Fortinet black logo

Upgrading from previous FortiClient versions

Upgrading from previous FortiClient versions

FortiClient version 6.0.0 supports upgrade from FortiClient versions 5.4 and later.

If you are deploying an upgrade from FortiClient 5.6.2 or earlier versions via FortiClient EMS and the upgrade fails, uninstall FortiClient on the endpoints, then deploy the latest version of FortiClient.

Deploying FortiClient upgrades on Windows 7 endpoints via FortiClient EMS

When deploying FortiClient upgrades to Windows 7 endpoints via FortiClient EMS, the following steps are necessary to ensure a successful upgrade:

  1. Install the Windows Update Hot Fix. Update to enable TLS 1.1 and TLS 1.2 as a default security protocol in WinHTTP (KB3140245). See the Microsoft Update Catalog.
    note icon

    If regular Windows Update is enabled by default, this KB is already installed.

  2. Create a DWORD registry entry: DefaultSecureProtocols in the path:

    x86 -

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp

    x64 -

    HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp

    Set the value to 0x00000A00 to enable both TLS 1.1 and 1.2.

See also Update to enable TLS 1.1 and TLS 1.2 as a default secure protocols in WinHTTP in Windows.

Upgrading from previous FortiClient versions

FortiClient version 6.0.0 supports upgrade from FortiClient versions 5.4 and later.

If you are deploying an upgrade from FortiClient 5.6.2 or earlier versions via FortiClient EMS and the upgrade fails, uninstall FortiClient on the endpoints, then deploy the latest version of FortiClient.

Deploying FortiClient upgrades on Windows 7 endpoints via FortiClient EMS

When deploying FortiClient upgrades to Windows 7 endpoints via FortiClient EMS, the following steps are necessary to ensure a successful upgrade:

  1. Install the Windows Update Hot Fix. Update to enable TLS 1.1 and TLS 1.2 as a default security protocol in WinHTTP (KB3140245). See the Microsoft Update Catalog.
    note icon

    If regular Windows Update is enabled by default, this KB is already installed.

  2. Create a DWORD registry entry: DefaultSecureProtocols in the path:

    x86 -

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp

    x64 -

    HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp

    Set the value to 0x00000A00 to enable both TLS 1.1 and 1.2.

See also Update to enable TLS 1.1 and TLS 1.2 as a default secure protocols in WinHTTP in Windows.