"The third step (AND LAST) in implementing the Security Fabric is to authorize the downstream FortiGate devices on the root FortiGate."
Reference: FortiGate Administrator 7.4 - Study Guide, page 389
When you authorize the downstream devices, you automatically authorize them in FortiAnalyzer.
C is correct. "Final Step" is authorize Fortigate on Fortianalyzer. Authorize downstream Fortigates on Root Fortigate is required too but is the third step not the final one. Study Guide 6.4 chapter Security Fabric look for authorizing devices.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
rinsable
Highly Voted 4 years, 4 months agojaz600
4 years, 3 months agoherlock_sholmes_2810
Most Recent 3 months, 3 weeks agoKunot
5 months, 3 weeks agoeinstein85
2 years, 2 months agoAOC
4 years, 1 month agobrunojlm88
4 years, 1 month agobwman
4 years, 2 months agopollyy
4 years, 3 months ago