Fortinet black logo

Known issues

Known issues

The following issues have been identified in FortiClient (Windows) 6.4.2. For inquiries about a particular bug or to report a bug, contact Customer Service & Support.

Endpoint control

Bug ID Description
645799

FortiClient (Windows) reports off-fabric status when policy does not include on-fabric detection rules.

648153

FortiClient gets stuck as registered to EMS but in an unreachable state.

648651

FortiClient (Windows) reaches Unable to retrieve EMS Details state after user cancels popup windows for connection key.

658673

No FortiClient IPsec VPN information in Security Fabric logical topology.

667757

Bitlocker Zero Trust tagging rule does not match on endpoint with USB drive attached.

673183

FortiClient must properly handle trying to register to FortiClient Cloud with invitation code with errors.

683097

FortiClient (Windows) shows incorrect connection details.

683542

FortiClient (Windows) fails to register to EMS if registration key contains special character.

684714

FortiClient should send full keepalive (KA), not short KA, after registration.

GUI

Bug ID

Description

627338

EMS shows incorrect user information in endpoint summary when Google/LinkedIn option is selected in FortiClient (Windows) About page.

666964

ISDB_map and ISDB_app signatures should be visible on About page.

676405

@ displays in GUI as %40.

683027

FortiClient (Windows) shows quarantine message even if Application Firewall is not installed and quarantine mode will not work.

Install and deployment

Bug ID

Description

622685 FortiClient (Windows) that EMS has uninstalled has many leftover files.

684283

FortiClient (Windows) does not display reboot prompt after manual upgrade.

Malware Protection and Sandbox

Bug ID

Description

598846

FortiClient can open attached file before receiving Sandbox result for the attachment.

623867

Machines cannot connect to FortiSandbox Cloud with port 514 open.

660320

Antivirus AMSI feature crashes Visual Studio project.

663615

Blocked exploit attempts shows as 0 when antiexploit events have been triggered.

667964

Protected files may already have been encrypted and failed to be restored when FortiClient detects and suspends the suspicious process.

668098

Antiransomware fails to work after timeout.

668467

Antiransomware has popup and logging issues.

668719

Realtime protection on Citrix VDA server blocks remote sessions.

673671

fmon.exe locks with writers some files stored in excluded folders.

680888

GUI should show violation counter for ransomware activity.

Remote Access

Bug ID

Description

627339

FortiClient (Windows) fails to establish SAML VPN connection if FortiOS SSL setting Require Client Certificate is enabled.

631751

SAML login does not work for IPv6.

636076

SSL VPN TLS 1.3 does not work.

649688

With per-app VPN split tunnel, websites with HTTP defined in <fqdn> do not work properly.

658548

FortiClient registers all interfaces' IP addresses to the DNS server when IPsec VPN tunnel is up.

660902

FortiClient (Windows) cannot connect to VPN when push tokens are enabled and certificate is untrusted.

668544

FortiClient (Windows) cannot connect to IPsec VPN if password is saved and certificate required.

669574

FortiClient (Windows) does not automatically restore DNS settings after closing VPN tunnel.

671392

Restarting Windows does not remove SSL VPN tunnel established by VPN before logon.

672744

Application-based split tunnel does not send traffic outside tunnel.

673186

When system level proxy is enabled and certificate is in local machine, SSL VPN fails to work and gets stuck during connection.

681254

IPsec VPN IKEv2 and always-up do not work reliably.

682675

SSL VPN users cannot set new PIN after it expires with RSA RADIUS authentication.

Vulnerability Scan

Bug ID

Description

639107

Vulnerability scan cannot patch Firefox: Error connecting to patch website. Please try again later.

647794

Vulnerability patch status does not change from scheduled to failed if FortiClient cannot autopatch it.

658521

Vulnerability scan reports excluded applications.

663788

FortiClient (Windows) starts Windows update services upon Vulnerability Scan execution.

Web Filter

Bug ID Description
617526 Web Filter Chrome plugin fails to update block or warning page message.
663084 FortiClient fails to block phishing sites.

Logs

Bug ID

Description

650334

Feature list for log settings are inconsistent between EMS and FortiClient (Windows).

652647

FortiClient fails to upload large diagnostic tool result file to EMS.

665179

Antiransomware event that FortiClient (Windows) sends to FortiAnalyzer has only vague Found suspicious process message.

666410

FortiClient clients do not generate endpoint control log for FortiAnalyzer.

667179

FortiClient (Windows) does not send diagnostic result to EMS.

675451

GUI displays incorrect logs settings compared to logs setting in EMS profile.

Other

Bug ID

Description

582302 FortiClient cannot get signature from FortiManager using HTTPS because failed certificate check.

Known issues

The following issues have been identified in FortiClient (Windows) 6.4.2. For inquiries about a particular bug or to report a bug, contact Customer Service & Support.

Endpoint control

Bug ID Description
645799

FortiClient (Windows) reports off-fabric status when policy does not include on-fabric detection rules.

648153

FortiClient gets stuck as registered to EMS but in an unreachable state.

648651

FortiClient (Windows) reaches Unable to retrieve EMS Details state after user cancels popup windows for connection key.

658673

No FortiClient IPsec VPN information in Security Fabric logical topology.

667757

Bitlocker Zero Trust tagging rule does not match on endpoint with USB drive attached.

673183

FortiClient must properly handle trying to register to FortiClient Cloud with invitation code with errors.

683097

FortiClient (Windows) shows incorrect connection details.

683542

FortiClient (Windows) fails to register to EMS if registration key contains special character.

684714

FortiClient should send full keepalive (KA), not short KA, after registration.

GUI

Bug ID

Description

627338

EMS shows incorrect user information in endpoint summary when Google/LinkedIn option is selected in FortiClient (Windows) About page.

666964

ISDB_map and ISDB_app signatures should be visible on About page.

676405

@ displays in GUI as %40.

683027

FortiClient (Windows) shows quarantine message even if Application Firewall is not installed and quarantine mode will not work.

Install and deployment

Bug ID

Description

622685 FortiClient (Windows) that EMS has uninstalled has many leftover files.

684283

FortiClient (Windows) does not display reboot prompt after manual upgrade.

Malware Protection and Sandbox

Bug ID

Description

598846

FortiClient can open attached file before receiving Sandbox result for the attachment.

623867

Machines cannot connect to FortiSandbox Cloud with port 514 open.

660320

Antivirus AMSI feature crashes Visual Studio project.

663615

Blocked exploit attempts shows as 0 when antiexploit events have been triggered.

667964

Protected files may already have been encrypted and failed to be restored when FortiClient detects and suspends the suspicious process.

668098

Antiransomware fails to work after timeout.

668467

Antiransomware has popup and logging issues.

668719

Realtime protection on Citrix VDA server blocks remote sessions.

673671

fmon.exe locks with writers some files stored in excluded folders.

680888

GUI should show violation counter for ransomware activity.

Remote Access

Bug ID

Description

627339

FortiClient (Windows) fails to establish SAML VPN connection if FortiOS SSL setting Require Client Certificate is enabled.

631751

SAML login does not work for IPv6.

636076

SSL VPN TLS 1.3 does not work.

649688

With per-app VPN split tunnel, websites with HTTP defined in <fqdn> do not work properly.

658548

FortiClient registers all interfaces' IP addresses to the DNS server when IPsec VPN tunnel is up.

660902

FortiClient (Windows) cannot connect to VPN when push tokens are enabled and certificate is untrusted.

668544

FortiClient (Windows) cannot connect to IPsec VPN if password is saved and certificate required.

669574

FortiClient (Windows) does not automatically restore DNS settings after closing VPN tunnel.

671392

Restarting Windows does not remove SSL VPN tunnel established by VPN before logon.

672744

Application-based split tunnel does not send traffic outside tunnel.

673186

When system level proxy is enabled and certificate is in local machine, SSL VPN fails to work and gets stuck during connection.

681254

IPsec VPN IKEv2 and always-up do not work reliably.

682675

SSL VPN users cannot set new PIN after it expires with RSA RADIUS authentication.

Vulnerability Scan

Bug ID

Description

639107

Vulnerability scan cannot patch Firefox: Error connecting to patch website. Please try again later.

647794

Vulnerability patch status does not change from scheduled to failed if FortiClient cannot autopatch it.

658521

Vulnerability scan reports excluded applications.

663788

FortiClient (Windows) starts Windows update services upon Vulnerability Scan execution.

Web Filter

Bug ID Description
617526 Web Filter Chrome plugin fails to update block or warning page message.
663084 FortiClient fails to block phishing sites.

Logs

Bug ID

Description

650334

Feature list for log settings are inconsistent between EMS and FortiClient (Windows).

652647

FortiClient fails to upload large diagnostic tool result file to EMS.

665179

Antiransomware event that FortiClient (Windows) sends to FortiAnalyzer has only vague Found suspicious process message.

666410

FortiClient clients do not generate endpoint control log for FortiAnalyzer.

667179

FortiClient (Windows) does not send diagnostic result to EMS.

675451

GUI displays incorrect logs settings compared to logs setting in EMS profile.

Other

Bug ID

Description

582302 FortiClient cannot get signature from FortiManager using HTTPS because failed certificate check.