How to Install Fortinet FSSO and DC Agent

The Fortinet FSSO collector and DC agent can be incredibly valuable tools. Throughout this blog, we’re going to give you the key points in configuring and how to install Fortinet FSSO and DC agent here.

Getting Started

First things first, you’ll need to download the installers from the Fortinet website. You’ll want both the DC agent and the FSSO setup, which includes the collector agent and the DC agent.

 

Once you’ve made this selection, simply follow the prompts to complete the installation.

Process to install Fortinet FSSO

To begin the installation process, first install the collector agent, then proceed with the DC agent. When you run the installer, ensure you have administrator privileges, as these are required. During the setup, you’ll encounter a page where you should select the ‘Advanced’ option. This choice enables the retrieval of all user group information from your domain controllers to the FortiGate system, ensuring comprehensive data transfer. Once you’ve made this selection, simply follow the prompts to complete the installation.

This straightforward process sets the foundation for configuring your FortiGate FSSO system.

Note: While you have the option to install the DC agent from this wizard, we’ll be installing it separately in this guide.

Installing the DC Agent

  1. Run the DC agent installer.
  2. Enter the IP address of the collector agent you have just installed (this can be on the DC or a separate server).
  3. Complete the installation.
  4. After the above actions are taken, reboot the domain controller.

FortiGate Configuration

In this configuration, you’ll need to input two crucial pieces of information: the IP address of the collector agent you’ve just set up, and the password you configured earlier. Once you’ve entered these details, apply the settings. This action triggers the FortiGate to retrieve all user and group information from your domain controllers, establishing a comprehensive connection between your FortiGate device and your network’s user management system.

 

Verifying the Setup

  1. On the collector agent, you can view the status, monitored domain controllers, and user logon events.
  2. You have the option to set up a group filter to select specific user groups for monitoring (e.g., domain users and finance groups).
  3. You can also set an ignore user list for individual user accounts you don’t want to monitor.

 

Checking the Logs

On the FortiGate, you can view the user event logs to see user logon information tied to IP addresses.

 

That’s it! You’ve successfully installed and configured the FortiGate FSSO collector and DC agent. If you found this guide helpful, head over to to learn more valuable hints on implementing your cyber security solutions, and do be sure to drop us an email to get in touch.

Donald Ross
As cyber-attacks become more sophisticated, the security framework of Zero Trust should be at the forefront of everyone’s mind, especially when protecting sensitive data.
Many organisations are still relying on legacy software which can have a major impact on cyber security and can affect the performance and productivity of an infrastructure which can result in significant cyber risks. So, what are the issues an organisation can face with outdated legacy software?
Within the past few weeks, there have been several high-profile data breaches that have originated from Ransomware attacks. This blog will explore these recent attacks and offer practical tips on how you protect your organisation from Ransomware threats.
As technology continues to develop, unfortunately so do vulnerabilities. As a result, the Council of the European Union (EU) has introduced the NIS 2 Directive, an updated framework to enhance cybersecurity resilience in critical sectors such as healthcare and banking. This blog will provide an overview of the NIS 2 Directive, its implications, and the steps you should take to achieve compliance and enhance your business's security posture.

Want to be in the know?

We’ve got decades of experience installing. configuring and optimising advanced security solutions for private & public sector organisations with complex security & compliance needs.