Monitoring endpoints
Endpoint control
FortiGate Version 4.0 Administration Guide
644
01-400-89802-20090424
Figure 428: Software Detection list for Endpoint Control
Monitoring endpoints
To view the list of known endpoints, go to
Endpoint Control > Endpoints
. An endpoint is
added to the list when it uses a firewall policy that has
Endpoint Compliance Check
enabled.
Once an endpoint is added to the list it remains there until you manually delete it or until
the FortiGate unit restarts. Every time an endpoint accesses network services through the
FortiGate unit (or attempts to access services) the entry for the endpoint is updated.
The endpoints list can provide an inventory of the endpoints on your network. Entries for
endpoints not running the FortiClient application include the IP address, last update time,
and traffic volume/attempts. The “non-compliant” status indicates the endpoint is not
running the FortiClient application.
Create New
Add an application to detect. See
“Viewing and configuring the software detection
.
Name
A descriptive name for the application.
Pattern
A pattern to match the application name as it appears in the endpoint’s Windows
Registry.
FortiClient matches the pattern against the endpoint’s Windows Registry. If
FortiClient finds a match, an entry is added to the
Detected Software
list for the
endpoint. Go to
Endpoint Control > Endpoints
to view all detected endpoints and
the
Detected Software
on each endpoint.
The pattern can consist of complete application names (for example, AppName) or
partial names (for example, App). Patterns are not case sensitive. The
Detected
Software
list shows the complete application name found in the registry by
FortiClient.
Patterns can be wildcards or Perl regular expressions. For example, you can use
regular expressions in a search to distinguish between product names with the
same base name, such as “My App” and “My App Reader”. To detect “My App”
only, enter the pattern “My App$”. For more information about using wildcards and
Perl regular expressions, see
“Using wildcards and Perl regular expressions” on
Delete icon
Remove this item from the list.
Edit icon
Modify this item. See
“Viewing and configuring the software detection list” on
Delete
Edit
Summary of Contents for Gate 60D
Page 705: ...www fortinet com...
Page 706: ...www fortinet com...