Bring Your Own Device (BYOD)

The policies and configurations we have explained for the FortiClient software can be seen as a part of a larger management scope, dedicated to controls on personal mobile devices connected to our network. The full list of controls includes:

  • Identifying and monitoring the devices
  • Using the MAC address to control access
  • Creating policies based on device type
  • Enforcing endpoint control using the FortiClient software

We have already seen the option (inside the interface configuration) to enable device monitoring. The resulting data is included in the Device definition menu under the Device tab in the User & Device option. In the following screenshot, we have an Android tablet and a Windows laptop connected to our FortiGate ...

Get Getting Started with FortiGate now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.