Completed -
The scheduled maintenance has been completed.
Jan 27, 05:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 26, 21:00 UTC
Scheduled -
Anticipated Impact: Potential for short interruption of customer instances and configuration portal during the window.
The Operations team will be installing a rolling software update. There is potential for short connectivity impact (approximately ~1-2 minutes) for each customer instance and the configuration portal while these components are updated. No other impact on service delivery is expected.
Features included in the 25.4.c release include
For Feature release:
For new instances, support has been added for FortiClient 7.4.5 for FortiSASE desktop users. For new instances, support has been added for next generation endpoint management where security posture tags and tagging rules can be created and managed together. For new instances, as a remote user connectivity alternative when standard IPsec ports over UDP are blocked by networks, added support for IPsec over TCP with TCP port 443. This feature requires Windows or Mac endpoints running FortiClient 7.4.5 or later. For new instances, added support for configuring DNS suffixes for IPsec tunnels in an endpoint profile. This feature requires Windows endpoints running FortiClient 7.4.5 or later. For new instances, added a new rule type for security posture tagging based on CrowdStrike ZTA scores, which are generated by the CrowdStrike Falcon sensor, reflecting the endpoint's security posture. This feature requires Windows and Mac endpoints running FortiClient 7.4.5 or later. For new instances, added support for ZTNA automatic login using OAuth. This feature requires valid supporting Entra ID configuration, Windows endpoints running FortiClient 7.4.5 or later, and FortiGate devices acting as a ZTNA application gateways running FortiOS 7.6.1 or later. For new instances, FortiSASE can now learn security posture tags directly from FortiClient. This feature requires FortiClient 7.4.5 and later. Added support for configuring and matching geography addresses as the source in policies which allow specific security profiles to be applied to remote user agents connecting from specific geolocations. Added support for Public Cloud security PoPs: Bangkok - Thailand, Montreal - Canada, Moncks Corner - South Carolina - USA, Tokyo - Japan.
For Mature release:
Added support for Public Cloud security PoPs: Montreal - Canada, Moncks Corner - South Carolina - USA, Tokyo - Japan.
Completed -
The scheduled maintenance has been completed.
Jan 22, 19:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 22, 11:00 UTC
Scheduled -
Anticipated Impact: Potential for short interruption of customer instances and configuration portal during the window. The Operations team will be installing a rolling software update. There is potential for short connectivity impact (approximately ~1-2 minutes) for each customer instance and the configuration portal while these components are updated. No other impact on service delivery is expected.
Features included in the 25.4.c release include
For Feature release:
For new instances, support has been added for FortiClient 7.4.5 for FortiSASE desktop users. For new instances, support has been added for next generation endpoint management where security posture tags and tagging rules can be created and managed together. For new instances, as a remote user connectivity alternative when standard IPsec ports over UDP are blocked by networks, added support for IPsec over TCP with TCP port 443. This feature requires Windows or Mac endpoints running FortiClient 7.4.5 or later. For new instances, added support for configuring DNS suffixes for IPsec tunnels in an endpoint profile. This feature requires Windows endpoints running FortiClient 7.4.5 or later. For new instances, added a new rule type for security posture tagging based on CrowdStrike ZTA scores, which are generated by the CrowdStrike Falcon sensor, reflecting the endpoint's security posture. This feature requires Windows and Mac endpoints running FortiClient 7.4.5 or later. For new instances, added support for ZTNA automatic login using OAuth. This feature requires valid supporting Entra ID configuration, Windows endpoints running FortiClient 7.4.5 or later, and FortiGate devices acting as a ZTNA application gateways running FortiOS 7.6.1 or later. For new instances, FortiSASE can now learn security posture tags directly from FortiClient. This feature requires FortiClient 7.4.5 and later. Added support for configuring and matching geography addresses as the source in policies which allow specific security profiles to be applied to remote user agents connecting from specific geolocations. Added support for Public Cloud security PoPs: Bangkok - Thailand, Montreal - Canada, Moncks Corner - South Carolina - USA, Tokyo - Japan.
For Mature release:
Added support for Public Cloud security PoPs: Montreal - Canada, Moncks Corner - South Carolina - USA, Tokyo - Japan.
Completed -
The scheduled maintenance has been completed.
Jan 22, 01:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 21, 17:00 UTC
Scheduled -
Anticipated Impact: Potential for short interruption of customer instances and configuration portal during the window.
The Operations team will be installing a rolling software update. There is potential for short connectivity impact (approximately ~1-2 minutes) for each customer instance and the configuration portal while these components are updated. No other impact on service delivery is expected.
Features included in the 25.4.c release include
For Feature release:
For new instances, support has been added for FortiClient 7.4.5 for FortiSASE desktop users. For new instances, support has been added for next generation endpoint management where security posture tags and tagging rules can be created and managed together. For new instances, as a remote user connectivity alternative when standard IPsec ports over UDP are blocked by networks, added support for IPsec over TCP with TCP port 443. This feature requires Windows or Mac endpoints running FortiClient 7.4.5 or later. For new instances, added support for configuring DNS suffixes for IPsec tunnels in an endpoint profile. This feature requires Windows endpoints running FortiClient 7.4.5 or later. For new instances, added a new rule type for security posture tagging based on CrowdStrike ZTA scores, which are generated by the CrowdStrike Falcon sensor, reflecting the endpoint's security posture. This feature requires Windows and Mac endpoints running FortiClient 7.4.5 or later. For new instances, added support for ZTNA automatic login using OAuth. This feature requires valid supporting Entra ID configuration, Windows endpoints running FortiClient 7.4.5 or later, and FortiGate devices acting as a ZTNA application gateways running FortiOS 7.6.1 or later. For new instances, FortiSASE can now learn security posture tags directly from FortiClient. This feature requires FortiClient 7.4.5 and later. Added support for configuring and matching geography addresses as the source in policies which allow specific security profiles to be applied to remote user agents connecting from specific geolocations. Added support for Public Cloud security PoPs: Bangkok - Thailand, Montreal - Canada, Moncks Corner - South Carolina - USA, Tokyo - Japan.
For Mature release:
Added support for Public Cloud security PoPs: Montreal - Canada, Moncks Corner - South Carolina - USA, Tokyo - Japan.
Completed -
The scheduled maintenance has been completed.
Jan 20, 22:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Jan 20, 17:00 UTC
Scheduled -
Anticipated Impact: FortiSASE UI might be inaccessible for up to 5 minutes
Our Operations team will be performing multiple proactive Software updates on the backend that powers FortiSASE. During the scheduled maintenance window, the FortiSASE UI might be inaccessible for up to 5 minutes. There is no impact to data flow.
If you have any questions regarding this maintenance, please contact FortiCare Support (https://www.fortinet.com/support/contact) and reference FortiSASE Operations ticket #426123.
Jan 16, 20:20 UTC