FortiSASE Proactive Software Maintenance - FortiSASE release 25.4.b

Scheduled Maintenance Report for FortiSASE

Completed

The scheduled maintenance has been completed.
Posted Dec 12, 2025 - 05:00 UTC

In progress

Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Dec 11, 2025 - 21:00 UTC

Scheduled

Anticipated Impact: Potential for short interruption of customer instances and configuration portal during the window.
The Operations team will be installing a rolling software update. There is potential for short connectivity impact (approximately ~1-2 minutes) for each customer instance and the configuration portal while these components are updated. No other impact on service delivery is expected.

Features included in the 25.4.b release include

For Feature release:

For greater performance and security, FortiSASE Cloud Security tunnel will be migrating from SSL to IPsec starting early 2027. FortiSASE Cloud Security tunnel will support a hybrid IPsec/SSL mode during the transition period that is available as an opt-in feature for SSL VPN instances through the Operations > Administration > Software audit & version page's best practices. This allows customers time to verify client-side changes for IPsec mode before migrating with confidence.
Simplified pre-logon tunnels such that endpoints establish tunnels with the nearest FortiSASE Security PoP using certificate-based authentication.
Added support for configuring the FortiClient built-in browser used for SAML SSO authentication in an endpoint profile under Connection > Tunnel settings.
Added support for SAML single signout in the agentless ZTNA bookmark portal.
Added support for configuring one-time schedules with policies and proxy policies.
For existing instances, support has been added for a new endpoint vulnerability report based on logs collected from FortiClient endpoints.
For existing instances, support has been added for a new Secure Private Access (SPA) report.
For existing instances, support has been added for a new Cloud Security Usage Report.
For existing instances, added an Automation page in Operation > Administration to allow configuring of actions, such as sending alert emails, based on predefined triggers to proactively notify administrators of events. Currently, alert emails can be triggered for an unstable Secure Private Access (SPA) connection only when SLA failures, routing changes, and BGP neighbor status changes all occur.
Added support for Public Cloud security PoPs: Miami – USA, Paris - France.
Updated support for Fortinet security PoPs: Ashburn - Virginia - USA.
Support has been added to view the FortiSASE portal in French.
Support has been added to view the FortiSASE portal in Japanese.

For Mature release:

Added support for Public Cloud security PoPs: Paris - France.
Updated support for Fortinet security PoPs: Ashburn - Virginia - USA.

For further information on what's new: https://docs.fortinet.com/document/fortisase/latest/release-notes/661728/whats-new
If you have any questions regarding this maintenance, please contact FortiCare Support (https://www.fortinet.com/support/contact) and reference FortiSASE Operations ticket #416888.
Posted Dec 05, 2025 - 20:01 UTC
This scheduled maintenance affected: Fortinet Cloud Locations (Ashburn, VA, US (IAD-F1), London, United Kingdom (LON-F1), Miami, FL, US (MIA-F1), Ottawa, Canada (YOW-F1), Toronto, Canada (YTO-F1), London, United Kingdom (LON-F2), Miami, FL, US (MIA-F2), Ashburn, VA, US (IAD-F3), London, United Kingdom (LON-F3), Toronto, Canada (YTO-F2), São Paulo (GRU-F1), Ashburn, VA (IAD-F4)) and Public Cloud Locations (Santiago, Chile (SCL-G2), Ashburn, VA,US (IAD-G2), Sao Paulo, Brazil (SAO-G2), London, UK (LON-G2)).