Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Fortinet Exam FCSS_SASE_AD-23 Topic 3 Question 13 Discussion

Actual exam question for Fortinet's FCSS_SASE_AD-23 exam
Question #: 13
Topic #: 3
[All FCSS_SASE_AD-23 Questions]

Refer to the exhibits.

A FortiSASE administrator has configured an antivirus profile in the security profile group and applied it to the internet access policy. Remote users are still able to download the eicar.com-zip file from https://eicar.org. Traffic logs show traffic is allowed by the policy.

Which configuration on FortiSASE is allowing users to perform the download?

Show Suggested Answer Hide Answer
Suggested Answer: A

Based on the provided exhibits and the configuration details, the reason why users are still able to download the eicar.com-zip file despite having an antivirus profile applied is due to the Web Filter allowing the traffic. Here is the step-by-step detailed explanation:

Web Filtering Logs Analysis:

The logs show that the traffic to the destination port 443 (which is HTTPS) is allowed and the security event triggered is Web Filter.

The log details indicate that the URL belongs to an allowed category in the policy and thus, the traffic is permitted by the Web Filter.

Security Profile Group Configuration:

The Web Filter with Inline-CASB section indicates that the site www.eicar.org is being monitored (93 occurrences) and not blocked.

Since the Web Filter is set to allow traffic from this site, the antivirus profile will not block it because the Web Filter decision takes precedence.

Antivirus Profile Configuration:

Although the antivirus profile is configured, the logs do not show any antivirus actions being triggered. This indicates that the web filter is overriding the antivirus action.

Policy Configuration:

The policy named 'Web Traffic' shows that it has logging enabled and is set to accept traffic.

The profile group 'SIA' applied to this policy includes both Web Filter and Antivirus settings. However, since the Web Filter is allowing the traffic, the antivirus profile does not get the chance to inspect it.


FortiGate Security 7.2 Study Guide: Provides details on the precedence of web filtering over antivirus in security profiles.

Fortinet Knowledge Base: Detailed explanation of web filtering and antivirus profiles interaction.

Contribute your Thoughts:

Twana
17 days ago
Maybe the HTTPS protocol is not enabled in the antivirus profile.
upvoted 0 times
...
Stevie
19 days ago
Haha, looks like the admin forgot to enable the force certificate inspection. They must be new to this stuff!
upvoted 0 times
Eve
5 days ago
User 2: Yeah, that's a rookie mistake.
upvoted 0 times
...
Rochell
14 days ago
User 1: Looks like someone forgot to enable force certificate inspection.
upvoted 0 times
...
...
Angelo
19 days ago
I believe IPS is disabled in the security profile group.
upvoted 0 times
...
Twana
23 days ago
I think the web filter is allowing the traffic.
upvoted 0 times
...
Minna
26 days ago
The web filter must be the issue here. It's probably not configured to block the EICAR file download.
upvoted 0 times
Shayne
13 days ago
The web filter must be the issue here. It's probably not configured to block the EICAR file download.
upvoted 0 times
...
Caitlin
14 days ago
A) Web filter is allowing the traffic.
upvoted 0 times
...
...
Dortha
26 days ago
I think the HTTPS protocol is the culprit. The antivirus profile needs to be set up to inspect HTTPS traffic.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77