FortiMail branding or template change deploys but old content persists in user view
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail branding or template change deploys but old content persists in user view. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail integration duplicates actions and creates conflicting alerts
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail integration duplicates actions and creates conflicting alerts. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail failover or backup path tests cleanly but live cutover still fails
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail failover or backup path tests cleanly but live cutover still fails. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail remediation removes the symptom temporarily but issue returns after policy refresh
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail remediation removes the symptom temporarily but issue returns after policy refresh. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail client can reach the service but one dependency times out
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail client can reach the service but one dependency times out. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail reporting totals diverge from trace or log evidence after changes
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail reporting totals diverge from trace or log evidence after changes. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail service recovers after outage but cached state never normalizes
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail service recovers after outage but cached state never normalizes. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail background job runs on demand but fails unattended overnight
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail background job runs on demand but fails unattended overnight. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail update installs cleanly but one business-critical function disappears
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail update installs cleanly but one business-critical function disappears. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.
FortiMail authentication succeeds but downstream authorization still blocks access
Issue Summary
This article covers a FortiMail within Email Security issue where FortiMail authentication succeeds but downstream authorization still blocks access. Use the path below to confirm scope, identify whether the break is policy, configuration, sync, identity, routing, or client related, and work through repair in a controlled Tier I / II / III path.