Forticlient Ems - Quickstart Guide
Forticlient Ems - Quickstart Guide
Version 6.2.6
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com/
FEEDBACK
Email: [email protected]
Introduction 5
Supported installation platforms 5
Requirements for managing Chromebooks 5
Required services and ports 5
Deployment options 7
Standalone 8
Integrated with FortiGate 8
Chromebook setup 9
Install preparation for managing Chromebooks 9
How FortiClient EMS and FortiClient work with Chromebooks 9
Installation 11
Downloading the installation file 11
Installing FortiClient EMS 11
Licensing EMS by logging in to FortiCloud 13
Starting FortiClient EMS and logging in 15
Accessing FortiClient EMS remotely 15
Windows, macOS, and Linux endpoint management setup 16
FortiClient EMS 16
FortiClient EMS integrated with FortiGate 17
Configuring user accounts 17
Adding endpoints 18
Creating a Telemetry gateway list 19
Adding a FortiClient deployment package 20
Creating a profile to deploy FortiClient 22
Preparing Windows endpoints for FortiClient deployment 24
Adding an endpoint policy 24
Viewing endpoints 26
Viewing the Endpoints pane 26
Using the quick status bar 30
Viewing endpoint details 31
FortiClient EMS for Chromebooks setup 32
Google Admin Console setup 32
Logging into the Google Admin console 32
Adding the FortiClient Web Filter extension 33
Configuring the FortiClient Web Filter extension 33
Adding root certificates 34
Disabling access to Chrome developer tools 36
Disallowing incognito mode 36
Disabling guest mode 37
Blocking the Chrome task manager 37
Service account credentials 38
Configuring default service account credentials 38
Configuring unique service account credentials 39
This guide describes how to install and set up FortiClient Endpoint Management Server (EMS) for the first time. You can
use FortiClient EMS to deploy and manage FortiClient endpoints. This guide also describes how to set up the Google
Admin console to use the FortiClient Web Filter extension. Together the products also provide web filtering for Google
Chromebook users.
An informative video introducing you to FortiClient EMS is available in the Fortinet Video
Library.
You can install FortiClient EMS on Microsoft Windows Server 2012 R2 or newer.
For information about minimum system requirements and supported platforms, see the
FortiClient EMS Release Notes.
Using FortiClient EMS for managing Chromebooks requires the following components and knowledge:
l FortiClient EMS installer
l FortiClient Web Filter extension available in the Google Web Store for Chrome OS
l G Suite account
l Knowledge of administering the Google Admin console
l A domain configured in the Google Admin console
l SSL certificate to support communication between FortiClient Web Filter extension and FortiClient EMS
l SSL certificate to support communication between FortiClient Web Filter extension and FortiAnalyzer for logging, if
using
l Unique set of service account credentials
You must ensure required ports and services are enabled for use by FortiClient EMS and its associated applications on
your server. The required ports and services enable FortiClient EMS to communicate with endpoints and servers running
associated applications. You do not need to enable ports 8013 and 10443 as the FortiClient EMS installation opens
these.
Samba (SMB) FortiClient EMS uses the SMB TCP 445 Outgoing N/A
service service during FortiClient initial
deployment.
Distributed The FortiClient EMS server TCP 135 Outgoing N/A
Computing connects to endpoints using
Environment / RPC for FortiClient initial
Remote deployment.
Procedure Calls
(DCE/RPC)
Active Directory Retrieving workstation and user TCP 389 Outgoing GUI
server connection information (LDAP)
or
636
(LDAPS)
FortiClient FortiClient EMS uses ICMP for ICMP N/A Outgoing N/A
endpoint probing endpoint probing during
FortiClient initial deployment.
The following ports and services only apply when using FortiClient EMS to manage Chromebooks:
You can
customize
this port.
You should enable the following ports and services for use on Chromebooks when using FortiClient for Chromebooks:
FortiClient EMS Connecting to the profile server TCP 8443 Outgoing Via Google
(default) Admin
console
when
adding the
profile
For the list of required services and ports for FortiClient, see the FortiClient Administration
Guide.
Deployment options
The following deployment options for FortiClient EMS are supported: standalone or integrated with FortiGate.
Standalone
In standalone mode, a FortiGate is not required. In standalone mode, EMS deploys FortiClient software on endpoints,
and FortiClient endpoints connect FortiClient Telemetry to EMS to receive configuration information from EMS.
EMS also sends compliance verification rules to FortiClient, and use the results from FortiClient to dynamically group
endpoints in EMS. EMS is used to deploy, configure, and monitor FortiClient endpoints.
In integrated mode, a FortiGate is required, and NAC is supported. In this scenario, FortiClient Telemetry connects to
EMS to receive a profile of configuration information as part of an endpoint policy and to FortiGate to participate in the
Fortinet Security Fabric. The FortiGate can also receive dynamic endpoint group lists from EMS and use them to build
dynamic firewall policies. Depending on the EMS compliance verification rules and policies configured in FortiOS, the
FortiClient endpoint may be blocked from accessing the network.
Chromebook setup
The following sections only apply if you plan to use FortiClient EMS to manage Chromebooks:
G Suite account
You need to sign up for your G Suite account before you can use the Google service and manage your Chromebook
users.
The G Suite account is different from the free consumer account. The G Suite account is a paid account that gives
access to a range of Google tools, services, and technology.
You can sign up for a G Suite account here.
In the signup process, you must use your email address to verify your Google domain. This also proves you have
ownership of the domain.
SSL certificates
FortiClient EMS requires an SSL certificate signed by a Certificate Authority (CA) in pfx format. Use your CA to generate
a certificate file in pfx format, and remember the configured password. For example, the certificate file name is
server.pfx with password 111111.
The server where FortiClient EMS is installed should have an FQDN, such as ems.forticlient.com, and you must specify
the FQDN in your SSL certificate.
If you are using a public SSL certificate, the FQDN can be included in Common Name or Subject Alternative Name.
You must add the SSL certificate to FortiClient EMS. See Adding an SSL certificate to FortiClient EMS for Chromebook
endpoints on page 44. You do not need to add the root certificate to the Google Admin console.
If you are using a self-signed certificate (non-public SSL certificate), your certificate's Subject Alternative Name must
include DNS:<FQDN>, for example, DNS:ems.forticlient.com. You must add the SSL certificate to FortiClient
EMS and the root certificate to the Google Admin console to allow the extension to trust FortiClient EMS. See Adding
root certificates on page 34.
After you install and configure FortiClient EMS, the Google Admin console, and the FortiClient Web Filter extension,
the products work together to provide web filtering security for Google Chromebook users logged into the Google
domain. Following is a summary of how the products work together after setup is complete:
1. A user logs into the Google Chromebook.
2. The Google Chromebook downloads the FortiClient Web Filter extension.
3. FortiClient connects to FortiClient EMS.
4. FortiClient downloads a profile to the Google Chromebook. The profile contains web filtering settings from
FortiClient EMS.
5. The user browses the Internet on the Google Chromebook.
FortiClient EMS is necessary to install on endpoints. For a complete endpoint solution, use FortiClient EMS for central
management and provisioning of endpoints.
Following is a summary of how to install and start FortiClient EMS:
1. Download the installation file. See Downloading the installation file on page 11.
2. Install FortiClient EMS. See Installing FortiClient EMS on page 11.
3. Start FortiClient EMS and log in. See Starting FortiClient EMS and logging in on page 15.
For information about upgrading FortiClient EMS, see the FortiClient EMS Release Notes.
A video on how to install, log in, and change your administrator password is available in the
Fortinet Video Library.
FortiClient EMS is available for download from the Fortinet Support website.
You can also receive the installation file from a sales representative.
The following installation file is available for FortiClient EMS:
FortiClientEndpointManagement_6.2.6.<build>_x64.exe
For information about obtaining FortiClient EMS, contact your Fortinet reseller.
Local administrator rights and Internet access are required to install FortiClient EMS.
1. If you are logged into the system as an administrator, double-click the downloaded installation file.
If you are not logged in as an administrator, right-click the installation file, and select Run as administrator.
2. If applicable, select Yes in the User Account Control window to allow the program to make changes to your
system.
3. In the installation window, select I agree to the license terms and conditions if you agree with the license terms
and conditions. If you do not agree, you cannot install the software.
4. (Optional) Click Options to specify a custom directory for the FortiClient EMS installation.
6. When the program has installed correctly, the Success window displays. Click Close.
You must license FortiClient EMS to use it for endpoint management and provisioning.
The following steps assume that you have already acquired an EMS installation file from FortiCare or a Fortinet sales
representative for evaluation purposes and installed EMS.
1. In EMS, in the License Information widget, click Add beside FortinetOne Account.
2. In the FortinetOne Registration dialog, enter your FortiCloud account credentials. If you do not have a FortiCloud
account, create one.
3. Read and accept the license agreement terms.
4. Click Login & Start Trial. If your FortiCloud account is eligible for an EMS trial license, the License Information
widget updates with the trial license information, and you can now manage ten Windows, macOS, Linux, iOS, and
Android endpoints and ten Chromebook endpoints.
The following steps assume that you have already purchased and acquired your EMS and FortiClient licenses from a
Fortinet reseller.
1. Log in to your FortiCloud account on Customer Service & Support.
2. Go to Asset > Register/Activate.
3. In the Specify Registration Code field, enter the Contract Registration Code from your service registration
document. Configure other fields as required, then click Next.
4. In the Hardware ID field, enter the hardware ID found in Administration > Configure License in EMS. Configure
other fields as required, then click Next.
5. Complete the registration, then click Confirm.
6. As described in the FortiClient EMS Administration Guide, you can apply multiple license types to the same EMS
server. For example, if you have already applied a Fabric Agent license to your EMS server, you can apply another
license type, such as a Chromebook license, to the same EMS server. If desired, add another license type:
c. On the Specify Fortinet Registration Information page, enter the EMS serial number or select the
EMS instance from the list. You can find the EMS serial number in Administration > Configure License in
EMS. Click Next.
d. Complete the registration, then click Confirm.
7. License FortiClient EMS:
a. Go to Administration > Configure License.
b. For License Source, select FortiCare.
c. In the FortinetOne Account field, enter your FortiCloud account ID or email address.
d. In the Password field, enter your FortiCloud account password.
e. Click Login & Update License. Once your account information is authenticated, EMS updates the Configure
License page with the serial number and license information that it retrieved from FortiCloud.
EMS reports the following information to FortiCare. FortiCare displays this information in its dashboard and asset
management pages:
l EMS software version
l Number of FortiClient endpoints currently actively licensed under and being managed by this EMS
l Endpoint license expiry statuses. You can use this information to plan license renewals.
Using a second license to extend the license expiry date does not increase the number of
licensed clients. To increase the number of licensed clients, contact Fortinet Support for a co-
term contract.
If you previously activated another license with the same EMS hardware ID, you will receive a
duplicated UUID error. In this case, you must contact Customer Support to remove the
hardware ID from the old license.
You can access FortiClient EMS remotely using a web browser instead of the GUI.
This section describes how to set up FortiClient EMS for Windows, macOS, and Linux endpoint management. It
provides an overview of using FortiClient EMS and FortiClient EMS integrated with FortiGate.
When FortiClient EMS is integrated with FortiGate, you can use Telemetry gateway lists to help FortiClient endpoints
connect to FortiClient EMS and FortiGate.
FortiClient EMS
FortiClient EMS can deploy FortiClient (Windows) to AD endpoints that do not have
FortiClient installed, as well as upgrade existing FortiClient installations if the endpoints
are already connected to the EMS server. To allow initial deployment, EMS must be able
to resolve the endpoint IP address via the DNS configured on the server.
You can use with workgroups only to upgrade FortiClient (Windows) on endpoints after
they connect Telemetry. When using workgroups, you must separately install FortiClient
(Windows) on endpoints.
You can use FortiClient EMS to replace, upgrade, and uninstall FortiClient (macOS) after
they connect Telemetry to EMS and FortiClient connects to FortiClient EMS. You cannot
use FortiClient EMS to initially deploy FortiClient (macOS) and must separately install it
on endpoints. See the FortiClient EMS Administration Guide.
5. Prepare Windows endpoints for FortiClient deployment. See Preparing Windows endpoints for FortiClient
deployment on page 24.
You must also prepare the Windows AD server for deployment. See the FortiClient EMS Administration Guide.
6. Create an endpoint policy configured with the desired endpoint profile. Configure the endpoint policy for the desired
workgroup, domain, endpoint group, or organizational group. See Adding an endpoint policy on page 24.
Depending on the selected profile's configuration, FortiClient is installed on the endpoints to which the profile is
applied.
After FortiClient installation, the endpoint connects FortiClient Telemetry to FortiClient EMS to receive the profile
configuration and complete endpoint management setup.
7. View the endpoint status. See Viewing endpoints on page 26.
Following is a summary of how to use FortiClient EMS when integrated with FortiGate:
1. Configure user accounts. See Configuring user accounts on page 17.
2. Add domains and/or discover local endpoints. See Adding endpoints on page 18
3. Create Telemetry gateway lists. See Creating a Telemetry gateway list on page 19.
4. Add a FortiClient deployment package to EMS. See Adding a FortiClient deployment package on page 20.
5. Create an endpoint profile and select a FortiClient deployment package. See Creating a profile to deploy
FortiClient on page 22.
FortiClient EMS can deploy FortiClient (Windows) to AD endpoints that do not have
FortiClient installed, as well as upgrade existing FortiClient installations if the endpoints
are already connected to the EMS server. To allow initial deployment, EMS must be able
to resolve the endpoint IP address via the DNS configured on the server.
You can use with workgroups only to upgrade FortiClient (Windows) on endpoints after
they connect Telemetry to EMS. When using workgroups, you must separately install
FortiClient (Windows) on endpoints.
You can use FortiClient EMS to replace, upgrade, and uninstall FortiClient (macOS) after
they connect Telemetry to EMS and FortiClient connects to FortiClient EMS. You cannot
use FortiClient EMS to initially deploy FortiClient (macOS) and must separately install it
on endpoints. See the FortiClient EMS Administration Guide.
6. Prepare Windows endpoints for FortiClient deployment. See Preparing Windows endpoints for FortiClient
deployment on page 24.
You must also prepare the Windows AD server for deployment. See the FortiClient EMS Administration Guide.
7. Create an endpoint policy configured with the desired endpoint profile and Telemetry gateway list. Configure the
endpoint policy for the desired workgroup, domain, endpoint group, or organizational group. See Adding an
endpoint policy on page 24.
Depending on the selected profile's configuration, FortiClient is installed on the endpoints to which the profile is
applied.
After FortiClient installation, the endpoint connects FortiClient Telemetry to FortiClient EMS to receive the profile
configuration and complete endpoint management setup.
8. View the endpoint status. See Viewing endpoints on page 26.
You can configure users to have no access or administrator access to FortiClient EMS. You can configure EMS users,
local Windows users, LDAP users, or local Windows users and LDAP users.
For EMS users, you create a new user account from EMS.
For local Windows users, the user list is derived from the server where FortiClient EMS is installed. If you want to add
more users, you must add them to the server.
For LDAP users, you must add an LDAP server to FortiClient EMS, then configure users.
To configure users:
Adding endpoints
You can manually import endpoints from an AD server. You can import and synchronize information about computer
accounts with an LDAP or LDAPS service. You can add endpoints by identifying endpoints that are part of an AD domain
server.
EMS does not support importing subdomains if you have already imported the parent domain
in to EMS.
Distinguished name Enter the distinguished name (DN) (optional). You must use only capital
letters when configuring the DN.
Bind type Select the bind type: Simple, Anonymous, or Regular. When you select
Regular, you must enter the Username and Password.
Username Available when Bind type is set to Regular. Enter the username.
Password Available when Bind type is set to Regular. Enter the user password.
Show Password Available when Bind type is set to Regular. Turn on and off to show or hide
the password.
LDAPS connection Enable a secure connection protocol when Bind Type is set to Regular.
Sync every Enter the sync schedule between FortiClient EMS and the domain in minutes.
The default is ten minutes.
After importing endpoints from an AD server, you can edit the endpoints. These changes do
not sync back to the AD server.
You can create a Telemetry gateway list that contains IP addresses for one or multiple FortiGates and EMS servers.
FortiClient searches for IP addresses in its subnet in the Telemetry gateway list and connects to the FortiGate in the list
that is in the same subnet as the host system.
If FortiClient cannot find any FortiGates in its subnet, it attempts to connect to the first reachable FortiGate in the list,
starting from the top. FortiClient maintains the list order as configured in the Telemetry gateway list.
Use connection key Enable the connection key endpoints can use to connect to
FortiGates.
Managed by EMS Select an option from the dropdown list. Users can configure this
IP address in System Settings > Server.
4. Click Save.
When you create a FortiClient deployment package in FortiClient EMS, you can specify what FortiClient features to
include in the deployment package for the endpoint. You can include a feature in the deployment package, then disable
the feature in the profile. Because the feature is included in the deployment package, you can update the profile later to
enable the feature on the endpoint.
For example, consider that you create a deployment package that has SSL VPN and IPsec VPN enabled. You then
assign the deployment package to a profile where VPN is disabled. The endpoints that you deploy the profile to will have
VPN disabled. At a later time, if you enable VPN on the profile, the endpoints will then have VPN enabled, since you
included it in the deployment package.
After you add a FortiClient deployment package to FortiClient EMS, you cannot edit it. You
can delete the deployment package from FortiClient EMS, and edit the deployment package
outside of FortiClient EMS. You can then add the edited deployment package to FortiClient
EMS.
Installer Type Use an official or custom FortiClient installer. See FortiClient installers.
Keep updated to the latest Enable FortiClient to automatically update to the latest patch release when
patch FortiClient is installed on an endpoint.
Security Fabric Agent Enabled by default and cannot be disabled. Installs FortiClient with Telemetry
and Vulnerability Scan enabled.
Secure Access Architecture Install FortiClient with SSL and IPsec VPN enabled. Disable to omit SSL and
Components IPsec VPN support from the FortiClient deployment package.
If you enable this feature for a deployment package and include a
preconfigured VPN tunnel in the included endpoint profile, users who use this
deployment package to install FortiClient can connect to this preconfigured
VPN tunnel for three days after their initial FortiClient installation. This is
useful for remote users, as it allows them to connect to the corporate network
to activate their FortiClient license. If the user does not activate their
FortiClient license within the three days, all FortiClient features, including
VPN, stop working on their device.
See VPN for details on configuring a VPN tunnel.
Advanced Persistent Threat Install FortiClient with APT components enabled. Disable to omit APT
(APT) Components components from the FortiClient deployment package. Includes FortiSandbox
detection and quarantine features.
Enable desktop shortcut Configure the FortiClient deployment package to create a desktop shortcut on
the endpoint.
Enable start menu shortcut Configure the FortiClient deployment package to create a Start menu shortcut
on the endpoint.
Enable Installer ID Configure an installer ID. Select an existing installer ID or enter a new installer
ID. If creating an installer ID, select a group path or create a new group in the
Group Path field. FortiClient EMS automatically groups endpoints according
to installer ID group assignment rules.
If you manually move the endpoint to another group after EMS places it into
the group defined by the installer ID group assignment rule, EMS returns the
endpoint to the group defined by the installer ID group assignment rule.
Enable Endpoint Profile Select an endpoint profile to include in the installer. EMS applies the profile to
the endpoint once it has installed FortiClient. This option is necessary if it is
required to have certain security features enabled prior to contact with EMS,
or if users require VPN connection to connect to EMS.
7. Click Next. The Telemetry tab displays the hostname and IP address of the FortiClient EMS server, which will
manage FortiClient once it is installed on the endpoint. Also configure the following option:
Enable telemetry connection Enable this option, and select the name of the gateway list to use. The
to Security Fabric gateway list defines the IP address for the FortiGate.
(FortiGate) If you have not created a gateway list, this option is not available.
8. Click Finish. The FortiClient deployment package is added to FortiClient EMS and displays on the Manage
Installers > Deployment Packages pane. The deployment package may include .exe (32-bit and 64-bit), .msi, and
.dmg files depending on the configuration. The following shows an example of a deployment package that includes
.exe, .msi, and .dmg files. The end user can download these files to install FortiClient on their machine with the
desired configuration.
If the Sign software packages option is enabled in System Settings > Server, Windows
deployment packages display as being from the publisher specified in the certificate file. See
the FortiClient EMS Administration Guide.
Installing FortiClient EMS creates a default profile. EMS applies this profile to any groups that you create. The default
profile is designed to provide effective levels of protection. To use specific features, such as application firewall, create
a new profile or change the default profile.
Consider the following when creating profiles:
1. Go to Endpoint Profiles > Manage Profile, and click the Add button.
2. On the Deployment tab, enable FortiClient Deployment. The FortiClient deployment options display.
3. Set the following options on the Deployment tab:
Action
Deployment Package In the Deployment Package list, select the desired FortiClient
deployment package.
The selected FortiClient deployment package affects what tabs
display for configuration. Only tabs related to features enabled in
the FortiClient deployment package display for configuration.
Schedule
Reboot When Needed Reboot the endpoint to install FortiClient when needed.
Reboot when no Allow the endpoint to reboot without prompt if no endpoint user is
users are logged in logged into FortiClient.
Notify users and let Notify the end user if a reboot of the endpoint is needed and allow
the user decide the user to decide what time to reboot the endpoint. Disable to
when to reboot reboot the endpoint without notifying the user.
when they are
logged in
Credentials
You must enable and configure the following services on each Windows endpoint before deploying FortiClient:
l Task Scheduler: Automatic
l Windows Installer: Manual
l Remote Registry: Automatic
You must configure Windows Firewall to allow the following inbound connections:
l File and Printer Sharing (SMB-In)
l Remote Scheduled Tasks Management (RPC)
AD group deployments require an AD administrator account. For non-AD deployments, you can share the deployment
package URL with users, who can then download and install FortiClient manually. You can locate the deployment
package URL in Manage Installers > Deployment Packages.
When adding endpoints using an AD domain server, FortiClient EMS automatically resolves
endpoint IP addresses during initial deployment of FortiClient. FortiClient EMS can deploy
FortiClient (Windows) to AD endpoints that do not have FortiClient installed, as well as
upgrade existing FortiClient installations if the endpoints are already connected to FortiClient
EMS.
Endpoint policy name Enter the desired name for the endpoint policy.
Endpoint workgroups Select the workgroups of endpoints to apply the policy to.
Endpoint profile Include an endpoint profile in the policy. From the dropdown list, select the
desired endpoint profile.
Endpoint profile (Off-net) Include an endpoint profile in the policy to apply to the endpoint when it is off-
net according to the on-net detection rules configured in this policy. For
example, you may want to apply a more restrictive profile to the endpoint
when it is determined to be off-net. From the dropdown list, select the desired
endpoint profile.
If including an off-net profile in a policy, it is highly recommended to also
include on-net detection rules in the policy. Otherwise, EMS may not apply on-
net and off-net profiles as desired.
On-Net Detection Rules Select the on-net detection rules to include in the policy. You can select
multiple rules.
You must have already created on-net detection rules to include them in an
endpoint policy. See On-net Detection Rules.
Telemetry gateway list Include a Telemetry gateway list in the policy. From the dropdown list, select
the desired Telemetry gateway list.
You must have already created a Telemetry gateway list to include one in an
endpoint policy. See Creating a Telemetry gateway list on page 19.
Enable the policy Toggle to enable or disable the endpoint policy. You can enable or disable the
policy at a later time from Endpoint Policy > Manage Policies.
4. Click Save. You can view the newly created policy on the Endpoint Policy > Manage Policies page.
On the Endpoints pane, you can see that endpoints that belong to the All Groups/Seattle/HR group have the
endpoint profile and Telemetry gateway list configured in the endpoint policy (Seattle_HR and FGT_Seattle_floor2,
respectively) applied:
EMS pushes these settings to the endpoint with the next Telemetry communication.
In this example, endpoints in the All Groups/Seattle/HR group are applicable for the Seattle_HR policy. If both the
Seattle_general policy (applied to the All Groups/Seattle group) and the Seattle_HR policy (applied to the All
Groups/Seattle/HR group) are enabled, EMS applies only the Seattle_HR policy to the All Groups/Seattle/HR
group, since the Seattle_HR policy is the most specific policy that is applicable for that group. If the Seattle_HR
policy is disabled, EMS applies the Seattle_general policy to endpoints in the All Groups/Seattle/HR group.
Viewing endpoints
After you add endpoints to FortiClient EMS, you can view the list of endpoints in a domain or workgroup in the
Endpoints pane. You can also view details about each endpoint and use filters to access endpoints with specific
qualities.
1. Go to Endpoints, and select All Endpoints, a domain, or workgroup. The list of endpoints, a quick status bar, and a
toolbar display in the content pane.
Not Installed Number of endpoints that do not have FortiClient installed. Click to display the
list of endpoints without FortiClient installed.
Not Registered Number of endpoints that are not connected to FortiClient EMS. Click to
display the list of disconnected endpoints.
Out-Of-Sync Number of endpoints with an out-of-sync profile. Click to display the list of
endpoints with out-of-sync profiles.
Security Risk Number of endpoints that are security risks. Click to display the list of
endpoints that are security risks.
Quarantined Number of endpoints that EMS has quarantined. Click to display the list of
quarantined endpoints.
Show/Hide Heading Click to hide or display the following column headings: Device, User, IP,
Configurations, Connections, Status, and Events.
Show/Hide Full Group Path Click to hide or display the full path for the group that the endpoint belongs to.
Search All Fields Enter a value and press Enter to search for the value in the list of endpoints.
Filters Click to display and hide filters you can use to filter the list of endpoints.
Device Visible when headings are displayed. Displays an icon to represent the OS on
the endpoint, the hostname, and the endpoint group.
User Visible when headings are displayed. Displays the name of the user logged
into the endpoint.
Configurations Visible when headings are displayed. Displays the name of the policy
assigned to the endpoint and its synchronization status.
Connections Visible when headings are displayed. Displays the connection status between
FortiClient and FortiClient EMS. If the endpoint is connected to a FortiGate,
displays the FortiGate hostname.
Events Visible when headings are displayed. Displays FortiClient events for the
endpoint.
2. Click an endpoint to display its details in the content pane. The following dropdown lists display in the toolbar for
the selected endpoint:
Checkbox Click to select and deselect all endpoints in the content pane. You can then
select or clear the checkbox for individual endpoints to fine-tune the list of
selected endpoints.
Patch Click to patch all critical and high vulnerabilities on the selected endpoint.
Choose one of the following options:
l Selected Vulnerabilities on Selected Clients
l Selected Vulnerabilities on All Affected Clients
l All Critical and High Vulnerabilities
Action Click to perform one of the following actions on the selected endpoint:
l Request FortiClient Logs
l Request Diagnostic Results
l Update Signatures
l Download Available FortiClient Logs
l Download Available Diagnostic Results
l Re-register
l Deregister
l Register
l Quarantine
l Un-quarantine
l Exclude from Management
l Clear Events
l Mark as Uninstalled
l Delete Device
The following tabs are available in the content pane toolbar when you select an endpoint, depending on which
FortiClient features are installed on the endpoint and enabled via the assigned profile:
Summary
<user name> Displays the name of the user logged into the selected endpoint. Also displays
the user's avatar, email address, and phone number if these are provided to
FortiClient on the endpoint. If the user's LinkedIn, Google, Salesforce, or
other cloud app account is linked in FortiClient, the username from the cloud
application displays. Also displays the group that the endpoint belongs to in
EMS.
Device Displays the selected endpoint's hostname. You can enter an alias if desired.
Last Seen Displays the last date and time that FortiClient sent a keep-alive message to
EMS. This information is useful if FortiClient is offline because it indicates
when the last keep-alive message occurred.
Host Displays which tags have been applied to the endpoint based on the
Verification compliance verification rules. See Compliance Verification.
Tags
Connection Displays the connection status between the selected endpoint and FortiClient
EMS and between the endpoint and FortiGate.
Antivirus Events
Date Displays the cloud-based malware detection event's date and time.
AntiExploit
Events
USB Device Events
Sandbox Events
Magnifying Click to view a more detailed report. See Viewing Sandbox event details.
glass
Firewall Events
Vulnerability Events
Vulnerability Displays the vulnerability's name. For example, Security update available for
Adobe Reader.
Category Displays the vulnerability's category. For example, Third Party App.
Patch Type Displays the patch type for this vulnerability: Auto or Manual.
FortiGuard Displays the FortiGuard ID number. If you click the FortiGuard ID number, it
redirects you to FortiGuard where further information is provided if available.
System Events
You can use the quick status bar to quickly display filtered lists of endpoints on the Endpoints content pane.
1. Go to Endpoints.
2. Click All Endpoints, a domain, or workgroup.
The list of endpoints and quick status bar display.
You can view each endpoint's details on the Endpoints content pane. For a description of the options on the Endpoints
content pane, see Viewing the Endpoints pane on page 26.
1. Go to Endpoints, and select All Domains, a domain, or workgroup. The list of endpoints for the selected domain or
workgroup displays.
2. Click an endpoint to display details about it in the content pane. Details about the endpoint display in the content
pane.
This section describes how to set up FortiClient EMS for Chromebooks. Following is a summary of how to set up
FortiClient EMS for Chromebooks:
1. Add an SSL certificate. See Adding SSL certificates on page 43.
2. Add the Google domain. See Adding a Google domain on page 45.
3. Create an endpoint profile. See Adding a new profile on page 45.
4. Create an endpoint policy configured with the endpoint profile. See Adding a Chromebook policy on page 47.
5. View the status. See Viewing domains on page 47.
Additional configuration procedures are also included in this section.
This section describes how to add and configure the FortiClient Web Filter extension on Chromebooks enrolled in the
Google domain.
Following is a summary of how to set up the Google Admin console:
1. Log into the Google Admin console. See Logging into the Google Admin console on page 32.
2. Add the FortiClient Web Filter extension. See Adding the FortiClient Web Filter extension on page 33.
3. Configure the FortiClient Web Filter extension. See Configuring the FortiClient Web Filter extension on page 33.
4. Add the root certificate. See Adding root certificates on page 34.
If you are using another Chromebook extension that uses external rendering servers, the
FortiClient Web Filter settings may be bypassed. Check with the third-party extension vendor
if this is the case.
Log into the Google Admin console using your Google domain admin account. The Admin console displays.
FortiClient EMS software is not available for public use. You can only enable the feature using
the following extension ID: igbgpehnbmhgdgjbhkkpedommgmfbeao
1. In the Google Admin console, go to Devices > Chrome Management > Settings > User & browser settings >
Managed Guest Session Settings.
2. On the left, select the organization that contains the desired users or enrolled browsers. To select all users and
browsers, select the top-level organization. Otherwise, select a child.
3. Under Apps and Extensions, beside Force-installed Apps and Extensions, click Manage force-installed apps.
4. Select Chrome Web Store, and search for the following extension ID: igbgpehnbmhgdgjbhkkpedommgmfbeao.
5. Click Add. The extension displays under Total to force install: 1. Click SAVE.
You must configure the FortiClient Chromebook Web Filter extension to enable the Google Admin console to
communicate with FortiClient EMS.
FortiClient EMS hosts the services that assign endpoint profiles of web filtering policies to groups in the Google domain.
FortiClient EMS also handles the logs and web access statistics that the FortiClient Web Filter extensions send.
1. In FortiClient EMS, locate the server name and port by going to System Settings > Server.
2. Create a text file that contains the following text:
{
"ProfileServerUrl": { "Value": "https://< ProfileServer >:< port for Profile Server >"}
}
For example:
{
The FortiClient Chromebook Web Filter extension communicates with FortiClient EMS using HTTPS connections. The
HTTPS connections require an SSL certificate. You must obtain an SSL certificate and add it to FortiClient EMS to allow
the extension to trust FortiClient EMS.
If you use a public SSL certificate, you only need to add the public SSL certificate to FortiClient EMS. See Adding an
SSL certificate to FortiClient EMS for Chromebook endpoints on page 44.
However, if you prefer to use a certificate not from a common CA, you must add the SSL certificate to FortiClient EMS
and push your certificate's root CA to the Google Chromebooks. Otherwise, the HTTPS connection between the
FortiClient Chromebook Web Filter extension and FortiClient EMS will not work. See Uploading root certificates to the
Google Admin console on page 36.
This section applies only if you are sending logs from FortiClient to FortiAnalyzer. If you are not sending logs, skip this
section.
Sending logs to FortiAnalyzer requires you enable ADOMs in FortiAnalyzer and add
FortiClient EMS to FortiAnalyzer. FortiClient EMS is added as a device to the FortiClient
ADOM in FortiAnalyzer. See the FortiAnalyzer Administration Guide.
FortiClient supports logging to FortiAnalyzer. If you have a FortiAnalyzer and configure FortiClient to send logs to
FortiAnalyzer, a FortiAnalyzer CLI command must be enabled and an SSL certificate is required to support
communication between the FortiClient Web Filter extension and FortiAnalyzer.
If you use a public SSL certificate, you only need to add the public SSL certificate to FortiAnalyzer. See Adding an SSL
certificate to FortiAnalyzer.
However, if you prefer to use a certificate not from a common CA, you must add the SSL certificate to FortiAnalyzer and
push your certificate's root CA to the Google Chromebooks. Otherwise, the HTTPS connection between the FortiClient
Chromebook Web Filter extension and FortiAnalyzer will not work. See Uploading root certificates to the Google Admin
console on page 36.
The FortiAnalyzer IP address should be specified in the SSL certificate. If you are using a
public SSL certificate, the FortiAnalyzer IP address can be assigned to Common Name or
Alternative Name. If you are using a self-signed (nonpublic) SSL certificate, your certificate's
Subject Alternative Name must include IP:<FortiAnalyzer IP>.
You must use the FortiAnalyzer CLI to add HTTPS-logging to the allow-access list in FortiAnalyzer. This command is
one step in the process that allows FortiAnalyzer to receive logs from FortiClient.
In FortiAnalyzer CLI, enter the following command:
config system interface
edit "port1"
set allowaccess https ssh https-logging
next
end
The following table summarizes where to add certificates to support communication with the FortiClient Web Filter
extension and FortiAnalyzer.
Allow the FortiClient Public SSL certificate l Add SSL certificate to FortiClient EMS.
Chromebook Web Filter
SSL certificate not from a l Add SSL certificate to FortiClient EMS.
extension to trust EMS
common CA l Add your certificate's root CA to the Google Admin
console.
1. In the Google Admin console, go to Device Management > Network > Certificates (root certificate) (crt
certificate).
2. Add the root certificate.
3. Select the Use this certificate as an HTTPS certificate authority checkbox.
Do not forget to select the Use this certificate as an HTTPS certificate authority
checkbox.
It is recommended to disable access to Chrome developer tools. This blocks users from disabling the FortiClient Web
Filter extension.
1. In the Google Admin console, go to Devices > Chrome Management > User & browser settings.
2. On the left, select the organization that contains the desired users or enrolled browsers. To select all users and
browsers, select the top-level organization. Otherwise, select a child.
3. For the Developer Tools option, select Never allow use of built-in developer tools.
When users browse in incognito mode, Chrome bypasses extensions. You should disallow incognito mode for managed
Google domains.
1. In the Google Admin console, go to Devices > Chrome management > User & browser settings.
2. On the left, select the organization that contains the desired users or enrolled browsers. To select all users and
browsers, select the top-level organization. Otherwise, select a child.
3. Under Security, set Incognito mode to Disallow incognito mode.
4. Click Save.
1. In the Google Admin console, go to Devices > Chrome management > Device settings.
2. On the left, select the organization that contains the desired users or enrolled browsers. To select all users and
browsers, select the top-level organization. Otherwise, select a child.
3. Under Sign-in settings, for Guest mode, select Disable guest mode.
4. Click Save.
You should block users from ending processes with the Chrome task manager for managed Google domains.
1. In the Google Admin console, go to Devices > Chrome Management > User & browser settings > Apps and
extensions.
2. On the left, select the organization that contains the desired users or enrolled browsers. To select all users and
browsers, select the top-level organization. Otherwise, select a child.
3. Under Task manager select Block users from ending processes with the Chrome task manager from the
dropdown list.
4. Click Save.
FortiClient EMS requires service account credentials that the Google Developer console generates. You can use the
default service account credentials provided with FortiClient EMS or generate and use unique service account
credentials, which is more secure.
The service account credentials must be the same in FortiClient EMS and the Google Admin
console.
FortiClient EMS includes the following default service account credentials that the Google Developer console
generates:
Service account certificate A certificate in .pem format for the service account FortiClient EMS
credentials
The service account credentials are a set. If you change one credential, you must change the
other two credentials.
To configure the default service account credentials, you must add the client ID's default value to the Google Admin
console. Service account credentials do not require other configuration. See Adding service account credentials to the
Google Admin console on page 42.
When using unique service account credentials for improved security, you must complete the following steps to add the
unique service account credentials to the Google Admin console and FortiClient EMS:
1. Create unique service account credentials using the Google Developer console. See Creating unique service
account credentials on page 39.
2. Add the unique service account credentials to the Google Admin console. See Adding service account credentials
to the Google Admin console on page 42.
3. Add the unique service account credentials to FortiClient EMS. See Adding service account credentials to EMS on
page 43.
Creating a unique set of service account credentials provides more security. Unique service account credentials include
the following:
l Client ID (a long number)
l Service account ID (email address)
l Service account certificate (a certificate in .pem format)
1. Go to Google API Console.
2. Log in with your G Suite account credentials.
3. Create a new project:
a. Click the toolbar list. The browser displays the following dialog.
c. Click ENABLE.
After you create the service account, a private key with the P12 extension is saved on your computer.
The private key with the P12 extension is the only copy you will receive. Keep it in a
safe place. You should also remember the password prompted on the screen. At this
time, that password should be notasecret.
8. Click Save.
9. Click View Client ID to see your service account information. Record the client ID, service account, and the
associated private key (downloaded in step 5d).
To use the private key in EMS, it needs to be converted to .pem format. You can use the
following openssl command to convert it. Remember to use the notasecret password.
C:\OpenSSL-Win64\bin>openssl pkcs12 -in demo-976b9d6e9328.p12 -out
serviceAccount-demo.pem -nodes -nocerts
Enter Import Password:
This section describes how to add the client ID from the service account credentials to the Google Admin console.
These settings allow Google to trust FortiClient EMS, which enables FortiClient EMS to retrieve information from the
Google domain.
1. In the Google Admin console, go to Security > Advanced settings > Manage API client access. You may need to
click show more to see Advanced settings.
The API scopes are case-sensitive and must be lowercase. You may need to copy the
string into a text editor and remove spaces created by words wrapping to the second
line in the PDF.
3. Click Authorize.
The section describes how to add the service account ID and service account certificate from the service account
credentials to FortiClient EMS.
1. In FortiClient EMS, go to System Settings > Server.
2. Enable EMS for Chromebooks Settings.
The default service account credentials display. Overwrite the default settings with the
unique set of service account credentials received from Fortinet.
3. The Service account field shows the configured email address provided for the service account credentials. Click
the Update service account button and configure the following information:
Service Account Email Enter a new email address for the service account credentials.
Private key Click Browse and select the certificate provided with the service account
credentials.
4. Click Save.
5. Update the client ID in the Google Admin console.
The service account credentials are a set. If you change one credential, you must change the
other two credentials.
Adding SSL certificates
This section includes information about the required SSL certificates to support the following types of communication:
l Communication with the FortiClient Chromebook Web Filter extension on page 34
l Communication with FortiAnalyzer for logging on page 34
It includes the following procedures:
You must add an SSL certificate to FortiClient EMS to allow Chromebooks to connect to FortiClient EMS.
If you are using a public SSL certificate, add the certificate to FortiClient EMS. You do not need to add the certificate to
the Google Admin console.
If you are not using a public SSL certificate, you must add the SSL certificate to FortiClient EMS, and the root certificate
to the Google Admin console. See Adding root certificates on page 34.
1. In FortiClient EMS, go to System Settings > Server > EMS for Chromebooks Settings.
2. Do one of the following:
a. To replace an existing SSL certificate, beside SSL certificate, click Update SSL certificate.
b. If no SSL certificate has been added yet, click the Upload new SSL certificate button.
3. Click Browse and locate the certificate file (<name>.pfx).
4. In the Password field, enter the password.
5. Click Test.
6. Click Save.
If the SSL certificate is expiring in less than three months, the expiry date label is yellow; if it
has expired, the label is red. Otherwise, it is green.
1. Go to Google Domains > Manage Domains, and click the Add button. The Google Domain pane displays.
2. In the Admin Email field, enter your Google domain admin email.
3. In the Organization Unit Path field, enter the domain organization unit path.
4. Click Save. EMS imports the Google domain information and users.
Chromebook profiles support web filtering by categories, black and white lists, and Safe Search. You can create
different profiles and assign them to different groups in the Google domain as part of an endpoint policy.
When you install FortiClient EMS, a default profile is created. EMS applies this profile to any Google domains you add
to FortiClient EMS.
1. Go to Endpoint Profiles > Manage Profiles, and click the Add Chrome button.
2. In the Profile Name field, enter the profile name.
3. On the Web Filter tab, enable Web Filter, and set the web filtering options.
4. On the System Settings tab, set the logging options.
5. Click Save.
The search engine provides a Safe Search feature that blocks inappropriate or explicit images from search results. The
Safe Search feature helps avoid most adult content. FortiClient EMS supports Safe Search for most common search
engines, such as Google, Yahoo, and Bing.
The profile in FortiClient EMS controls the Safe Search feature.
Following are examples of search results with the Safe Search feature disabled and enabled. Notice the difference
between the number of results. Here are the search results when the Safe Search feature is disabled, which has about
285000000 results:
Here are the search results when the Safe Search feature is enabled, which has about 256000000 results.
1. In FortiClient EMS, in the Endpoint Profiles > Manage Profiles area, click the Default - Chromebooks profile or
another profile.
2. On the Web Filter tab, enable or disable Enable Safe Search.
Chromebook policy name Enter the desired name for the Chromebook policy.
Google domains Select the Google domain to apply the policy to. Domains for which an
endpoint policy has already been created are grayed out and you cannot
select them.
Chromebook profile Include a Chromebook profile in the policy. From the dropdown list, select the
desired profile.
You must have already created a profile to include one in an endpoint policy.
See Adding a new profile on page 45.
Enable the policy Toggle to enable or disable the endpoint policy. You can enable or disable the
policy at a later time from Endpoint Policy > Manage Policies.
4. Click Save. You can view the newly created policy on the Chromebook Policy > Manage Chromebook Policies
page.
EMS pushes these settings to the endpoint with the next Telemetry communication.
Viewing domains
After you add domains to FortiClient EMS, you can view the list of domains in Google Domains. You can also view the
list of Google users in each domain and details about each Google user in the User Details, Client Statistics, and
Blocked Sites panes.
1. Go to Google Domains > Domains and click a domain. The list of Google users displays.
Last Login Date and time the user last logged into the domain.
Last Policy Retrieval Date and time that the Google Chromebook last retrieved the endpoint
profile.
User Details
Field Information
Name Username.
Last Login Date and time the user last logged into the domain.
Last Policy Retrieval Date and time that the Google Chromebook last retrieved the endpoint profile.
Effective Policy Name of the Chromebook policy assigned to the user in the domain.
Client Statistics
Charts Information
Blocked Sites Distribution (past Displays the distribution of blocked sites in the past number of days. You can
<number> days) configure the number of days for which to display information. Go to System
Settings > Logs.
Top 10 Site Categories by Displays the distribution of top ten site categories in the past number of days.
Distribution (Past <number> You can configure the number of days for which to display information. Go to
Days) System Settings > Logs.
Fields Information
User Initiated Whether the user initiated visitation to the blocked site.
Change log