In the process of handling the Log4Shell vulnerability, it was decided to use the Intrusion Protection of the FortiNet firewall for all RU network traffic. Don’t hesitate to contatc us if you experience drawbacks.
In the process of handling the Log4Shell vulnerability, it was decided to use the Intrusion Protection of the FortiNet firewall for all RU network traffic. Don’t hesitate to contatc us if you experience drawbacks.