How to Use Fortinet Firewalls to Detect & Prevent Lateral Movement Attacks

Detecting & Preventing Lateral Movement Attacks With Fortinet Firewalls

Was there back when a solid perimeter high-five was the pick to click. Then came Slammer. That was when I realized we were doing network security all wrong. We weren’t protecting inside the network — just keeping the bad things out. Zoom forward to today, and attackers are no longer just trying to break in. They are getting in one way or another (phishing, unpatched vulnerabilities, bad credentials — take your pick) and then moving laterally.

With appropriate configuration, Fortinet firewalls can block this type of attack in its track. But you have to configure them correctly. Let’s break this down.

What is Lateral Movement?

Lateral movement is what occurs once an attacker infiltrates your network. They don’t simply stop at the first machine — they explore, escalate privileges, and get to the valuable systems. It’s what makes ransomware, data leaks and internal threats so deadly.

Here is a sparse outline of the attacker’s playbook:

Now—Fortinet can stop this. Let’s talk about how.

How Fortinet Firewalls Detect Internal Threats

If you are like the vast majority, you think of firewalls as a “keep bad guys out” tool. Cool, but that’s a 1990s mindset, bro. (And I should know—I was running voice/data over PSTN in those days.) Firewalls are present in the network today as well. If you’re only hardening the perimeter, you’re already late.

Fortinet firewalls assist in three major ways:

Random thing: I recently worked on zero-trust architecture changes for three banks with FortiGate firewalls and the biggest problem? Their internal systems were fully exposed. After all the movement of MFA security awareness training, they still had gaps because once trusted every device on the inside could talk. Not anymore.

Best Practices to Prevent Lateral Movement

Let’s get specific. Now if you want to truly use Fortinet firewalls to avoid lateral movement here are the things that need to happen:

1. ISFW Configuration (Internal Segmentation)

No more “flat” networks. A breached marketing laptop should not be able to access HR’s file shares.

2. Watch All East-West Traffic (Attackers Love It)

Or if a workstation that never hits the ERP server suddenly SPOMPS it? That’s worth investigating.

3. FortiGate + FortiClient ZTNA

If your database server has no MFA and is segmented—you are playing with fire.

4. Bait & Honeypots (Let The Adversary Do Their Own Work)

It’s similar to setting a mousetrap: if anything attempts to “move laterally” toward a false target, you know it was not supposed to be there.

5. Automate Threat Response (Because You’re Never Going to Be Fast Enough)

Attackers don’t wait around. Neither should your firewall.

Security Solutions for PJ Networks

This is why we set up Fortinet firewalls for our clients—real security isn’t only about stopping threats at the edge. It’s about stopping them before they go further.

At PJ Networks, we:

We recently locked down a financial institution that had an antiquated, absolutely flat network (and I do mean everything could speak to everything). Once they adopted microsegmentation using Fortinet, their risk was significantly reduced. Even if malware gets in now? It’s stuck.

Quick Take

Conclusion

Here’s the thing — the majority of businesses are still focused on “keeping attackers out.” That’s outdated. They’re already in. Phishing, zero-days and misconfiguration are just a few ways breaches occur.

What matters now is how quickly you identify and contain the threat.

When configured correctly, Fortinet’s firewall solutions make lateral movement almost impossible. But mere dumping in a FortiGate box will not be sufficient. These are the policies, segmentation, the detection tools, like a FortiAnalyzer and FortiDeceptor, that truly defend internal networks.

Think your network isn’t susceptible? Every single one of the breached companies who got breached.

Schedule a time to make a real security plan with Fortinet firewalls. Let’s talk.

Exit mobile version