Fortinet black logo

Control Manager

Endpoint compliance policies

Endpoint compliance policies

Endpoint Compliance Polices are used to assess hosts and determine if they are safe. An Endpoint Compliance Policy is composed of building blocks, including: a User/Host Profile and an Endpoint Compliance Configuration. Refer to Endpoint compliance implementationfor information on the entire Endpoint Compliance feature.

When a host is evaluated and FortiNAC determines that the host requires an Endpoint Compliance Policy, the host and user are compared to the User/Host Profiles within each Endpoint Compliance Policy starting with the first policy in the list. When a match is found, the Endpoint Compliance Policy is applied. Once a policy is selected as a match for the host or user, the Endpoint Compliance Configuration within the policy determines the treatment that the host receives. An Endpoint Compliance Configuration specifies whether or not an agent is required and the scan parameters for scanning the host.

Endpoint Compliance policies created on the FortiNAC server will be ranked above global Endpoint Compliance Policies created on the FortiNAC Control Manager. The rank of a local Endpoint Compliance Policy can be adjusted above or below another local Endpoint Compliance Policy, but cannot be ranked below a global Endpoint Compliance Policy. The rank for a global Endpoint Compliance Policy cannot be modified from the FortiNAC server.

If the user/host does not match any policy, it is allowed to register with no scan and no policy.

There may be more than one Endpoint Compliance Policy that is a match for this host/user, however, the first match found is the one that is used.

If you create a User/Host Profile with fields Where (Location) set to Any, Who/What by Group set to Any, Who/What by Attribute left blank and When set to always, it matches ALL users and hosts. This is essentially a Catch All profile. If this User/Host Profile is used in a policy, all policies below that policy are ignored when assigning a policy to a user or a host. To highlight this, policies below the policy with the catch all profile are grayed out and have a line through the data.

The best way to use a Catch All profile is to create a general policy with that profile and place it last in the list of policies.

Endpoint Compliance Policies can be accessed from Policy > Policy Configuration > Endpoint Compliance, however configuration steps point you to Policy > Policy Configuration > Endpoint Compliance. See Navigation and Filters for information on common navigation tools and data filters.

Field

Definition

Rank Buttons

Moves the selected policy up or down in the list. Host connections are compared to Policies in order by rank.

Set Rank Button

Allows you to type a different rank number for a selected policy and immediately move the policy to that position. In an environment with a large number of policies this process is faster than using the up and down Rank buttons.

Table Columns

Global

The Global column always displays "Yes" on the FortiNAC Control Manager, and indicates which information will be synchronized with a FortiNAC Server upon manual or automatic synchronization. This information is read-only on the FortiNAC Server. Upon synchronization, the information is overwritten on the FortiNAC Server. See Server synchronization for more information.

Global information with a rank will always be ranked first on a FortiNAC Server. The rank of any item on a FortiNAC Server cannot be modified if it would result in changing the rank of a global item.

You can only modify or delete global information from the FortiNAC Control Manager.

Rank

Policy's rank in the list of policies. Rank controls the order in which host connections are compared to Policies.

Name

User defined name for the policy.

Endpoint
Compliance
Configuration

Contains the configuration for the Agent and Scan parameters that will be assigned if this Policy matches the connecting host and user. See Endpoint compliance configurations.

User/Host Profile

Contains the required criteria for a host or user, such as connection location, host or user group membership, host or user attributes or time of day. Host connections that match the criteria within the User/Host Profile are assigned the associated Endpoint Compliance Configuration. See User/host profiles.

Where (Location)

The connection location specified in the User/Host Profile. The host must connect to the network on a device, port or SSID contained within one of the groups shown here to be a match. When set to Any, this field is a match for all hosts or users.

Who/What by Group

User or Host group or groups specified in the User/Host Profile. These groups must contain the connecting user or host for the connection to be a match for this policy. When set to Any, this field is a match for all hosts or users.

Who/What by Attribute

User or Host attributes specified in the selected User/Host Profile. The connecting host or user must have the attributes to be a match. See User/host profile filter example.

When

The time frame specified in the selected User/Host Profile. The host must be on the network within this time frame to be a match. When set to Always this field is a match for all hosts or users.

Note

User specified note field. This field may contain notes regarding the data conversion from a previous version of FortiNAC.

Last Modified By

User name of the last user to modify the policy.

Last Modified Date

Date and time of the last modification to this policy.

Right Mouse Click Menu Options

Delete

Deletes the selected Endpoint Compliance Policy.

Modify

Opens the Modify Endpoint Compliance Policy window for the selected policy.

Show Audit Log

Opens the Admin Auditing Log showing all changes made to the selected item.

For information about the Admin Auditing Log, see Admin auditing

You must have permission to view the Admin Auditing Log. See Add an admin profile

Buttons

Export

Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF or RTF. See Export data.

Endpoint compliance policies

Endpoint Compliance Polices are used to assess hosts and determine if they are safe. An Endpoint Compliance Policy is composed of building blocks, including: a User/Host Profile and an Endpoint Compliance Configuration. Refer to Endpoint compliance implementationfor information on the entire Endpoint Compliance feature.

When a host is evaluated and FortiNAC determines that the host requires an Endpoint Compliance Policy, the host and user are compared to the User/Host Profiles within each Endpoint Compliance Policy starting with the first policy in the list. When a match is found, the Endpoint Compliance Policy is applied. Once a policy is selected as a match for the host or user, the Endpoint Compliance Configuration within the policy determines the treatment that the host receives. An Endpoint Compliance Configuration specifies whether or not an agent is required and the scan parameters for scanning the host.

Endpoint Compliance policies created on the FortiNAC server will be ranked above global Endpoint Compliance Policies created on the FortiNAC Control Manager. The rank of a local Endpoint Compliance Policy can be adjusted above or below another local Endpoint Compliance Policy, but cannot be ranked below a global Endpoint Compliance Policy. The rank for a global Endpoint Compliance Policy cannot be modified from the FortiNAC server.

If the user/host does not match any policy, it is allowed to register with no scan and no policy.

There may be more than one Endpoint Compliance Policy that is a match for this host/user, however, the first match found is the one that is used.

If you create a User/Host Profile with fields Where (Location) set to Any, Who/What by Group set to Any, Who/What by Attribute left blank and When set to always, it matches ALL users and hosts. This is essentially a Catch All profile. If this User/Host Profile is used in a policy, all policies below that policy are ignored when assigning a policy to a user or a host. To highlight this, policies below the policy with the catch all profile are grayed out and have a line through the data.

The best way to use a Catch All profile is to create a general policy with that profile and place it last in the list of policies.

Endpoint Compliance Policies can be accessed from Policy > Policy Configuration > Endpoint Compliance, however configuration steps point you to Policy > Policy Configuration > Endpoint Compliance. See Navigation and Filters for information on common navigation tools and data filters.

Field

Definition

Rank Buttons

Moves the selected policy up or down in the list. Host connections are compared to Policies in order by rank.

Set Rank Button

Allows you to type a different rank number for a selected policy and immediately move the policy to that position. In an environment with a large number of policies this process is faster than using the up and down Rank buttons.

Table Columns

Global

The Global column always displays "Yes" on the FortiNAC Control Manager, and indicates which information will be synchronized with a FortiNAC Server upon manual or automatic synchronization. This information is read-only on the FortiNAC Server. Upon synchronization, the information is overwritten on the FortiNAC Server. See Server synchronization for more information.

Global information with a rank will always be ranked first on a FortiNAC Server. The rank of any item on a FortiNAC Server cannot be modified if it would result in changing the rank of a global item.

You can only modify or delete global information from the FortiNAC Control Manager.

Rank

Policy's rank in the list of policies. Rank controls the order in which host connections are compared to Policies.

Name

User defined name for the policy.

Endpoint
Compliance
Configuration

Contains the configuration for the Agent and Scan parameters that will be assigned if this Policy matches the connecting host and user. See Endpoint compliance configurations.

User/Host Profile

Contains the required criteria for a host or user, such as connection location, host or user group membership, host or user attributes or time of day. Host connections that match the criteria within the User/Host Profile are assigned the associated Endpoint Compliance Configuration. See User/host profiles.

Where (Location)

The connection location specified in the User/Host Profile. The host must connect to the network on a device, port or SSID contained within one of the groups shown here to be a match. When set to Any, this field is a match for all hosts or users.

Who/What by Group

User or Host group or groups specified in the User/Host Profile. These groups must contain the connecting user or host for the connection to be a match for this policy. When set to Any, this field is a match for all hosts or users.

Who/What by Attribute

User or Host attributes specified in the selected User/Host Profile. The connecting host or user must have the attributes to be a match. See User/host profile filter example.

When

The time frame specified in the selected User/Host Profile. The host must be on the network within this time frame to be a match. When set to Always this field is a match for all hosts or users.

Note

User specified note field. This field may contain notes regarding the data conversion from a previous version of FortiNAC.

Last Modified By

User name of the last user to modify the policy.

Last Modified Date

Date and time of the last modification to this policy.

Right Mouse Click Menu Options

Delete

Deletes the selected Endpoint Compliance Policy.

Modify

Opens the Modify Endpoint Compliance Policy window for the selected policy.

Show Audit Log

Opens the Admin Auditing Log showing all changes made to the selected item.

For information about the Admin Auditing Log, see Admin auditing

You must have permission to view the Admin Auditing Log. See Add an admin profile

Buttons

Export

Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF or RTF. See Export data.