This project focuses on implementing, configuring, and testing advanced FortiGate Security Profiles within a virtual lab environment.
The goal is to demonstrate real-world defensive capabilities against malware, phishing, unauthorized applications, and network-level attacks — using professional cybersecurity practices.
The project covers the full lifecycle of FortiGate protection mechanisms, including:
- Antivirus (AV)
- Web Filtering
- Application Control
- IPS (Intrusion Prevention System)
- DNS Filtering
- SSL/Deep Inspection
Each profile was configured, tested, monitored, and validated using controlled attack simulations.
All configurations and tests were performed inside FortiGate 7.6 Labs using:
- FortiGate VM
- Windows 10 Client
- Kali Linux Attacker
- Simulated Internet Environment
This ensures full reproducibility and professional-level security testing.
- Configured full FortiGate security stack (AV, Web Filter, IPS, App Control, DNS Filter).
- Enabled flow-based and proxy-based inspection modes with SSL Deep Inspection.
- Simulated and analyzed:
- Malware download using EICAR test file
- Web filtering blocks and overrides
- Application Control + bandwidth shaping
- IPS detections (port scans, suspicious patterns, botnet C2 signatures)
- Collected logs, screenshots, and monitoring insights from FortiGate GUI.
- Built a complete technical report and a 30-slide presentation explaining configurations and results.
- Week1_Research/ → Research, explanations, and slide materials
- Week2_Config/ → FortiGate profiles, policies, screenshots
- Week3_Testing/ → Attack simulations, logs, evidence
- Week4_Final/ → Final documentation + presentation configs/ → Exported FortiGate configuration files
- Full 60-slide professional presentation
- Complete technical documentation
- All test results, logs, screenshots
- The FortiGate configuration backup used in the project
- GitHub repository containing every step of the work
Mohamed Abdelaal Saad
Project Manager • Security Engineer • Responsible for architecture, documentation, testing, and final delivery.
Clone the repo:
Open the final documents and presentation and go with steps also you can use the firewall conf file.
This project demonstrates practical, real-world cybersecurity skills using enterprise-grade Fortinet technology.
It is suitable for showcasing security configuration, analysis, and threat mitigation abilities.