CIS FortiGate 7.4.x v1.0.1 L2

Audit Details

Name: CIS FortiGate 7.4.x v1.0.1 L2

Updated: 2/10/2026

Authority: CIS

Plugin: FortiGate

Revision: 1.0

Estimated Item Count: 25

File Details

Filename: CIS_FortiGate_7.4.x_v1.0.1_L2.audit

Size: 51.1 kB

MD5: 39e9df9f59de986b1e27cfeedf2260db
SHA256: e065fb187d74b3c83bbbcfb7cd4f5a7e04a94c5d2c629552ee52812efd314ed5

Audit Items

DescriptionCategories
2.1.6 Ensure the latest firmware is installed

SYSTEM AND INFORMATION INTEGRITY

2.1.7 Disable USB Firmware and configuration installation

CONFIGURATION MANAGEMENT

2.1.8 Disable static keys for TLS

CONFIGURATION MANAGEMENT

2.1.9 Enable Global Strong Encryption

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.11 Ensure CDN is enabled for improved GUI performance

CONFIGURATION MANAGEMENT

2.1.13 Ensure Hostname is Not Displayed On Login GUI

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.2 Allow only trusted hosts in SNMPv3

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.3 Disable SNMPv3 Query Per User

CONFIGURATION MANAGEMENT

2.5.1 Ensure High Availability configuration is enabled

SYSTEM AND INFORMATION INTEGRITY

2.5.4 Ensure High Availability Group-ID is configured

SYSTEM AND INFORMATION INTEGRITY

3.1 Ensure that unused policies are reviewed regularly

CONFIGURATION MANAGEMENT

4.1.1 Detect Botnet connections

SYSTEM AND INFORMATION INTEGRITY

4.2.1 Ensure Antivirus Definition Push Updates are Configured

SYSTEM AND INFORMATION INTEGRITY

4.2.2 Apply Antivirus Security Profile to Policies

SYSTEM AND INFORMATION INTEGRITY

4.2.3 Enable Outbreak Prevention Database

SYSTEM AND INFORMATION INTEGRITY

4.2.4 Enable AI /heuristic based malware detection

SYSTEM AND INFORMATION INTEGRITY

4.2.5 Enable grayware detection on antivirus

SYSTEM AND INFORMATION INTEGRITY

4.2.7 Enable CDR for proxy mode on XLSB, OpenOffice, and RTF files

SYSTEM AND INFORMATION INTEGRITY

4.3.1 Enable Botnet C&C Domain Blocking DNS Filter

SYSTEM AND INFORMATION INTEGRITY

4.5.2 Block applications running on non-default ports

SYSTEM AND INFORMATION INTEGRITY

5.2.1.1 Ensure Security Fabric is Configured

CONFIGURATION MANAGEMENT

6.1.1 Apply a Trusted Signed Certificate for VPN Portal

ACCESS CONTROL

6.1.2 Enable Limited TLS Versions for SSL VPN

ACCESS CONTROL

7.1.1 Enable Event Logging

AUDIT AND ACCOUNTABILITY

7.2.1 Centralized Logging and Reporting

AUDIT AND ACCOUNTABILITY