management, and device monitoring in complex environments.
FortiManager allows administrators to create and deploy consistent policies across multiple devices.
admin, Password: (blank).Corporate_Policies).FortiManager can schedule regular configuration backups and rollbacks to ensure device consistency and disaster recovery.
FortiManager enables administrators to automate repetitive tasks across multiple devices using scripts.
Access the Script Manager:
Write the Script:
Example: Configure interface IPs on multiple devices:
config system interface
edit port1
set ip 192.168.1.1/24
set allowaccess ping https ssh
end
Save and Test:
FortiAnalyzer is a log management and analysis platform that works seamlessly with FortiGate to provide insights into network activity.
Connect FortiGate Devices:
In the FortiGate GUI, configure log forwarding to FortiAnalyzer:
config log fortianalyzer setting
set status enable
set server <FortiAnalyzer_IP>
set source-ip <FortiGate_IP>
end
Enable Logging on Policies:
On FortiGate, ensure firewall policies have logging enabled:
config firewall policy
edit 1
set logtraffic all
end
FortiManager and FortiAnalyzer can integrate with the Fortinet Security Fabric to provide centralized visibility and coordination across Fortinet devices.
Enable Security Fabric:
On FortiGate, enable Fabric connectors to link other Fortinet products:
config system settings
set security-fabric enable
end
View Fabric Topology:
In environments where multiple administrators manage policies and devices, revision control and policy locking ensure consistent configurations and prevent conflicts.
FortiManager allows you to lock policy packages during editing. This prevents others from modifying the same package simultaneously.
When a user opens a package, it becomes “locked” to that user.
Others will see it as “locked by [username]” and cannot edit until it’s released.
This is critical in multi-admin setups to avoid overlapping changes or misconfigurations.
FortiManager tracks changes to configurations through revision control:
Every time a policy package is modified and saved, a new revision version is created.
You can compare revisions, rollback to previous versions, or create labeled restore points for known-good configurations.
diagnose dvm revision list <device_name>
diagnose dvm revision diff <device_name> <revision_id_1> <revision_id_2>
This enables effective auditing, troubleshooting, and disaster recovery.
FortiAnalyzer offers powerful tools for security event correlation and risk assessment across Fortinet devices.
An event handler is a predefined or custom rule that matches specific log patterns or network behaviors.
Examples: "Excessive Failed Logins", "Malware Detected", "VPN Tunnel Down"
You can configure:
Trigger criteria (e.g., severity level)
Time window
Notification actions (e.g., email alert)
Threat scores are used to rank incidents by severity and risk, helping prioritize responses.
The score is calculated based on:
Threat type (e.g., malware, exploit)
Source/destination
Repetition/frequency
Displayed in:
Incidents & Events dashboard
Threat Map
Reports
Threat scores assist security teams in identifying critical events requiring immediate attention.
In a Fortinet Security Fabric deployment, FortiManager acts as the centralized policy orchestrator, coordinating policy decisions and responses across multiple devices.
FortiManager can receive security events generated within the Fabric, such as:
Compromised host detection from FortiAnalyzer
Fabric Connector updates (e.g., new IoT device appears)
These events can trigger automated policy changes or administrative alerts.
As part of a Fabric Automation workflow, FortiManager can:
Push updated security policies to FortiGate based on Fabric triggers
Initiate endpoint quarantine actions by integrating with FortiClient EMS or NAC solutions
Collaborate with FortiAnalyzer to log and visualize incident flows
In FortiManager’s Fabric View, administrators can:
Monitor connected Fortinet devices (e.g., FortiSwitch, FortiAP, FortiClient)
View status and health metrics
Drill down into device-specific policies and logs
This enhances situational awareness and speeds up response in distributed networks.
| Area | Key Additions |
|---|---|
| FortiManager – Policy Locking | Prevents conflicts; enables revision tracking, version control |
| FortiAnalyzer – Event/Threat | Event handlers trigger actions; threat scores help prioritize response |
| Security Fabric – FMG Role | Receives Fabric alerts, coordinates responses, integrates via automation |
Why might a FortiGate device fail to appear in FortiManager for centralized management?
The device may not be authorized, or connectivity and administrative settings may not allow FortiManager access.
When integrating FortiGate with FortiManager, the device must first establish communication with the management server. If the FortiGate is not configured with the correct FortiManager IP address or management settings, it will not register properly. Even if the device appears in the pending device list, it must be authorized before management can begin. Firewalls between the devices may also block the management communication ports required for FortiManager connectivity. Administrators should verify connectivity, confirm that the device is authorized, and ensure that management settings are correctly configured on both sides.
Demand Score: 85
Exam Relevance Score: 90
What is the purpose of Fortinet Security Fabric in enterprise networks?
Security Fabric integrates multiple Fortinet devices to provide centralized visibility and coordinated threat response.
Security Fabric connects various Fortinet security products such as firewalls, switches, access points, and endpoint protection systems into a unified architecture. This integration allows devices to share threat intelligence, security events, and network information. For example, if malware is detected on one device, other Fabric components can automatically receive indicators of compromise and apply protective actions. Security Fabric also provides centralized monitoring and management through the FortiGate interface, making it easier for administrators to view network topology and security status. This coordinated approach improves visibility and strengthens overall security posture.
Demand Score: 78
Exam Relevance Score: 88
Why might a configuration push from FortiManager fail to apply on a managed FortiGate?
The configuration may contain conflicts, unsupported settings, or policy inconsistencies.
When administrators push configuration changes from FortiManager to managed devices, the configuration must match the device capabilities and current settings. If the configuration references interfaces, objects, or policies that do not exist on the FortiGate, the installation may fail. Version mismatches between FortiManager and FortiGate can also cause compatibility problems. Another frequent issue is policy package conflicts or unresolved dependencies between objects. Administrators should review the installation logs in FortiManager to identify the exact cause of the failure and correct the configuration before retrying the installation.
Demand Score: 73
Exam Relevance Score: 87
How does centralized management improve security operations in large networks?
Centralized management allows administrators to configure, monitor, and update multiple devices from a single platform.
In large enterprise environments, managing each firewall individually becomes inefficient and increases the risk of configuration inconsistencies. Centralized management platforms such as FortiManager enable administrators to control multiple FortiGate devices from a single interface. Policies, firmware updates, and configuration changes can be deployed simultaneously across many devices. This reduces administrative workload and ensures consistent security policies across the network. Centralized monitoring also improves incident response by providing visibility into events across the entire infrastructure.
Demand Score: 70
Exam Relevance Score: 85