index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
2,055
Security Profiles config firewall ssl-ssh-profile edit "protocols" config ssh set ports 22 set status deep-inspection end next end 4. Configure the firewall policy: config firewall policy edit 1 set name "ICAP" set srcintf "lan" set dstintf "mgmt" set action accept set srcaddr "all" set dstaddr "all" set schedule "alwa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,056
Security Profiles Where: l X-Client-IP = the client sending the file l X-Server-IP = the server receiving the file l Tue Sep 20 04:01:50 UTC 2022 = the content of the file, which is in clear text after the FortiGate performs deep inspection b. The ICAP server response that the file is cleared and allowed to pass withou...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,057
Security Profiles 2. Configure the ICAP profile: config icap profile edit "Prop-Content-Filtration" set request enable set response enable set streaming-content-bypass enable set request-server "content-filtration-server4" set response-server "content-filtration-server4" set request-path "/proprietary_code/content-filt...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,058
Security Profiles To configure the LDAP authentication: 1. Configure the LDAP server: config user ldap edit "AD-ldap" set server "10.1.100.131" set cnid "cn" set dn "dc=fortinet-fsso,dc=com" set type regular set username "cn=Administrator,cn=users,dc=fortinet-fsso,dc=com" set password **********  next end 2. Configure ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,059
Security Profiles 5. Optionally, run the following command to verify WAD debugs: # diagnose wad debug enable category icap FSSO example In this example, a local FSSO agent and remote user group are configured. When successful user authentication occurs, FortiOS retrieves all the user information (such as the domain nam...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,060
Security Profiles ... 06/20/2023 14:58:58 [ 1484] FortiGate connection accepted, auth OK. 06/20/2023 14:58:58 [ 1484] FortiGate:FG4H1E5819900343-root connected on socket (2004). 06/20/2023 14:58:58 [ 1484] send AUTH, len:26 06/20/2023 14:58:58 [ 1484] ready to read from socket 06/20/2023 14:58:58 [ 1484] Bytes received...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,061
Security Profiles Example In this example, FortiGate acts as the ICAP client, and FortiProxy acts as the ICAP server. An ICAP profile is configured on FortiGate with ocr-only enabled. An ICAP server is configured on FortiProxy with the icap-service configured to use an image-analyzer ICAP profile. When a client HTTP re...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,062
Security Profiles config icap profile edit "ocr" set request enable set response enable set ocr-only enable set request-server "icap_server1" set response-server "icap_server1" next end To enable image scanning on the ICAP server: 1. On FortiProxy acting as an ICAP server, create an image-analyzer ICAP profile: In this...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,063
Security Profiles Web application firewall Web application firewall (WAF) profiles can detect and block known web application attacks. You can configure WAF profiles to use signatures and constraints to examine web traffic. You can also enforce an HTTP method policy, which controls the HTTP method that matches the spec...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,064
Security Profiles c. Click OK. d. Enable Generic Attacks (Extended) and edit it so that it is enabled, the Action is set to Block, and the Severity is set to High. e. Click OK. f. Click OK. 3. Apply the profile to a security policy: a. Go to Policy & Objects > Firewall Policy and edit the policy that allows access to t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,065
Security Profiles 4. Verify that the web application firewall blocks traffic: a. Use the following URL to simulate an attack on your web server and substitute the IP address of your server: http://<server IP>/index.php?username=1'%20or%20'1'%20=%20'1&password=1'%20or%20'1'%20=%20'1 An error message appears, stating tha...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,066
Security Profiles Component Description DLP profile Define rules for matching a sensor based on a file type or a message, and the type of protocol being used. It also allows you to choose the action to allow, log, block, or quarantine the address. A DLP profile selects one or more sensors, and applies the sensor’s patt...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,067
Security Profiles Logging and blocking files by file name Sometimes, file names are not accurately recorded in DLP logs, even though the files are blocked correctly based on the DLP profile. This is particularly apparent on cloud-based services, such as Google Drive or SharePoint. For HTTP file uploads, some cloud serv...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,068
Security Profiles Technique Description GUI CLI See Built-in DLP data type on page 2075 for more information. Custom data classification tags (data pattern) FortiGate allows you to create patterns for your custom data type. See Custom DLP data type on page 2075 for more information. ✓ ✓ True file type filtering Identif...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,069
Security Profiles l A DLP sensor defines which dictionary and/or EDM template to check. It counts the number of matches to trigger the sensor. 3. Configure the DLP profile: l A DLP profile allows for filtering by size and file type. See DLP file pattern on page 2076 for custom file type. 4. Add the DLP profile to a fir...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,070
Security Profiles the data type. If the patterns are invalid, FortiGate cannot use them, and no warning is displayed. +All of these fields Click to pair each column in the external data file with a built-in data type. All of the specified data in this section must match for FortiGate to take an action. Column index Spe...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,071
Security Profiles To configure a DLP profile: 1. Go to Security Profiles > Data Loss Prevention. 2. Select the Profile tab and click Create New. 3. Enter a name. 4. In the Rules section, click Create New. 5. Configure the following settings: Name Filter name. Data source type Specify what type of data source to use:  l...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,072
Security Profiles To configure a DLP dictionary: config dlp dictionary edit <name> config entries edit 1 set type {credit-card | hex | keyword | mip-label | regex | ssn-us} set pattern <string> set repeat {enable | disable} set status {enable | disable} next end next end To configure an EDM template: When configuring a...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,073
Security Profiles config entries edit <id> set dictionary <dlp dictionary or EDM template> set count <integer> set status {enable | disable} next end next end See Evaluation by logical relationship on page 2077 for more information about match-eval. To configure a DLP profile: config dlp profile edit <name> set feature...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,074
Security Profiles Built-in DLP data type Built-in DLP data type includes pre-defined data types to match for keyword, regex, hex, mip label, credit card, and social security number (SSN). See Predefined data patterns on page 2068 for more information. The built-in DLP data type regex employs DCM to detect patterns. See...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,075
Security Profiles set match-back <integer> set pattern <string> next end <name> The name of the table containing the data type. pattern <string> Specify the regular expression pattern string without look around verify <string> Specify the regular expression pattern string used to verify the data type. verify2 <string> ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,076
Security Profiles set file-type <file_type> next end next end Evaluation by logical relationship Evaluation by logical relationship is a powerful tool used to combine multiple dictionary entries to define an accurate DLP sensor using logical expression. Syntax examples: 1. set eval "dict(1) == 2" Match DLP sensor only ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,077
Security Profiles To configure a DLP fingerprint document: config dlp fp-doc-source edit <name> set server <string> set username <string> set password <password> set file-path <string> set sensitivity <Critical | Private | Warning> next end Command Description server <string> Enter the IPv4 or IPv6 address of the file ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,078
Security Profiles Command Description proto {smtp | pop3 | imap | http￾get | http-post | ftp | nntp | mapi | ssh | cifs} Set the protocol to inspect. filter-by fingerprint Set to match against a fingerprint sensitivity. sensitivity {Critical | Private | Warning} Set the DLP file pattern sensitivity to match. match-perc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,079
Security Profiles next end This step can only be configured in the CLI. 2. Configure the DLP profile: config dlp profile edit "fingerprint" set feature-set proxy config rule edit 1 set proto http-get set filter-by fingerprint set sensitivity "Critical" set action block next end next end DLP profiles that filter by fing...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,080
Security Profiles A download attempt of a text file from a Windows device was made using Chrome browser. This text file is located on the protected server and its fingerprint is saved in the FortiGate fingerprint database. The download was unsuccessful, leading to the creation of a sample log. See Sample log on page 20...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,081
Security Profiles l Credit card numbers l Bank statements When enabled, the DLP database (DLDB) is downloaded to the FortiGate and its predefined patterns can be configured in DLP profiles. To configure DLP database updates: config system fortiguard set update-dldb {enable | disable} end To verify the database signatur...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,082
Security Profiles set pattern "fortiguard dlp signature" next end To configure the DLP profile in the GUI: 1. Configure the DLP sensor using the predefined dictionary from FortiGuard: a. Go to Security Profiles > Data Loss Prevention, select the Sensor tab, and click Create New. b. Enter a name (sin). c. In the Sensor ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,083
Security Profiles e. Click OK. f. Click OK to save the profile. To configure the DLP profile in the CLI: 1. Configure the DLP sensor using the predefined dictionary from FortiGuard: config dlp sensor edit "sin" config entries edit 1 set dictionary "fg-can-natl_id-sin-dict" next end next end 2. Configure the DLP profile...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,084
Security Profiles Sensitivity labels In order to safeguard your organization's data, labels can be employed as markers for sensitive information. Microsoft provides sensitivity labels, which act as identifiers emphasizing the importance of the data they're associated with, thereby enhancing the security measures in pla...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,085
Security Profiles 1. Create and configure sensitivity labels and their policies. See Create sensitivity labels for more information. 2. Apply a sensitivity label to content. See Apply sensitivity labels to your files and email for more information. Once the sensitivity label is applied on a file, you'll see it displaye...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,086
Security Profiles d. Configure the following settings: Name mip-label DATA source type MIP label MIP dic-case5 Severity Critical Action Block Match type File File type builtin-patterns Protocol SMTP, POP3, IMAP, HTTP-GET HTTP-POST, FTP, NNTP, MAPI, SSH, CIFS e. Click OK. f. Click OK to save the profile. 3. Add the DLP ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,087
Security Profiles edit 1 set name "mip-label" set severity critical set proto smtp pop3 imap http-get http-post ftp nntp mapi ssh cifs set filter-by mip set file-type 1 set label "dic-case5" set action block next end next end 3. Add the DLP profile to a firewall policy: config firewall policy edit 1 set srcintf "port2"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,088
Security Profiles Exact data matching Exact Data Matching (EDM) identifies particular data values within an indexed data source that require safeguarding. It offer precise detection and handling of sensitive data based on user-defined criteria. This enhances security and improves efficiency by reducing false-positive d...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,089
Security Profiles Data threat feed A data threat feed is a dynamic list that contains data. The data is patterns for DLP data types. The dynamic list is stored in a text (TXT) or comma-separated value (CSV) file format on an external server and periodically updated. After FortiGate can access the file, the patterns can...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,090
Security Profiles In this example, an EDM template named Customer SSN EDM is created on the FortiGate. During this process, a CSV file (customer_data.csv) located on an external server is imported using the data thread feed. Sample CSV file: SSN Last Name First Name Address City State ZIP Phone Email CCN 172- 32- 1176 ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,091
Security Profiles a. Go to Security Profiles > Data Loss Prevention > EDM Template, and click Create New. b. Specify a name for the template, such as Customer SSN EDM. c. Set Resource type to External feed, and set External feed URL to the location of the file on the external server, such as https://172.16.200.175/cust...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,092
Security Profiles g. Edit the DLP EDM template and click View Entries to view the data entries in the field. When viewing EDM entries, the GUI currently does not validate the entries and displays all entries as Valid. However, a Valid entry must have all values matching the data-type of the specific column. If one valu...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,093
Security Profiles 5. Add the DLP profile to a firewall policy: a. Go to Policy & Objects > Firewall Policy. b. Click Create New. c. Set the Inspection Mode to Proxy-based. d. In the Security Profiles section, enable DLP Profile and select Profile SSN EDM. e. Set SSL Inspection to deep-inspection. f. Configure the other...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,094
Security Profiles next end next end 4. Configure a DLP profile to use the DLP sensor. config dlp profile edit "Profile SSN EDM" set feature-set proxy config rule edit 1 set name "Rule SSN EDM" set type message set proto http-post set filter-by sensor set sensor “Sensor SSN EDM” set action block next end next end 5. Add...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,095
Security Profiles 2. FortiGate blocks the user's attempt and displays a replacement message: 3. FortiGate generates a DLP log: 1: date=2024-07-31 time=09:24:44 eventtime=1722443083953870602 tz="-0700" logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" vd="root" ruleid=1 rulename="Rule SSN EDM" ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,096
Security Profiles NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36" httpmethod="POST" referralurl="https://dlptest.com/https-post/" profile="Profile SSN EDM" DLP examples The following topics provide examples of DLP: l Block HTTPS upload traffic that includes credit card inform...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,097
Security Profiles f. Click Apply. g. Click OK to save the sensor. 3. Configure the DLP profile: a. Go to Security Profiles > Data Loss Prevention, select the Profile tab, and click Create New. b. Enter a name (profile-case1). c. In the Rules section, click Create New. d. Configure the following settings: Name 1 Sensors...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,098
Security Profiles a. Go to Policy & Objects > Firewall Policy and click Create New. b. Set the Inspection Mode to Proxy-based. c. In the Security Profiles section, enable DLP Profile and select profile-case1. d. Configure the other settings as needed. e. Click OK. When a credit card is included in HTTP POST traffic, th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,099
Security Profiles set dstintf "port1" set action accept set srcaddr "all" set dstaddr "all" set srcaddr6 "all" set dstaddr6 "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set profile-protocol-options "protocol" set ssl-ssh-profile "protocols" set dlp-profile "profile-case1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,100
Security Profiles To log FTP upload traffic that has specific keyword, regex, and hex patterns repeated for five times in the GUI: 1. Configure the DLP dictionary with three entries: a. Go to Security Profiles > Data Loss Prevention, select the Dictionary tab, and click Create New. b. Enter a name (dic-case2). c. In th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,101
Security Profiles f. Edit the new entry and set the Number of matches required to 5. g. Click OK. h. Click OK to save the sensor. 3. Configure the DLP profile: a. Go to Security Profiles > Data Loss Prevention, select the Profile tab, and click Create New. b. Enter a name (profile-case2). c. In the Rules section, click...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,102
Security Profiles e. Click OK. f. Click OK to save the profile. 4. Add the DLP profile to a firewall policy: a. Go to Policy & Objects > Firewall Policy and click Create New. b. Set the Inspection Mode to Proxy-based. c. In the Security Profiles section, enable DLP Profile and select profile-case2. d. Configure the oth...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,103
Security Profiles config dlp profile edit "profile-case2" set feature-set proxy config rule edit 1  set proto ftp set filter-by sensor set file-type 1 set sensor "sensor-case2" set action block next end next end 4. Add the DLP profile to a firewall policy: config firewall policy edit 1 set srcintf "port2" set dstintf "...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,104
Security Profiles Block HTTPS downloads of EXE files and log HTTPS downloads of files larger than 500 KB FortiGate can detect any file larger than the configured limit. See File size filtering on page 2069 for more information. This configuration will block HTTPS downloads of EXE files and log HTTPS downloads of files ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,105
Security Profiles set utm-status enable set inspection-mode proxy set ssl-ssh-profile "custom-deep-inspection" set dlp-profile "profile-case3-type-size" set logtraffic all set nat enable next end 4. Download an EXE file using HTTPS. The download is blocked, a replacement message appears, and a DLP log is generated. Sam...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,106
Security Profiles To block HTTPS upload traffic that includes Visa or Mastercard credit card information in the GUI: 1. Configure the DLP dictionary: a. Go to Security Profiles > Data Loss Prevention, select the Dictionary tab, and click Create New. b. Create an entry for Visa: i. Enter a name (Finance_Credit_Card_Visa...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,107
Security Profiles Name 1 Sensors Finance Credit Card High Severity Critical Action Block Type File File type builtin-patterns Protocol HTTP-POST, HTTP-GET e. Click OK. f. Click OK to save the profile. 4. Add the DLP profile to a firewall policy: a. Go to Policy & Objects > Firewall Policy and click Create New. b. Set t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,108
Security Profiles edit 1 set type "credit-card" next end next end To use "?" in a regex pattern, see CLI basics on page 60. This method only supports direct console connection and SSH. It does not support the CLI console in the GUI. 2. Configure the DLP sensor: config dlp sensor edit "Finance_Credit_Card_High" config e...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,109
Security Profiles set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "deep-inspection" set dlp-profile "cc_block" set nat enable next end When a Visa or Mastercard credit card is included in HTTP GET or POST t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,110
Security Profiles Web-based chatbot implementations are dynamic and and can exhibit a wide range of variations. To maximize the effectiveness of blocking unwanted keywords, it is advised to add both a message and a file-based DLP rule. While this method enhances detection, it may not be entirely infallible. For optimal...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,111
Security Profiles d. Repeat step c and set Pattern to source code. e. Click OK. 2. Configure the DLP sensor: a. Go to Security Profiles > Data Loss Prevention, select the Sensor tab, then click Create New. b. Set Name to llmapps. c. In the Sensor Entries section, click Add. The Select Entries pane is displayed. d. Sele...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,112
Security Profiles next end next end 4. Configure the firewall address for the LLM application: a. Go to Policy & Objects > Addresses, select the Standard tab, then click Create New. b. Set the following: Name <name> Type FQDN FQDN See FQDN on page 2115 for the FQDN on the specific LLM application. c. Click OK. 5. Add t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,113
Security Profiles next end next end 2. Configure the DLP sensor: config dlp sensor edit "llmapps" config entries edit 1 set dictionary "llmapps" next end next end 3. Configure the DLP profile: config dlp profile edit "llmapps" set feature-set proxy config rule edit 1 set name "llmapps1" set severity critical set proto ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,114
Security Profiles next end 6. Add the DLP profile and the FQDN address to a firewall policy: config firewall policy edit 1 set name "llmapps " set srcintf "port2" set dstintf "port1" set action accept set srcaddr "all" set dstaddr "llmapps" set schedule "always" set service "ALL" set utm-status enable set inspection-mo...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,115
Security Profiles 3. Verify that the request failed and an error was generated. 4. Review the log that was generated when the attempt was made to send an HTTP POST request containing sensitive keywords: 1: date=2024-03-15 time=09:59:35 eventtime=1710453575538415503 tz="+1200" logid="0954024576" type="utm" subtype="dlp"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,116
Security Profiles 3. Verify that the request failed and an error was generated. 4. Review the log that was generated when the attempt was made to send an HTTP POST request containing sensitive keywords: 1: date=2024-03-15 time=09:50:29 eventtime=1710453029263609219 tz="+1200" logid="0954024576" type="utm" subtype="dlp"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,117
Security Profiles 3. Verify that the request failed and an error was generated. 4. Review the log that was generated when the attempt was made to send an HTTP POST request containing sensitive keywords: 1: date=2024-03-15 time=12:46:08 eventtime=1710463568053453203 tz="+1200" logid="0954024576" type="utm" subtype="dlp"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,118
Security Profiles c. Set Name to: matcharound. d. In the Dictionary Entries table, click Create New: i. Set Type to keyword ii. Set Pattern to user iii. Enable Case sensitive iv. Click OK. e. Click OK. f. Select the newly created dictionary and click Edit. g. Select Edit in CLI and enter the following command: #set mat...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,119
Security Profiles Sensors user Severity Critical Action Block Match Type Message Protocol HTTP-POST f. Click OK. g. Click OK to save the profile. 5. Add the DLP profile to a firewall policy: a. Go to Policy & Objects > Firewall Policy and click Create New. b. Set the Inspection Mode to Proxy-based. c. In the Security P...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,120
Security Profiles The pattern specified using the set pattern command, is designed to match any word, irrespective of case sensitivity, that contains between 6 and 12 characters. On the other hand, the pattern specified using the set verify command employs a positive lookbehind assertion. This assertion checks for the ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,121
Security Profiles 6. Add the DLP profile to a firewall policy: config firewall policy edit 1 set name "keyword" set srcintf "port2" set dstintf "port1" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "deep-...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,122
Security Profiles l The high level provides maximum precision to minimize false positives. l The medium level balances match quantity and precision. l The low level captures the most matches, but may result in more false positives. A valid DLP license is required to obtain the latest package. When applying a FortiGuard...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,123
Security Profiles 2. Test that an HTTPS message containing a SIN is blocked. DLP Test > HTTPS Post can be used to send a test message: The message is blocked: FortiOS 7.6.2 Administration Guide 2124 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,124
Security Profiles 3. Go to Log & Report > Security Events and view the Data Loss Prevention logs matching the can-natl_id-sin-dict-low dictionary. 4. Check the raw logs: 1: date=2024-05-29 time=16:55:27 eventtime=1717026926501493215 tz="-0700" logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,125
Security Profiles 3. Go to Log & Report > Security Events and view the Data Loss Prevention logs matching the can-natl_id-sin-dict￾med dictionary. 4. Check the raw logs: 1: date=2024-05-29 time=17:43:38 eventtime=1717029818309788622 tz="-0700" logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,126
Security Profiles To verify that the FortiGuard dictionary with a high confidence level will block matching message through an SMTP post: 1. Configure a DLP profile with a DLP sensor that uses the Canadian SIN card dictionary (fg-can-natl_id-sin￾dict) DLP dictionary with the Confidence level set to High and then use th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,127
Security Profiles Virtual patching profiles A virtual patching profile can be applied to firewall policies in any direction, protecting traffic from or to the vulnerable OT devices. Virtual patching profiles can also be combined with virtual patching on NAC policies, so that vulnerable OT devices are first assigned to ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,128
Security Profiles To configure virtual patching in the GUI, ensure that Virtual Patching is enabled on the System > Feature Visibility page. Virtual patching exemptions The Signature ID field includes a dropdown below it with suggestions (signature name and ID). Users can select a signature from the Suggestions dropdow...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,129
Security Profiles The Dashboard > Assets & Identities > Assets widget displays a tooltip for detected IoT and OT vulnerabilities when hovering over the Vulnerabilities column. Clicking View IoT/OT Vulnerabilities in the tooltip displays a list of vulnerabilities retrieved from the FortiGuard API server for the device. ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,130
Security Profiles The right-side gutter of virtual patching profile pages includes information about the following: l Operational Technology (OT) Security Service entitlement status l OT Detection Definitions Package version l OT Virtual Patching Signatures Package version The System > FortiGuard > Subscriptions tab al...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,131
Security Profiles OT virtual patching basic examples This topic contains two OT virtual patching examples: a basic configuration, and configuration that uses a NAC policy. Example 1: basic configuration This example demonstrates the flow for OT virtual patching from start to finish. First, a device (10.1.100.22) goes t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,132
Security Profiles 3. View the OT detection rules downloaded on the FortiGate. In this example, the OT detection rule ID 10000870 is a specially crafted signature to match Apple iPad traffic to the OT category: # get rule otdt status app-name: "Apple.iPad" id: 10000870 category: "OT" cat-id: 34 popularity: 5.low risk: 1...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,133
Security Profiles Severity Select Info, Low, Medium, High, and Critical Action Block Logging Enable c. Click OK. 3. Apply the virtual patching profile to a firewall policy for traffic from port2 to port1: a. Go to Policy & Objects > Firewall Policy and click Create New. b. In the Security Profiles section, enable Virtu...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,134
Security Profiles To test the virtual patching: 1. On the PC, generate traffic that simulates web traffic from an iPad. This traffic is generated in order for the FortiGate to perform device detection on port2. The OT detection signature 10000870 will be triggered, which considers this traffic from an OT device in this...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,135
Security Profiles service="HTTP" policyid=1 poluuid="a3424268-1ffc-51ed-3ba9-f3a60e2271cf" policytype="policy" attack="WAP.Generic.XSS" srcport=47830 dstport=80 hostname="172.16.200.55" url="/index.html?<javascript>" agent="curl/7.61.1" httpmethod="POST" direction="outgoing" attackid=10000684 Example 2: NAC policy In t...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,136
Security Profiles set device-identification enable next end 2. Configure the virtual patching profile: config virtual-patch profile edit "OT_check" set severity info low medium high critical next end 3. Apply the virtual patching profile to a firewall policy: config firewall policy edit 1 set name "virtualpatch-policy"...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,137
Security Profiles Example In this example, a device with a certain vulnerability severity is detected by the NAC policy on the FortiGate. Subsequently, the FortiSwitch port in which it is connected to is moved to vlan300 where traffic can be controlled for vulnerable devices. For more information about NAC policies, se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,138
Security Profiles e. Configure the other settings as needed. f. Click OK. 2. Enable NAC mode on the desired FortiSwitch ports (port6 in this example): a. Go to WiFi & Switch Controller > FortiSwitch Ports. b. Select port6, then right-click and set the Mode to NAC. 3. Enable application control on the firewall policy th...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,139
Security Profiles To configure virtual patching on NAC policies in the CLI: 1. Configure the VLAN in the MAC policy: config switch-controller mac-policy edit "IoT" set fortilink "fortilink" set vlan "vlan300" next end 2. Configure the NAC policy: config user nac-policy edit "IoT" set category vulnerability set severity...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,140
Security Profiles l certificate-inspection l deep-inspection l no-inspection The custom-deep-inspection profile can be edited, or you can create your own SSL/SSH inspection profiles. Deep inspection (also known as SSL/SSH inspection) is typically applied to outbound policies where destinations are unknown. Depending on...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,141
Security Profiles when inspecting outbound internet traffic. Other SSL Inspection Options become available to configure if this option is selected. l Protecting SSL Server: Use this option when setting up a profile customized for a specific SSL server with a specific certificate. Define the certificate using the Server...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,142
Security Profiles Inspect all ports Inspect all ports with the IPS engine by enabling Inspect all ports. Choose whether to disable DNS over TLS. HTTPS, SMTPS, POP3S, IMAPS, FTPS If Inspect all ports is disabled, specify the port through which traffic will be inspected in the field next to the listed protocols. See Insp...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,143
Security Profiles Invalid SSL certificates Allow or block the passing of traffic in invalid certificates. Additional common options that provide more granularity with actions for different types of invalid SSL certificates will become available if Invalid SSL certificates is set to Custom: l Expired certificates: Actio...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,144
Security Profiles Replacement messages for HTTPS connections When using certificate inspection in a firewall policy, a user will encounter a block page served in HTTPS when accessing an HTTPS web page that triggers a replacement message. The replacement message can display for many reasons, such as a page being blocked...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,145
Security Profiles For your clients to no longer see a warning message for an invalid certificate, install the respective CA certificate in the client's certificate store. To download the CA certificate: 1. Go to Security Profiles > SSL/SSH Inspection. 2. Edit the SSL/SSH inspection profile that is being used in the fir...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,146
Security Profiles 4. Configure the remaining setting as needed. 5. Click OK. Common options Invalid SSL certificates can be blocked, allowed, or a different actions can be configured for the different invalid certificates types. See Configuring an SSL/SSH inspection profile on page 2141. Deep inspection You can configu...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,147
Security Profiles l SMTPS l POP3S l FTPS l DNS over TLS Each protocol has a default TCP port. The ports can be modified to inspect any port with flowing traffic. The packet headers indicate which protocol generated the packet. Protocol port mapping only works with proxy-based inspection. Flow-based inspection inspects ...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,148
Security Profiles If you want to exempt commonly trusted web sites, you can bypass the SSL allowlist in the SSL/SSH profile by enabling Reputable websites. The allowlist includes common web sites trusted by FortiGuard. SSL version support There are two ways to limit which SSL versions deep inspection is applied to. l I...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,149
Security Profiles Flow-based inspection does not support SSL version control. HTTPS and DOT options can enable QUIC inspection using the set quic inspect command. See DNS over QUIC and DNS over HTTP3 for transparent and local-in DNS modes on page 1915 for more information. Protecting an SSL server The Protecting SSL Se...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,150
Security Profiles Handling SSL offloaded traffic from an external decryption device In scenarios where the FortiGate is sandwiched between load-balancers and SSL processing is offloaded on the external load-balancers, the FortiGate can perform scanning on the unencrypted traffic by specifying the ssl￾offloaded option i...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,151
Security Profiles set ssl-offloaded yes end config imap set ports 143 set options fragmail set ssl-offloaded yes end config pop3 set ports 110 set options fragmail set ssl-offloaded yes end config smtp set ports 25 set options fragmail splice set ssl-offloaded yes end next end Verifying the packet captures The ADC1 inc...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,152
Security Profiles The ADC2 outgoing port capture shows that ADC2 forwards HTTPS traffic to the server: SSH traffic file scanning FortiGates can buffer, scan, log, or block files sent over SSH traffic (SCP and SFTP) depending on the file size, type, or contents (such as viruses or sensitive content). This feature is sup...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,153
Security Profiles To configure SCP block and log options: config ssh-filter profile edit <name> set block scp set log scp next end To configure the DLP profile: config dlp profile edit <name> set full-archive-proto ssh set summary-proto ssh config filter edit 1 set proto ssh next end next end To configure the antivirus...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
2,154
Security Profiles set block scp set log scp next end To apply the ssh-filter to a policy: config firewall policy edit <id> set utm-status enable set inspection-mode proxy set ssh-filter-profile <ssh-filter profile> next end Redirect to WAD after handshake completion In a proxy-based policy, the TCP connection is proxie...
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf