Background

In an air gapped environment where FortiManager, FortiClient, and FortiClient EMS are installed, it’s essential to regularly update FortiClient signature packages.

Despite the airgap, the management of FortiGate devices within this environment is facilitated through FortiManager. Therefore, leveraging FortiManager becomes crucial for this purpose.

The current option involves obtaining the latest signature packages via the FortiCloud platform and manually uploading them into FortiManager. Subsequently, FortiManager distributes these packages to the connected clients using FortiClient EMS.

This guide aims to delineate the configuration steps tailored for this particular use case. Notably, the documentation is grounded on

  • FortiClient EMS version 7.2.4
  • FortiManager version 7.4.2 and
  • FortiGate version 7.4.3.

By following the instructions provided herein, users can seamlessly manage signature package updates in their air gapped environment, ensuring robust security measures are maintained across the network.

It is assumed that the environment is already installed and configured, including the establishment of connections between clients and FortClient EMS, as well as between FortiClient EMS and FortiManager.

These prerequisites ensure that the system is ready for the implementation of the signature package update procedure outlined in this guide.

With the foundational setup in place, users can proceed confidently to execute the configuration steps detailed herein.

Configuring FortiClient EMS

Configure FortiClient EMS – Endpoint Profiles

Malware Protection

  • Log in to FortiClient Endpoint Management Server
  • Navigate to Endpoint Profiles -> Malware Protection
  • Select the Malware Protection Profile to be used and click Edit

1 Endpoint Profiles - Malware Protection

2 - Malware Protection Profiles

  • Enable AntiVirus Protection
  • Click Save

3 - AntiVirus Protection

System Settings

  • Navigate to Endpoint Profiles -> System Settings
  • Select the System Setting Profile to be used and click Edit

4 - Endpoint Profiles - System Settings

5 - System Settings Profile

  • On upper right select Advanced
  • Under Update enable Use FortiManager for Client Signature Update
  • For IP Address/Hostname enter FortiManager IP
  • For Port enter 80
  • Disable Failover to FDN When FortiManager Is Not Available
  • Click Save

6 - Use FortiManager for Client Signature Update

Configure FortiClient EMS – EMS Settings

  • Navigate to System Settings -> EMS Settings
  • Under Shared Settings set following
    • IP and/or FQDN of host machine where FortiClient EMS is installed
    • Set Custom hostname (optional)
    • Management IP and Port (IP is host machine IP and port is 4433)
  • Click Save

7 - System Settings - EMS Settings

8 - EMS Settings - Shared Settings

FortiGuard Services

  • Navigate to System Settings -> FortiGuard Services
  • Enable Use FortiManager for client software/signature updates
  • Set IP address/Hostname of FortiManager
  • Set Port to 80
  • Disable Failover

9 - Use FortiManager for client software/signature updates

Obtaining latest packages

Download Signature Packages

  • Log in to https://support.fortinet.com/
  • Navigate to Support -> Service Updates -> FortiClient
  • Download latest package

 

10 - FortiCloud - Support - Service Updates

11 - FortiGuard Updates - FortiClient

12 - FortiClient Signature Packages

Configuring FortiManager

Upload Signature Package To FortiManager

  • Log in to FortiManager
  • Navigate to FortiGuard -> Packages
  • Click Import and select downloaded signature package

13 - FortiGuard - Packages

14 - Import FortiGuard Package

Configure FortiManager

  • On FortiManager navigate to FortiGuard -> Settings
  • Enable the option Enable AntiVirus and IPS Service
  • Select FortiGate and FortiClient versions to be used
  • Click Save

15 - FortiGuard - Settings - FortiClient

16 - Enable AntiVirus and IPS Service

Preparing WAN Interface

  • Log in to FortiManager using CLI
  • Enter following commands to prepare WAN interface and set the update service
  • config system interface
  • edit “port [number of WAN port]”
  • set allowaccess http https ssh
  • set serviceaccess fclupdates webfilter-antispam
  • end
  • config fmupdate fct-services
  • set status enable
  • set port 80
  • end

Network Settings

  • Navigate to System Settings -> Network
  • Select WAN Interface and click Edit
  • Under Administrative Access check if HTTP, HTTPS and Web Service is enabled
  • Under Administrative Access check if Web Filtering under Service Access is enabled

17 - System Settings - Network

18 - Edit Network Interface - Administrative Access

Pushing packages to clients

How to push Signature Packages to FortiClient from FortiManager automatically

  • FortiManager automatically pushes the latest Signature Packages to the FortiClient each time the telemetry synchronisation timer expires (default is 60 seconds)
  • To see the current timer and whether telemetry is synchronised, go to the host with FortiClient installed
  • Start FortiClient and navigate to ZERO TRUST TELEMETRY
  • Click the menu button
  • Timer is displayed

19 - FortiClient - Zero Trust Telemetry

How to push Signature Packages to FortiClient from FortiManager manually

  • If the packages are not pushed automatically, try pushing them manually
  • Log in to FortiClient EMS
  • Navigate to Endpoints -> All Endpoints
  • Select the endpoints to be updated
  • Click Action -> Update Signatures
  • Wait for telemetry sync timer
  • Check FortiClient for successful update

20 - Endpoints - All Endpoints - Action - Update Signatures

Debugging

Debugging – Option 1

  • If the packages do not push automatically or manually, try to debug
  • Log in to FortiClient EMS
  • Navigate to Endpoints -> All Endpoints
  • Select the affected endpoints
  • Click Action -> Request FortiClient Logs
  • Wait for 60 seconds
  • Click Action -> Download Available FortiClient Logs
  • Locate & review the update.txt file in the downloaded .zip file
  • Provide the file to your Fortinet contact or Fortinet support team

21 - Request FortiClient Logs - Download Available FortiClient Logs

22 - Update.txt

Debugging – Option 2

  • On the Windows client, start cmd.exe and navigate to the FortiClient folder
    • cd C:\Program Files\Fortinet\FortiClient (default install path)
  • Run update_task.exe with the following parameters to retrieve the signature package from FortiClient EMS and start updating FortiClient
    • update_task.exe -s fd_01
  • Review the displayed logs and provide them to your Fortinet contact or Fortinet support team