This handbook chapter contains the following sections:
Managing “bring your own device” describes device monitoring, devices, device groups, and device policies. The administrator can monitor all types of devices and control their access to network resources.
Endpoint Protection describes how you can enforce the use of FortiClient Endpoint Control and apply an endpoint profile to users’ devices. Endpoint profiles include real-time antivirus protection, application control, web category filtering, and VPN provisioning.
Vulnerability Scan describes how perform network vulnerability scanning to look for security weaknesses in your servers and workstations.