Security Profiles are essential for FortiGate’s role as a Unified Threat Management (UTM) device. These profiles allow you to identify, filter, and block threats before they affect your network.
Web Filtering controls access to websites by categorizing them or blocking specific URLs, protecting users from inappropriate or malicious content.
What it Does:
How to Configure:
In the GUI:
Example CLI:
config webfilter profile
edit "example-profile"
config web
set category-action 52 block # 52 represents a specific category ID.
end
next
end
Why It’s Important:
How to Configure SSL Inspection:
When to Use:
How to Configure:
Example: Block example.com:
config webfilter urlfilter
edit 1
set url "example.com"
set action block
next
end
IPS is used to detect and block attacks by analyzing traffic for known vulnerabilities and exploits.
Predefined Signatures:
Custom Signatures:
Create custom rules to detect specific patterns unique to your environment.
Example:
config ips custom
edit "custom-signature"
set signature "alert tcp any any -> any 80 (content:\"/malicious-pattern\"; msg:\"Blocked Malicious Pattern\")"
next
end
Application Control helps identify and manage application traffic, ensuring proper use of bandwidth and resources.
These features protect against malicious files and domains.
Real-Time Scanning:
Static Analysis:
How to Configure:
Quarantine Example CLI:
config antivirus quarantine
set enable
end
What It Does:
How to Configure:
Use FortiGuard DNS Filtering:
CLI Example:
config dnsfilter profile
edit "dns-block-malicious"
set block-botnet enable
next
end
Here’s how Security Profiles might be applied in a real-world scenario:
Security Profiles are FortiGate’s primary defense against modern threats. By combining Web Filtering, IPS, Application Control, and DNS Filtering, you create a layered security strategy. Start by enabling default profiles, then customize them as you gain familiarity with your network’s needs.
Email filtering is used to protect inbound and outbound email traffic against:
FortiGate supports email filtering via FortiGuard Antispam, combined with basic DLP and antivirus scanning for email protocols (SMTP, POP3, IMAP).
Create or edit an email filter profile and enable spam filtering:
config emailfilter profile
edit "email-security"
set spam-filtering enable
set spam-action discard
next
end
You can also:
Expect scenario questions on:
DLP is a security mechanism that prevents sensitive or confidential data from leaving the organization’s network unintentionally or maliciously.
Example: Block credit card number patterns over SMTP.
config dlp sensor
edit "Block-CC"
config rule
edit 1
set protocol smtp
set filter-by regex
set regex "4[0-9]{12}(?:[0-9]{3})?" # Visa card pattern
set action block
next
end
next
end
After defining a sensor, apply it to a firewall policy:
config firewall policy
edit 10
set srcintf "port1"
set dstintf "wan1"
set action accept
set schedule "always"
set service "SMTP"
set dlp-sensor "Block-CC"
next
end
Today, over 90% of internet traffic is encrypted via HTTPS. Without SSL inspection, FortiGate cannot inspect payloads, leaving malware, C2 traffic, or data leaks hidden inside SSL tunnels.
FortiGate offers three SSL Inspection Modes:
config firewall ssl-ssh-profile
edit "Deep-Inspection"
set can-decrypt-ssl enable
set ssl-anomalies block
set expired-server-cert block
set untrusted-server-cert block
next
end
Apply the profile in a firewall policy:
config firewall policy
edit 3
set ssl-ssh-profile "Deep-Inspection"
next
end
| Feature | Purpose | Config Interface | Exam Notes |
|---|---|---|---|
| Email Filtering | Protects email from spam, phishing, malware | emailfilter profile |
Often tested in phishing cases |
| DLP | Prevents sensitive data from leaving network | dlp sensor + firewall |
Regex-based content detection |
| SSL Inspection | Enables payload visibility in HTTPS traffic | ssl-ssh-profile |
Key concept in threat prevention |
Why do users start getting certificate errors after I enable proxy-based UTM profiles or deep SSL inspection?
Because the firewall is now actively decrypting and re-signing sessions, so trust and certificate-chain issues become visible to clients.
This is one of the most common real-world security-profile questions. Community posts show admins enabling proxy-based or full inspection and then seeing client certificate warnings almost immediately. That behavior is expected unless endpoints trust the FortiGate-issued inspection certificate. Fortinet’s SSL troubleshooting guidance also notes that certificate retrieval or validation failures can block sessions during inspection. The practical rule is simple: once you decrypt traffic, the firewall effectively becomes an interception point for TLS. If clients do not trust the inspection CA, or the server-side certificate chain is incomplete or problematic, users will see breakage. On the exam, the key is not to answer “disable inspection.” The better answer is to understand the inspection method, deploy the right trusted CA to clients, and validate the server certificate chain before blaming web filtering or routing.
Demand Score: 83
Exam Relevance Score: 91
Why are the inspected protocols missing in the Antivirus security profile, and why do I get an undefined error?
That symptom usually indicates a GUI/profile handling problem or build-specific issue, not that antivirus inspection logic has disappeared entirely.
A Fortinet community thread from early 2025 shows admins unable to see protocol options or edit existing AV profiles because of an undefined error. In troubleshooting terms, that means you should separate GUI rendering problems from actual profile-engine behavior. First confirm whether the issue reproduces across browsers and admin accounts. Then verify whether it appeared after a firmware change and whether the profile can still be inspected or modified through alternate methods. The exam lesson is pattern recognition: when a security-profile screen behaves abnormally, do not immediately assume policy order or traffic flow is the root cause. Sometimes the management interface is the problem, and the correct next step is version-aware troubleshooting rather than redesigning the policy package. This kind of question rewards engineers who distinguish configuration semantics from presentation-layer issues.
Demand Score: 75
Exam Relevance Score: 72
Why do blocked sessions sometimes show the application only as “SSL,” and how should I think about SSL inspection best practice?
Because without deeper decryption and inspection, FortiGate may only classify the encrypted wrapper, not the real application inside it.
Two recurring demand signals line up here: admins asking why logs show only “SSL,” and others asking when deeper SSL inspection is worth the operational cost. Community discussion explains the core idea well: if traffic remains encrypted, visibility into the actual payload and app identity is limited. That is why application control may appear coarse or generic unless the traffic is decrypted or otherwise identifiable. The tradeoff is operational: deeper inspection improves visibility and enforcement, but it also introduces certificate trust, compatibility, and exception-management overhead. For the exam, the strong answer is balanced: use inspection where the security value justifies it, understand what certificate inspection cannot reveal, and do not expect precise application identification from traffic you choose not to decrypt. That is a much better answer than treating inspection as universally “on” or universally “off.”
Demand Score: 71
Exam Relevance Score: 86