Skip to content

Historian Tech

Guides and Designs for the Network Security Generalist

home
  • Application Security
    • FortiMail
    • FortiWeb
  • Network Security
    • FortiAP
    • FortiGate
  • Infrastructure Security
    • FortiAuthenticator
    • FortiManager
    • Splunk
  • Virtualization
    • Proxmox
  • Linux
    • Raspberry Pi
  • About
  • Application Security
    • FortiMail
    • FortiWeb
  • Network Security
    • FortiAP
    • FortiGate
  • Infrastructure Security
    • FortiAuthenticator
    • FortiManager
    • Splunk
  • Virtualization
    • Proxmox
  • Linux
    • Raspberry Pi
  • About
FortiClient FortiGate Infrastructure Security Network Security

Zero Trust Network Access – Regulating Secure Access with Endpoint Posture Checking by using Zero Trust Tags

Posted onJune 15, 2022June 16, 2022
FortiManager Infrastructure Security

Using FortiManager to Deploy Different Policy Packages at the same time

Posted onMay 2, 2022May 2, 2022
Azure Cloud FortiClient FortiGate Infrastructure Security Network Security

Zero Trust Network Accessing – Accessing Non-Web Applications from Secured Endpoint

Posted onFebruary 4, 2022February 4, 2022
FortiGate

Address Object Naming Best Practices

Next generation firewalls have a concept of using objects within firewall policies.  There are many benefits to this such as: Ability to reuse a single …

By Jonathan Torian
Posted onDecember 27, 2018December 30, 2018

Posts navigation

‹ 1 … 3 4 5

RSS Fortinet Firmware Updates

  • FortiDDoS-F 6.3.3 June 24, 2022
  • FortiOS 6.2.11 June 22, 2022
  • FortiSwitch 7.2.1 June 21, 2022
  • FortiAP 7.0.4 June 21, 2022
  • FortiProxy 7.0.5 June 20, 2022
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
© 2022 Historian Tech Powered by WordPress Theme by Design Lab