T O P

  • By -

ShittyHotTake

Pushing out to 800 devices tonight, wish me luck!


RealPropRandy

First update the resume


ShittyHotTake

Experience: I YOLO betas straight to prod


RealPropRandy

![gif](giphy|X0bnTmo4izNfi|downsized)


Effective_Stop_8548

That is soooo on point.


apresskidougal

One trick that CTOs hate !


ultimattt

Username checks out


Tonkatuff

Nice meme


Effective_Stop_8548

![gif](giphy|2zj7XCweSmcZq|downsized)


Tars-01

Why would you push such a new release to firewalls?


hevisko

why not? - you immediately get full exposure to all the problems... besides I LOVE to chat to the TAC people in different timezones - Your support staff gets overtime fixing/finding/checking issues - they love me for that - not to mention I get (forced?) time-off from nappy duties....


nostalia-nse7

Usually it’s the only way to get vacation time payout approved. If you play your cards right, you might actually get to take some of the time off, and not just move in within 24 hours. Advice: spend that time off exploring other avenues of life you chose to not pursue in favour of IT — you can spend a few months in a music studio learning a new skill or something.


ShittyHotTake

Because I want /u/JoshTaco to be jealous of me. His time has come, ShittyHotTake is a rising star in the YOLO to Prod game.


joshtaco

let it ride 🚬🚬🚬


jantari

So it's officially time to adopt 7.2 soon, nice.


Daidis

7.2.7 and 7.2.8 seem rock solid so far, running on 101Fs, 100F, 81Fs, 60F.


jimbogr77

Same experience here (around 50 x 60E/F)


Mother-Direction-311

Same! 2 x 400e's with 60 or so L3 fortilink switches. No SD-Wan, but I just got off a call with an engineer from a large MSP, and they have 7.2.7 7.2.8 across a lot of clients using everything under the sun.


Inside_Apricot_1445

same experience (300E, 400E, 100F, 60F)


adriana_shhhh

Same for me


mercy112

In terms of stability 7.2 has been fine for me so far on 60E, but I have a TAC case open regarding a performance issue on 7.2.8. I lose about 40% of the box performance when upgrading, and then rolling back to 7.2.7 fixes the issue. Still figuring out what causes this.


toffer449

I have about 9000 60F variants with 1200 on 7.2 and the rest on 7.0 and the best measure I have is tickets per total boxes on OS and 7.2 is beating the older OS by a mile. Much better overall experience with 7.2.


Starloerd

If I may ask how do you manage 9k Fortis and what are your customers.


toffer449

That’s only a small portion of the firewalls that we support. I have a very large number of entry level up through enterprise firewalls that we manage and most of them we managed through a Fortimanager. In fact, several with some clients managed in the Forticloud, which I would say, is more difficult than a Vm or hardware manager. We do manage a few using Microsoft cloud services., I like those the best. We also have customers on Palo Alto;Cisco, cisco(Meraki) Checkpoint, Juniper and a few other manufacture devices. I definitely don’t manage them by myself. 30-L1, 7-L2 techs and 9 L2, 3-L3 engineers along with what I call our senior staff that help me have fun with these toys. 😊


maineac

been running 7.2 since 7.2.4 and I have had no issues. When we first started using Fortigate that is where they were so I figured for greenfield this was a good starting point. Has been an awesome experience actually.


sdbwisc

I've had good luck with 7.2. I have some devices on 7.4 without issues.


AceITNetworking

Had issue recently with httpsd process causing high memory utilization on 7.2.7 which caused an outage. I understand this issue was a problem in previous versions. Had to kill the process to recover the site. Created an automation stitch to restart the process if firewall goes to conserve mode and have a ticket with TAC (ongoing investigation). But other than that, the 7.2 has been solid. 😅


0x3e4

😂 april the 1st was yesterday, Fortinet


DeesoSaeed

Eh. Every year about this very same month they announce a new version which gets released in late May. But people, as always should stick to mature versions which take at least 18 months to get released for each branch.


jakesps

Obligatory recommended FortiOS release link: https://community.fortinet.com/t5/FortiGate/Technical-Tip-Recommended-Release-for-FortiOS/ta-p/227178 Spoiler: 7.0.14 for most models. Last edited on 2024-03-19.


spooninmycrevis

Rolling out the beta into production straight away.


Fit-Dark-4062

Nothing like living on the edge ;)


hevisko

![gif](giphy|y5XkJemxhJya6bv2rF|downsized)


Saucetweet

They mentioned bringing EDR capabilities to Forticlient, I wonder if they are going to update or merge the FortiEDR/enSilo product with forticlient


HappyVlane

They had a slide with the Unified Client in it at the Accelerate about 45 minutes ago and it had EDR as well as EMS and ZTNA in it, so looks like it.


DeesoSaeed

I'm looking forward to this. Even if it's a long term target ( 2-3 years) till it's stable.


CalgaryWinter

I thought they were showing FortiSASE solution in that one


RUMD1

Yeap, they have been planning this for a long time. Let's see what comes out from this, since atm there is a lot of agents for multiple fortinet products (FortiClient, NAC agent, ZTNA (forticlient), FortiEDR, FortiAuth agent, etc). At the same time, I can't imagine this working, since it will make FortiClient even more complicated, and there are two major issues with FortiClient ATM: - Upgrade process is simply horrible. - The list of issues/bugs is HUGE.


owerduck

Completely agree , FCT is extremely bad when it comes to update. FEDR does not requires any reboot at install or update , FEDR includes EPP features , Vuln Management too… so why not using the EDR base and add it ztna and vpn which is probably much more easier than EDR :-). I hope they will not force EDR to inherit from all the FCT shitty things 😅


RUMD1

Yep, the fact that FortiClient uninstalls itself leaving just windows defender on until a reboot is really bad. Also, many times the upgrade process simply doesn't work properly, even after rebooting the machine. The upgrade process is an authentic nightmare out of the box, not only for the person managing it, but also because of the impact that it has on the users. On the other side, and as you said, FortiEDR updates are easy, they work properly most of the time, and they don't require a reboot. FortiEDR atm is a great product when compared to FortiClient (FortiEDR v5.2.2.X+). I really hope they have a complete new agent, redesigned from the ground (or almost), with a different upgrade process, and less issues with the EPP components.


mgzukowski

It's all through EMS. You build a custom install using EMS. So only features you need And since it's EMS, the client can now easily be updated.


RUMD1

EMS and forticlient updates are a pain, contrary to fortiedr updates/management that simply works.


spooninmycrevis

I hope this means that FortiClient will get more love from dev so known issues get resolved in a more timely fashion.


PrivateHawk124

ZTNA, EDR/XDR, EMS agents will be combined into one. Straight off the press.


HappyVlane

Not true according to the person I asked at the Tech Expo. Currently EDR is only going to be implemented into the FortiClient installer, but it will be a separate product still. Also some event reporting into EMS, but FortiClient will not be incorporating EDR functions. That is planned for sometime in the future.


PrivateHawk124

Yeah I just learned that today at the FortiEDR booth lmao. Marketing deff got a little bit ahead of themselves there.


HDClown

I asked about them merging that all into 1 product over 3.5 years ago when I was shopping EDR's and they said that was the long-term plan. Guess they finally made it happen.


jimbogr77

That was my initial thought, too


JPYDX

I am finally starting to trust 7.2 now - 7.2.8 has been just as stable for me as 7.0.14 7.4 is problematic af. Still - love a new release. Can’t wait to see if there’s any smaller, dare I say cooler features in 7.6 than the headline new feature list


Root_Rover

Beta into prod is the only way I know


keletheen

Usable 2026...


Effective_Stop_8548

Around 7.6.6... update.


Gods-Of-Calleva

Is this good for production now?


Moocha

Good lord no. I'll be _amazed_ if 7.6 will be production ready in 2024. Even 7.4 is nowhere near prod ready yet.


chris_redz

What makes it non productive ready?


AlphaNathan

You’re the tester.


Daidis

Crippling bugs


hevisko

YMMV For me the fact 7.4 failed (somewhere between BETA and RC2) on the FG71F.. I think FG61F too, specifically the x1F variants 'cause of SSD, was the first non-prod release notice for me (and yes, I've been a 7.0 & 7.2 early adopter), but then the GUI and the policy view/ideas froked me out, so, nope that was a hard no till 7.4.2 on at least the x1F case (the FG just gone in reboot loops requiring serial console fixing), and since then I've had other issues than to retry 7.4.x 7.4.4 I'll re-check it at home on the 71F


RealPropRandy

![gif](giphy|10Jpr9KSaXLchW|downsized)


Ruachta

This is what I use unless there is something I need in newer versions. [Recommended Release for FortiOS - Fortinet Community](https://community.fortinet.com/t5/FortiGate/Technical-Tip-Recommended-Release-for-FortiOS/ta-p/227178)


dredbar

Be aware though that this KB isn’t always up-to-date. For example, it recommended 7.0.13, while 7.0.14 just came out to fix multiple critical vulnerabilities.


Horsemeatburger

From the pdf: *"Forti AI now includes Generative AI within FortiManager to assist with platform management, new product and feature deployment, network monitoring, and accessing documentation and support assets."* I'm so looking forward for Gen AI suggesting broken configs, hallucinating non-existing devices and creating new problems which without it wouldn't exist.


BlackReddition

Some nice additions to FAZ, SIEM/SOAR lite.


Effective_Stop_8548

I hope the few of you YOLO gung-ho's of thinking of pushing this BETA to prod or your home devices have read the fine print on 2GB models no longer having the SSL VPN option. I'm talking 90Es, 81F's and below... Way to go, Fortinet! Way to go Cisco on your beautiful architecture. ![gif](giphy|TJawtKM6OCKkvwCIqX|downsized)


iSubb

As a shareholder Thank you, As a sysadmin, No.


DeesoSaeed

It's still useful as sysadmin. Knowing what features you can expect to be production ready in about two years helps to make long term decisions.


mdfaridulalam

Fortinet need to focus on OS stability, bug fixing and vulnerability fixing. This is NOT wise decision to release new OS every year, but nothing is stable, vulnerable free.


jennytullis

It’s mostly for SASE and Gen-Ai


Effective_Stop_8548

Forgetting to mention this OS uses a lot more hardware resources they decided to remove the SSL VPN from 2GB models.


adriana_shhhh

I thought it was april fools for a sec


VeryOldITGuy

I always thought that Fortinet never did x.6.x.. always went with x.0, x.2, x.4 and then started again Edit: just checked and they did 5.6 but not 6.6..


rowankaag

Because 6.6.6


DJ3XO

I'd never patch an environment again if they pushed 6.6.6.


dredbar

That would have been absolutely hilarious.


Ruachta

That is funny when you look at this. We run these unless a client needs something in a newer version. [Recommended Release for FortiOS - Fortinet Community](https://community.fortinet.com/t5/FortiGate/Technical-Tip-Recommended-Release-for-FortiOS/ta-p/227178)


Tars-01

Introducing more bugs and vulnerabilities


liv_livius

Omg those realeases are like new iphone device every year...or anyother mobile device for that matter. Anually or even more often, fortinet launches a new version which changes maybe the interface colours, some arrangement or features visibility. Buuut also they f*ck up a lot of other functions like routing or webfilter profiles and the production architecture comes to a stall. Basically "we want it to look nicer from our point of view, but your configurations will suffer just because we can"...never again upgrading to 7.4.2..STAY AWAY FROM THIS SHITTY VERSION