Skip to content Skip to navigation Skip to footer

Overview

FortiClient is a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client. A Fabric Agent is a bit of endpoint software that runs on an endpoint, such as a laptop or mobile device and communicates with the Fortinet Security Fabric to provide information, visibility, and control to that device.

Secure Access

The Unified FortiClient agent enables remote workers to securely connect to the network using zero-trust principles. This edition enables both Universal ZTNA- and VPN-encrypted tunnels, as well as URL filtering and cloud access security broker (CASB). FortiSASE provides cloud-hosted Universal ZTNA, CASB, and SWG and includes the Unified FortiClient agent. Central management via FortiClient EMS is included.

Endpoint Protection

The Unified FortiClient agent provides enhanced security capabilities by adding AI-based next-generation antivirus (NGAV), endpoint quarantine, and application firewall, as well as support for cloud sandbox, USB device control, and ransomware protection.

Converging Protection to Stop Advanced Threats

FortiEndpoint converges secure connectivity, endpoint protection, and advanced capabilities like endpoint detection and response (EDR) and extended detection and response (XDR), into a single agent. It simplifies management and enhances visibility while reducing costs and complexity. The solution gives IT teams the visibility and control they need, while security teams benefit from automated threat detection and response. This minimizes the need for manual intervention and ensures faster remediation of threats across all environments.

Managed Endpoint Security Services

To simplify the initial deployment and offload ongoing monitoring, Fortinet offers Endpoint-focused managed services to provide complete operation of the FortiClient solution, providing set up, deployment, configuration, vulnerability monitoring, and overall endpoint security monitoring.

Features and Benefits

ZTNA

Delivers better remote access and consistent application access policies

Fabric Agent

Provides telemetry information and leverages integrations with the Fortinet Security Fabric

Web Filtering

Provides web security and content filtering

Software Inventory Management

Enables visibility and license management

Controls access to cloud-based applications, including visibility to shadow IT

Automated Response

Detects and isolates compromised endpoints

FortiClient Use Cases

Detection
Endpoint Visibility and Compliance Control
Ensures endpoint visibility and compliance throughout the Security Fabric and integrates endpoint and network security with automation.
icon benefits vpn
Secure Remote Access (VPN, ZTNA)
Includes always-on, encrypted tunnels that support posture checks, conditional admission, and ongoing verification of users and devices.
icon benefits forticlient
Endpoint Hardening
Enables vulnerability scanning with automated patching, software inventory, and app firewall for better security.
AI-ML Powered
Advanced Endpoint Protection
Secures endpoints with ML anti-malware and behavior-based anti-exploit. App firewall & web content filtering provide additional protection.
icon sandbox
Sandbox Integration
Natively integrates with FortiSandbox & can block the execution of never-before seen files. Automatically submits them for real-time analysis.
icon user definition
Role-Based Access Control
Uses information from Active Directory to enable FortiGates to enforce RBAC policies within the network.

FortiClient is Chrome Enterprise Recommended

Provides businesses with secure, optimized tools that integrate seamlessly with ChromeOS and Google Workspace, simplifying management and enhancing productivity.

FortiGuard AI-Powered Security Services

FortiGuard Labs - Fortinet’s elite cybersecurity threat intelligence and research organization comprised of experienced threat hunters, researchers, analysts, engineers, and data scientists - develops and enhances FortiGuard AI-powered Security Services as well as provides valuable expert help through FortiGuard Expert-driven Security Services.

Case Studies

Village of Pleasant Prairie
Village of Pleasant Prairie
Village of Pleasant Prairie Achieves Granular, Unified Security with the Fortinet Security Fabric
Best Value Chem (BVC)
Best Value Chem (BVC)
Fragrance Manufacturer Converges IT and OT Security with the Fortinet Security Fabric
Wake Community College
Wake Community College
Building a Modern Network for North Carolina’s Largest Community College with the Fortinet Security Fabric
City of Green Bay
City of Green Bay
From Patchwork to Partnership: Green Bay Strengthens Security with Fortinet

Gartner Peer Insights™ Reviews

We’re proud to be recognized as a 2026 Gartner Peer Insights™ Customers’ Choice for Endpoint Protection Platforms for the fourth year in a row (2023-2026). With a 4.8 out of 5-star rating and a 98% willingness to recommend (as of November 2025 out of 168 ratings), we believe this recognition reflects the trust customers place in Fortinet’s unified endpoint security platform. Gartner Peer Insights Customers' Choice 2026

Gartner Peer Insights™ Reviews

At Fortinet, our top priority is always our customers. We're proud to be the only vendor to be named 2025 Gartner Peer Insights™ Customers’ Choice for Zero Trust Network Access (ZTNA). 97% of Fortinet reviewers are willing to recommend Fortinet, with a rating of 4.9 out of 5 based on 235 customer reviews over the 18-month review period ending December 31, 2024. gartner customers choice 2025
★★★★★
Secure and Consistent Access with Universal ZTNA: A Story of Success

It has been an amazing experience with Fortinet's Universal ZTNA. We have been using this product for the last 2-3 years, and the journey has been good so far. We have not faced any outages, and user connectivity is seamless. Fortinet Universal ZTNA ensures consistent security for all users, whether they are on-premises or roaming, by pushing the same policy throughout the organization.

—  Network & Security in the Telecommunications Industry

★★★★★
Fortinet Universal ZTNA: A Securing Device for Local and Remote Users

I've been using Fortinet Universal ZTNA, and it's great for network security. It protects both remote and local users, ensuring only authorized access. Easy integration with other Fortinet products makes management a breeze. Setup is straightforward, and the intuitive interface makes it user-friendly. I highly recommend it for a robust, zero-trust security solution.

—  IT Manager in the Consumer Goods Industry

★★★★★
Secure Access to Private Applications and Web Services Unveiled

The solution provides secure access to private applications, the Internet & web, and cloud services regardless of the user's location. It's a cloud-delivered solution and, hence, can support any number of growing user counts. We have an excellent overall experience.

—  Sr. IT Team Leader in Travel & Hospitality

★★★★★
Fortinet's Universal ZTNA is best product for Remote User Accessibility

On-going verification of users and devices is the best feature of Fortinet ZTNA; with this feature, once the user is connected, Fortinet ZTNA will keep on checking the user's posture during the session. Also, it has a variety of ZTNA tags (posture checks) which can be applied to the ZTNA profile, and based on that, end user posture is checked, for example, domain check, Anti-virus check, and many more.

—  IT Function in the IT Services Industry

★★★★★
Fortinet Universal ZTNA is best product for security...

Fortinet Universal ZTNA is giving us secure access to our applications; with this product, only our organization's trusted users can connect to our office network. Whenever any user connects, it checks the user & device posture. Once the Posture check is successful, it only allows connecting to the applications.

— IT Services Manager in the Banking Industry

★★★★★
Fortinet has the best Universal ZTNA solution for remote work

Fortinet Universal ZTNA is a reliable product; we are using this to check the posture of remote users. This has been working great in our environment for the last 3 years. Users and laptops that are compliant with the ZTNA tags are getting connected to our applications, which are placed in datacenter, and the rest are getting blocked if their ZTNA compliance does not meet our organization policy.

— IT Manager in the Manufacturing Industry

★★★★★
Fortinet's Universal ZTNA Platform: An Efficient Strategic Adoption

Fortinet Universal ZTNA platform helped us adopt zero trust strategically in our environment. We use FortiEMS along with FortiAuthenticator and FortiToken, which works very well as a platform approach by integrating with FortiGate to enable ZTNA functionality to enable secure access to our applications.

— Sr. IT Manager in Government

★★★★★
Exploring the Impressive 'Always On VPN' Feature of Fortinet ZTNA

Outstanding experience working on the Fortinet ZTNA; with this ZTNA solution, we are very relaxed from a security point of view for Remote users because of this product, only trusted users can connect to our applications, which are hosted in our data center. User feedback is also very positive, and they never faced any slowness or disconnections on ZTNA.

— Sr. IT Engineer in the IT Services Industry

★★★★★
Fortinet Universal ZTNA: Seamless Security Integration

My overall experience with Fortinet Universal ZTNA has been excellent; the solution provides robust security features, seamless integration with our existing infrastructure, and a user-friendly interface, ensuring comprehensive protection and efficient management. FortiClient ZTNA has been the perfect solution for our growing organization. The Centralized Management Dashboard allows us to easily monitor and control user access and keep our data safe and secure.

— Network Engineer in the Media Industry

Models and Specifications

FortiClient comes in several levels of capabilities, with increasing levels of protection. It integrates with many key components of the Fortinet Security Fabric and is centrally managed by the Endpoint Management Server (EMS).

See the product datasheet for more information.

Features include:

Zero Trust Agent with Multi-factor Authentication (MFA) The Zero Trust Agent supports ZTNA tunnels, single sign-on (SSO), and device posture check to FortiOS access proxy
Central Management via EMS or FortiClient Cloud Centralized FortiClient deployment and provisioning that allows administrators to remotely deploy endpoint software and perform controlled upgrades. Makes deploying FortiClient configuration to thousands of clients an effortless task with the click of a button.

Vulnerability dashboard helps manage an organization’s attack surface. All vulnerable endpoints are easily identified for administrative action.

Windows AD integration helps sync an organization’s AD structure into EMS so the same organization units (OUs) can be used for endpoint management. Realtime Endpoint Status always provides current information on endpoint activity and security events.

Central Logging and Reporting Centralized logging simplifies compliance reporting and security analysis by FortiSIEM or other SIEM product
Dynamic Security Fabric Connector EMS creates virtual groups based on endpoint security posture. These virtual groups are then retrieved by FortiGate and used in firewall policy for dynamic access control. Dynamic groups help automate and simplify compliance for security policies.
Vulnerability Agent and Remediation Vulnerability agent and remediation ensures endpoint hygiene and hardens endpoints to reduce the attack surface. This identifies vulnerable endpoints and prioritizes unpatched OS and software vulnerabilities with flexible patching options including auto-patching.
Remote Access VPN Remote Access VPN with MFA enables an easy-to-use encrypted tunnel that provides the highest VPN throughput.
FortiGuard Web Filtering

Powered by FortiGuard Labs research, the web filtering function monitors all web browser activities to enforce web security and acceptable usage policy with 75+ categories. It works across all supported operating systems and works with Google SafeSearch. The endpoint web filtering profile can be synchronized from FortiGate for consistent policy enforcement. Administrators can set black/white lists, on-/off-net policies, and import FortiGate web filtering policies for consistent enforcement.

FortiClient now supports a web filter plugin that improves detection and enforcement of web filter rules on HTTPS sites with encrypted traffic.

Split-tunneling Supported on ZTNA and VPN tunnels, split-tunneling enables optimized user experience
Single Sign-on (SSO) SSO integrates with FortiAuthenticator identity and access management to provide single sign-on.
ZTNA Edition Features This edition includes all the features in the ZTNA Edition plus the following:
AI-powered Next-Generation Antivirus (NGAV) Anti-malware leverages FortiGuard Content Pattern Recognition Language (CPRL), machine learning, and AI to protect endpoints against malware. The pattern-based CPRL is highly effective in detecting and blocking polymorphic malware. It also blocks attack channels and malicious websites.
FortiClient Cloud Sandbox FortiClient natively integrates with FortiSandbox. FortiClient automatically submits files to the connected FortiSandbox for real-time analysis. Sandbox analysis results are automatically synchronized with EMS. Administrators can see detailed information and behavior activities of submitted objects including graphic visualization of the full process tree.
Automated Endpoint Quarantine When triggered by security events, automated endpoint quarantine automates policy-based response. For example, it can automatically quarantine a suspicious or compromised endpoint to contain incidents and prevent outbreaks.
Application Firewall The application firewall provides the ability to monitor, allow, or block application traffic by categories. It uses the same categories as FortiGate, enabling consistent application traffic control. It leverages FortiGuard anti-botnet, IPS, and application control intelligence and can prevent the use of unwanted applications including proxy apps and HTTPS messaging apps.
Application Inventory

Application inventory provides visibility of installed software. In addition to managing licenses, software inventory can improve security hygiene. When software installed is not required for business purposes, it unnecessarily introduces potential vulnerabilities, and thereby increases the likelihood of compromise.

Administrators can reduce the attack surface by leveraging inventory information to detect and remove unnecessary or outdated applications that are potentially vulnerable.

USB Device Control This capability prevents unauthorized USB devices from accessing the host.

Schools continue to enhance their technologies in the curriculum and the adoption of personal devices such as Chromebooks are increasingly commonplace. School districts are required to be in compliance with Children’s Internet Protection Act (CIPA) and protect students from harmful content while browsing the internet.

Consistent web filtering policy enforcement on and off campus

Powered by FortiGuard Labs research, the web filtering function monitors all web browser activities to enforce web security and acceptable usage policy with 75+ categories. It also supports Google SafeSearch.

  • Supports safe browsing for K-12 on and off campus. No reverse proxy or VPN is required
  • Categorizes more than 43 million rated websites and 2 billion+ web pages
  • Consistent with web filtering policy on FortiGate
  • Works with Google SafeSearch and supports custom denied/approved lists
  • Monitors all web browser activity including HTTPS

Easy to deploy, simple to use

  • Integrates with Google G Suite Admin Console for management
  • Deployment from within G Suite admin console and Google Chrome Web Store. It allows administrators to manage apps and extensions on Chromebooks, making it a scalable process.Enables single sign-on with Google credentials without requiring additional captive portal login.

Flexible detailed logging and reporting

  • Identifies students logged into Chromebooks and apply appropriate policies that are grade-level appropriate.
  • Supports the “cart system” where devices are not specifically assigned to one user.

Read the solution brief

  Windows macOS Android iOS Chromebook Linux
Zero Trust Security
Endpoint Telemetry
Compliance Enforcement Using Dynamic Access Control  
Endpoint Audit and Remediation with Vulnerability Scanning      
Remote Logging and Reporting  
Remote Access VPN  
ZTNA Remote Access  
Windows AD SSO Agent        
USB Device Control      
Endpoint Security
Antivirus      
Cloud-based Threat Detection        
Sandbox (on-prem)      
Sandbox (cloud-based)        
Automated Endpoint Quarantine        
Web Filter  
AntiExploit          
Application Firewall        
  VPN/ZTNA EPP/APT MANAGED
Zero Trust Agent
Zero Trust Network Access (ZTNA)
Central Management using FortiClient Cloud
Central Logging and Reporting
Remote Access VPN
SSO Mobility Agent
CASB (Inline and API)
IT Hygience
Vulnerability Agent and Remediation
FortiGuard Web Filtering
USB Device Control  
Endpoint Security (EPP)
FortiSandbox (On Premise or PaaS)  
FortiClient Cloud Sandbox  
AI-powered NGAV  
Automated Endpoint Quarantine  
Ransomware Protection  
Managed FortiClient Service
Endpoint On-boarding    
Initial Provisioning    
Security Fabric Setup/ Integration    
Vulnerability Monitoring    
Endpoint Security Monitoring    
Additional Services
Best Practice Service (BPS) Consultation Account Add-on Account Add-on N/A
Forensic Analysis Service (FAS) Account Add-on Account Add-on Account Add-on
24x7 Support
On-Premise/ Air Gap Option  

FortiClient Professional Services

Fortinet offers professional services specifically focused on FortiClient. These services can help you get the most out of your FortiClient solution, assisting with basic set up as well as optimizing competed solutions.  

FortiClient Best Practices Service

This service delivers guidance on deployment, upgrades, and operations. The BPS team will provide advice over the phone or email, but will not directly configure or manage the product.

This service provides analysis to help you respond to and recover from cyber incidents. Forensic analysts will assist in the collection, examination, and presentation of digital evidence.

FortiClient Managed Services

This service streamlines the configuration, deployment, and ongoing monitoring of FortiClient agents managed by FortiClient Cloud.

FortiCare Support & Professional Services

FortiCare provides 24x7 support options to help keep your Fortinet deployment up and running smoothly. We also have services such as our Premium RMA options with 4-hour replacements, to make sure you’re covered in case of an extreme event.

Technical Support Services

Technical Support Services

Various per-device options are available for efficient operations. FortiCare Elite option provides a 15-minute response time for critical products.

Advanced Support

Advanced Support

Various per-account white glove services are available to reduce disruption and increase productivity with operational reviews by designated experts.

Professional Services

Professional Services

Our multi-vendor experts can design and deploy a complete best practice-based solution to help you meet your network or security objectives and adopt new capabilities.

Resources

Data Sheets
eBooks
Analyst Reports
Reference Architecture
Solution Briefs
Webinars
White Papers

Ecosystem

FortiClient provides integration with many leading IT vendors as part of the Fortinet Security Fabric. Below is a list of current FortiClient Alliance Partners:

Training & Certifications

Network Security Expert (NSE) training courses provide in-depth, technical training on a product area or solution. Relevant training for FortiClient is listed below:
Fortinet Certified Professional - Network Security
In this course, you will learn how to use the FortiClient EMS feature, provision FortiClient endpoints, FortiClient EMS Security Fabric integration, explore different editions of FortiClient, and deploy and configure ZTNA agent and endpoint security features.
Other Training
Learn how to protect your organization and improve its security against advanced threats that bypass traditional security controls. You will also learn how other advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—leverage this threat intelligence information to protect organizations from advanced threats.

Free Product Demo

Explore the FortiClient EMS user interface in this self-guided demo of a virtualized deployment.

What to Expect:

  • Discover the easy-to-read dashboards that show the state of all endpoints at a glance
  • Drill down to get detailed information and telemetry on individual endpoints
  • Observe the ZTNA tags and polices available for zero trust configuration

Note for Gartner Peer Insights: Reviews from vendor partners or end users of companies with less than $50M in revenue are excluded from this methodology. See the full “Voice of the Customer” methodology.

Gartner, Voice of the Customer for Endpoint Protection Platform, Peer Contributors, 23 January 2026, 2025, 2024, and 2023. Gartner, Peer Insights™ and The Gartner Peer Insights Customers’ Choice badge are trademarks of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.