Maybe giving an external firewall an Active Directory service account wasn't such a brilliant idea after all.
https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html
Maybe giving an external firewall an Active Directory service account wasn't such a brilliant idea after all.
https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html
Por que no los dos?
@johntimaeus Can't really argue with that.
There are cases where you want the firewall to treat different people differently, which makes a case for AD access; but if the thing is joining workstations you've clearly erred one way or another.
I haven't done AD design in a while, but this is a case where I'd consider limiting all LDAP traffic from the firewall to Read Only DCs. After I'd walked the permissions set on the service account twice.
Look no further than the ICS/OT world, where all the network segmentation and firewalling is done on a single edge-facing combined VPN/firewall.