Skip to content Skip to navigation Skip to footer

Overview

FortiEDR identifies and stops breaches in real time automatically and efficiently with a lightweight agent. Part of the Fortinet Security Operations platform, it proactively shrinks the attack surface, prevents malware infection, detects and defuses potential threats immediately, and automates response and remediation procedures with customizable playbooks across legacy and current operating systems.

FortiEDR UI

FortiEDR Advanced Endpoint Protection

FortiEDR safeguards your digital landscape with evasion-resistant, real-time protection, automated incident response, and comprehensive security capabilities tailored to enhance your cybersecurity posture for workstations, servers, and cloud workloads. Reduce the attack surface and leverage out-of-the-box policies that are tightly mapped to the MITRE ATT&CK framework so security teams can respond to a multitude of advanced tactics, techniques, and procedures found in attacks such as ransomware.

The FortiEDR Collector in Action

See how the FortiEDR collector agent is installed on communicating devices in organizations for protection. Installation is swift and doesn't necessitate a reboot. FortiEDR has a minimal impact on devices, retaining limited metadata and using compression to minimize network traffic, CPU usage, memory, and disk space. See an immediate return on investment by freeing up compute resources from other EDR products. FortiEDR can be deployed rapidly with an optional logging and simulation mode while interoperating with other solutions.

Watch Now

Automating Response to Complex Threats

See how FortiEDR, the foundation of FortiXDR, automates incident response with customizable playbooks. Learn how it categorizes events to initiate actions such as notifications, domain blocks, device isolation, and more. Observe as the system shifts from simulation to protection mode, effectively managing malware threats by deleting files, resetting passwords, and blocking IP addresses. This demonstration is shown on both Windows and Linux devices, showcasing its comprehensive capabilities.

Watch Now

Features and Benefits

Discover and Control

Discover and control rogue devices and applications based on risk mitigation policies.

Detect and Defuse in Real Time

Automatically detect and defuse potential threats in real time—even on compromised devices.

Automatic Incident Response

Use customizable contextual incident response playbooks that automate incident response.

Drive Identity-based Response

Integrate identity tools to enhance threat detection, response, and investigation capabilities.

Gain Efficient Security Operations

Eliminate alert fatigue and optimize operations with customizable incident response processes.

Enable Full Feature Parity

Support legacy systems like XP or Server 2003 and get full feature parity.

100%

98%

Visibility in MITRE ATT&CK Evaluations

24x7

Our Global Managed Service does the work for you

FortiEDR Use Cases

Detection
Real-time Breach Protection
During a security incident, FortiEDR can prevent data exfiltration and protect against ransomware. It will also roll back malicious changes.
icon secure internet access
Attack surface reduction
FortiEDR can discover and control rogue devices, IoT devices, and applications, plus their respective vulnerabilities in real time.
Respond
Optimized incident response
Precanned playbook-based incident response enables customized processes based on asset value, endpoint groups, and incident classification.
icon ot
OT protection
FortiEDR ensures high availability for OT systems even during a security incident or breach.
Virtual Patch
POS system security
FortiEDR prevents data exfiltration in the event of system compromise. It delivers virtual patching to shield POS systems from vulnerabilities.
icon fabric integration
Fabric connectivity
FortiEDR integrates with the Fortinet Security Fabric for shared intelligence and incident response from identity, firewalls, email, and more.

Enterprise Analyst Validation

ESG Economic Validation on Fortinet SecOps Fabric
ESG Economic Validation: The Quantified Benefits of Fortinet Security Operations Solutions. Improved security team operational efficiency and reduced risk to the organization, each by up to 99%. Written by Aviv Kaufmann, Practice Director and Principal Economic Validation Analyst at Enterprise Strategy Group. July 2023
The Quantified Benefits of Fortinet Security Operations Solutions
As enterprises evolve, new technologies emerge, and cybercriminals introduce more sophisticated attacks, security leaders and their teams face a variety of challenges in securing the organization’s networks. This new report published by Enterprise Strategy Group details the benefits of using Fortinet Security Operations solutions, including improved operational efficiency and more effective risk management.
Download Report »

Case Studies

Defensoria Pública da União
Defensoria Pública da União
Brazilian Government Institution Mitigates Cyberthreat Attempts with Fortinet Solutions
KAN Group
KAN Group
Polish Manufacturer Enhances Quality of Service for Customers and Staff with Increased Network Performance, Reliability, and Security
Nagasaki Prefectural Office of Education
Nagasaki Prefectural Office of Education
Nagasaki School Leaders Choose FortiEDR to Protect Their District from Ransomware
Toyota Material Handling
Toyota Material Handling
Toyota Material Handling Converges its IT and OT Environments with the Fortinet Security Fabric

Gartner Peer Reviews

At Fortinet, our top priority is always our customers. We're honored to once more be recognized as a 2023 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms. This accolade stems from over 120 evaluations of FortiEDR with high marks for integration, deployment, and customer service. Beyond the positive ratings, 94% of those who reviewed FortiEDR are ready to endorse the solution to peers. gartner customers choice 2024
★★★★★
FortiEDR - Outstanding EDR Solution Offering And Best In Class Services

I am currently administrating the FortiEDR since many Years, and working experience with this product is outstanding as compare to same solution from other vendors.

—  Director of Engineering in the IT Services Industry

★★★★★
FortiEDR Is A Good Product, Easy To Use And Light In Resource-Consumption.

We have a long and good relationship with Fortinet that expans several years. They have helped us to set up our network infrastructure and always provide support when needed

—  Network and Cybersecurity Arquitect in the Telecommunication Industry

★★★★★
FortiEDR Goes Beyond A Common EDR As It Covers Playbooks, EPP, And XDR Features.

FortiEDR is an advanced endpoint protection, detection, and response, that includes XDR functions, taking advantage of its integration with the Fortinet security fabric components; providing extensive security and correlation of network and endpoint logs to detect and block anomalies and intrusions.

—  Reviewer from the Telecommunication Industry

★★★★★
Solid EDR Product Delivered By A Solid And Secure Market Leader

the real time automated end point protection features are very positive and useful from an administration and user points of view

—  Sr. Network Administrator in the Retail Industry

★★★★★
Fortinet Fabric Integration Enable More Deeper Integration Between Endpoint And Network

FortiEDR provide realtime Detection, protection & response for workstation, servers including cloud workload.

—  Consultant in the IT Services Industry

Models and Specifications

FortiEDR features multi-tenant management in the cloud. The EDR solution can be deployed as a cloud-native, hybrid, or on-premises.

FortiEDR supports Windows, MacOS, and Linux operating systems, and offers offline protection.

Windows
Versions
XP SP2/SP3, 7, 8, 8.1, 10, and 11 (32-bit and 64-bit versions)
Windows Server
Versions
2003 SP2, R2 SP2, 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, and 2022
Google Cloud
Versions
Compute Engine Deployments and Procurement
MacOS
Versions
El Capitan (10.11), Sierra (10.12), High Sierra (10.13), Mojave (10.14), Catalina (10.15), Big Sur (11.x), Monterey (12.x), and Ventura (13.x)
Linux
Versions
RedHat Enterprise Linux and CentOS 6.x, 7.x, and 8.x, Ubuntu LTS 16.04.x, 18.04.x, 20.04.x server, 64 bit only Oracle Linux 6.x+, 7.7+, and 8.2+, Amazon Linux AMI 2 SuSE SLES 15.1
VDI Environments
Versions
VMware Horizons 6 and 7 and Citrix XenDesktop 7

FortiCare Support & Professional Services

Fortinet is dedicated to helping our customers succeed, and every year FortiCare services help thousands of organizations get the most from their investments in Fortinet's products and services. To achieve this, FortiCare follows the life-cycle approach and provides unique services to help our customers in their success journeys.

Technical Support Services

Technical Support Services

Various per-device options are available for efficient operations. FortiCare Elite option provides a 15-minute response time for critical products.

Professional Services

Professional Services

Our multi-vendor experts can design and deploy a complete best practice-based solution to help you meet your network or security objectives and adopt new capabilities.

Resources

Data Sheets
Analyst Reports
Infographics
Solution Briefs
Videos
Webinars
White Papers
Massively Accelerate Time to Detect and Disrupt, Investigate and Remediate with the Fortinet Security Operations Solution
Massively Accelerate Time to Detect and Disrupt, Investigate and Remediate with the Fortinet Security Operations Solution »

Fortinet Security Operations Solution uses AI and advanced analytics to monitor activity across users, devices, networks, emails, applications, files, and logs and detect anomalous or malicious actions that humans may easily overlook.

How FortiEDR Checks Buyers’ Boxes
How FortiEDR Checks Buyers’ Boxes »

As organizations begin to evaluate new endpoint security platforms, they have various needs to fulfill and coinciding vendor solutions to those needs to choose from. This paper covers how FortiEDR helps customers check some of the common boxes between a global distribution of organizations of all sizes and from all verticals.

Integrating FortiEDR and FortiXDR with the Fortinet Security Fabric
Integrating FortiEDR and FortiXDR with the Fortinet Security Fabric »

When security teams struggle with limited visibility and inefficient operations, it can lead to potential security breaches. This solution brief shares how integrating FortiEDR and/or FortiXDR with the Fortinet Security Fabric and third-party solutions, can offer enhanced threat detection, automated response, and a unified cybersecurity approach. This holistic ecosystem facilitates rapid threat containment, reduces security gaps, and empowers businesses with comprehensive protection.

FortiEDR Integration with Google Cloud Security Command Center and Amazon GuardDuty
FortiEDR Integration with Google Cloud Security Command Center and Amazon GuardDuty »

With XDR solutions increasingly gaining adoption, the mission today for security vendors is to build their solution to ingest multiple data lakes of security data to SOLUTION BRIEF come closer to the concept of a self-healing ecosystem.

The Security Risks and Challenges of Cloud Computing
The Security Risks and Challenges of Cloud Computing »

Cloud misconfigurations lead to common security gaps

Protecting OT Infrastructures with Real-time, Automated Endpoint Security
Protecting OT Infrastructures with Real-time, Automated Endpoint Security »

Learn how manufacturing and critical infrastructure environment can protect their OT endpoints benefit from faster threat responses, automated actions, and avoiding disruptions to production activities.

See How FortiEDR Detects and Defuses Lateral Movement
See How FortiEDR Detects and Defuses Lateral Movement »

Attacks are designed to land on the endpoint and travel laterally to other networks and drives. See how FortiEDR stops this type of movement using a real live malware sample.

Discussing the FortiEDR Collector and How it Works
Discussing the FortiEDR Collector and How it Works »

Within the Fortinet Security Operations platforms, we'll explore the functionality of the FortiEDR collector, specifically focusing on its operation with current and end-of-life legacy systems like Windows XP. Learn how it's installed, without reboot, and runs with a lightweight footprint.

Explore FortiEDR
Explore FortiEDR »

Explore the advanced capabilities of FortiEDR, Fortinet's Endpoint Security offering, which delivers simplified, real-time, and automated endpoint detection and response. It also offers orchestrated automated responses to policy violations for workstations, servers, and cloud workloads.

Consolidate Cybersecurity with Extended Detection and Response
Consolidate Cybersecurity with Extended Detection and Response »

Today, most companies are working to consolidate cybersecurity vendors and products into platforms whose components work together to boost the speed and accuracy of threat detection while improving the productivity of their security operations teams. One great use case is extended detection and response, which integrates, correlates, and contextualizes data and alerts from multiple security prevention, detection, and response components.

Bolster Endpoint Security and Defend Your Brand
Bolster Endpoint Security and Defend Your Brand »

Fortinet's FortiEDR protects workstations, servers, and virtual machines running in the cloud. Now available in Google Cloud Marketplace!

FortiEDR Advanced Endpoint Protection
FortiEDR Advanced Endpoint Protection »

See how FortiEDR detects and blocks ransomware and other file-less attacks to stop breaches in real time. It also reduces the attack surface and remotely remediates affected endpoints.

Meeting Today’s Modern Endpoint Security Requirements | FortiEDR
Meeting Today’s Modern Endpoint Security Requirements | FortiEDR »

Learn about today’s requirements for modern endpoint security, as well as the unique detect and defuse capability available from Fortinet, to reduce your cyber risk despite an industry-wide shortage of cybersecurity professionals. Prevent attacks by extending visibility and security across endpoints and workloads, no matter where they are.

How FortiXDR Integrates with Email
How FortiXDR Integrates with Email »

See how FortiXDR can integrate with email to detect attacks appearing via this threat vector.

How to Remediate Complex Threats with FortiEDR
How to Remediate Complex Threats with FortiEDR »

Watch how to manually remediate a threat with FortiEDR and search for other instances across other devices.

Ransomware Protection and Remediation | Endpoint Security
Ransomware Protection and Remediation | Endpoint Security »

Ransomware is a major concern for organizations and individuals alike. See how FortiEDR will protect against this threat and how we remediate the issue using the central management console.

How FortiEDR's Custom Detection Rules Work
How FortiEDR's Custom Detection Rules Work »

If you are concerned about a threat, you can search for it and even set up a reoccurring scan for it using FortiEDR’s customizable search function for things like indicators of compromise.

FortiEDR's Integration to UEM
FortiEDR's Integration to UEM »

Discover how the FortiEDR management console, which centrally manages installation, can allow you to use the UEM of your choice.

Ecosystem

FortiEDR integrates with the Fortinet Security Fabric as well as third-party solutions to build customizable incident response playbooks based on the various user or device groups you establish.

Training & Certifications

Fortinet Certified Professional - Security Operations
In this two-day class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality.

Schedule a Demo

Learn the benefits of guided remediation and automated incident response in this personalized demo.

What to Expect:

  • Live demonstration of real-time threat management
  • Guided set up of security policies and simulations
  • Overview of threat-hunting and playbook automation

FortiEDR News

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademarks of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

THE GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE BADGE IS A TRADEMARK AND SERVICE MARK OF GARTNER, INC. AND/OR ITS AFFILIATES AND IS USED HEREIN WITH PERMISSION. ALL RIGHTS RESERVED. GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE CONSTITUTE THE SUBJECTIVE OPINIONS OF INDIVIDUAL END-USER REVIEWS, RATINGS, AND DATA APPLIED AGAINST A DOCUMENTED METHODOLOGY; THEY NEITHER REPRESENT THE VIEWS OF, NOR CONSTITUTE AN ENDORSEMENT BY, GARTNER OR ITS AFFILIATES.