Fortinet white logo
Fortinet white logo

Email templates

Email templates

Templates for building policies based on user email activity.

Note

To use this functionality, you must enable email monitoring for Agents. For details, refer to the FortiDLP Agent Deployment Guide and FortiDLP Administration Guide.

Note

For Agent 10.1.0+, the FortiDLP Email Add-in is required to monitor New Outlook on Windows and macOS, and Outlook on the Web for both platforms. The FortiDLP Email Plugin (Legacy) is required to monitor Classic Outlook on Windows.

Unauthorized email attachment opened or saved

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 7.8.0 or later

Detects when a user either opens an Outlook email attachment in an unauthorized application or saves an unauthorized email attachment from Outlook. A five-minute cache period is used to suppress detections for repeated file access events by the same process.

Note

This policy only monitors the Microsoft Outlook desktop application and does not support New Outlook.

Note

From Agent 9.1.0+, the "File extensions" parameter is deprecated and will only be used if the "File types" parameter (preferred) is not configured.

Parameter Type Description
File action parameters
Attachment actions to monitor String list A list of attachment actions to monitor. If "Opened" is selected, detections will be raised when an email attachment is opened by an unauthorized application. If "Saved" is selected, detections will be raised when an email attachment is saved to disk by Microsoft Outlook.
Process parameters
Binary names Advanced asset list A list of binary names (e.g. word.exe) authorized or unauthorized to open attachments. Case-insensitive matching is used.
File parameters
Filename keywords Advanced asset list A list of keywords that match if they appear anywhere in the attachment name (e.g. passwords, secret, confidential). Case-insensitive matching is used.
File types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 9.1.0+.
File extensions Advanced asset list A list of attachment file extensions that users are authorized or unauthorized to open or save (e.g. .doc, .docx, .pdf). The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated for Agent 9.1.0+ and will only be used if the "File types" parameter has not been configured or the Agent version does not support MIME type identification. The "File types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf".
Tactic Technique Sub-technique
T1213 (Data from Information Repositories)
attack.mitre.org/techniques/T1213/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by filename Disabled
Cluster by file extension Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Unauthorized email received (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 9.1.0 or later

Detects when, in Classic Outlook, a user receives an unauthorized email.

Note

Two sets of content inspection parameters can be configured to search for different data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels) in different sections of an email. For example, you could search for a credit card number in the email body and attachments and raise a detection only if the the keyword "Finance" was not in the subject line.

Note

All configured parameters must be met to generate a detection. If all parameters are left empty, all emails will be allowed. To perform content inspection, at least one data identifier and location is required.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to send email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to send email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Maximum permitted recipient domains Float The maximum number of allowed recipient email domains. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Recipient type String list A list of email recipient types to match on.
Content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Extended content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Attachment parameters
Prohibit email attachments Boolean The toggle to enable/disable prohibiting all email attachments. If this is enabled and no other parameters are set, a detection will be generated when an email containing an attachment is received. If this is enabled and other parameters are set, a detection will be generated when an email containing an attachment which matches the configured parameters is received.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Maximum permitted attachment size (MB) Float The maximum size of allowed attachments in megabytes. If this field is set to 0, no limit will be applied.
Email attachment file types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) authorized or unauthorized to be attached to emails. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured when using Agent 9.1.0+, the "Email attachment file extensions" parameter will be ignored. Requires Agent 9.1.0+.
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .doc, .docx, .xls, .xlsx) authorized or unauthorized to be attached to emails. The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated and will only be used if the "Email attachment file types" parameter has not been configured. The "Email attachment file types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf".
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by content Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email received with encrypted file attachment (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 10.1.1 or later

Detects when, in Classic Outlook, a user receives an unauthorized email containing an encrypted or password-protected file.

Note

All configured fields must be met to generate a detection.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to send email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to send email. Case-insensitive matching is used.
Maximum number of recipients Float The maximum size of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .pdf) to monitor for encrypted file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email received with link (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 9.0.1 or later

Detects when, in Classic Outlook, a user receives an email from an unauthorized sender, and that email contains a prohibited or suspicious link.

Note

In order for a detection to be generated, no configured allowlists must be matched, and, if configured, at least one denylist or toggle must be matched. If none of the parameters have been configured, all email links will be reported.

Parameter Type Description
Sender parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized for sending emails with links. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized for sending emails with links. Case-insensitive matching is used.
Link parameters
Prohibit links to URLs with IP addresses Boolean The toggle to enable/disable generating a detection when a user receives an email containing a link to a URL with an IP address (e.g. http://192.168.0.1/).
Prohibit URLs displayed as different addresses Boolean The toggle to enable/disable generating a detection when a user receives an email containing a link where the display text is a URL (e.g. https://example.com/) with a different domain than the target URL (e.g. https://phishing.com/).
Domains Advanced asset list A list of domain names (e.g. example.com) that are authorized or unauthorized to be included as links in an email.
URL regex patterns Advanced asset list A list of patterns matching URLs that are authorized or unauthorized to be included as links in an email. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo.
Tactic Technique Sub-technique
TA0001 (Initial Access)
attack.mitre.org/tactics/TA0001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by remote email domain Disabled
Cluster by hostname Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Unauthorized email received with ZIP file attachment (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 9.1.0 or later

Detects when, in Classic Outlook, a user receives an unauthorized email containing a ZIP file.

Note

All configured fields must be met to generate a detection.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to send email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to send email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Content inspection parameters
Content file names Advanced asset list A list of file path expressions that, when matched to a zipped file, make the ZIP file it is contained within authorized or unauthorized to be received via email. The match can use glob-style pattern matching rules (e.g. **\*.pdf would match all PDF files). An empty list will match all zipped files. Case-insensitive matching is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .zip) to monitor for unauthorized ZIP file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email sent

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 9.1.0 or later

Detects when, in Classic Outlook or New Outlook, a user sends an unauthorized email.

Note

Two sets of content inspection parameters can be configured to search for different data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels) in different sections of an email. For example, you could search for a credit card number in the email body and attachments and raise a detection only if the the keyword "Finance" was not in the subject line.

Note

All configured parameters must be met to generate a detection or block an email. If all parameters are left empty, all emails will be allowed. To perform content inspection, at least one data identifier and location is required.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to receive email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to receive email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Maximum permitted recipient domains Float The maximum number of allowed recipient email domains. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Recipient type String list A list of email recipient types to match on.
Content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection. Note: The FortiDLP Email Plugin (Legacy) requires Windows. The FortiDLP Email Add-in for Windows and macOS requires Agent 10.4.0+ for header inspection and Agent 10.1.3+ for attachment inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Extended content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection. Note: The FortiDLP Email Plugin (Legacy) requires Windows. The FortiDLP Email Add-in for Windows and macOS requires Agent 10.4.0+ for header inspection and Agent 10.1.3+ for attachment inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Attachment parameters
Prohibit email attachments Boolean The toggle to enable/disable prohibiting all email attachments. If this is enabled and no other parameters are set, a detection will be generated when an email containing an attachment is sent. If this is enabled and other parameters are set, a detection will be generated when an email containing an attachment which matches the configured parameters is sent.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Maximum permitted attachment size (MB) Float The maximum size of allowed attachments in megabytes. If this field is set to 0, no limit will be applied.
Email attachment file types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) authorized or unauthorized to be attached to emails. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured when using Agent 9.1.0+, the "Email attachment file extensions" parameter will be ignored. Requires Agent 9.1.0+.
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .doc, .docx, .xls, .xlsx) authorized or unauthorized to be attached to emails. The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated and will only be used if the "Email attachment file types" parameter has not been configured. The "Email attachment file types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf".
Attachment origin parameters
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by remote email domain Disabled
Cluster by recipient domain Disabled
Cluster by content Disabled
Cluster by policy Disabled

Supported actions: Block email, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email sent with encrypted file attachment

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 10.1.1 or later

Detects when, in Classic Outlook or New Outlook, a user sends an unauthorized email containing an encrypted or password-protected file.

Note

All configured fields must be met to generate a detection or block an email.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to receive email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to receive email. Case-insensitive matching is used.
Maximum number of recipients Float The maximum size of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .pdf) to monitor for encrypted file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Attachment origin parameters
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by recipient domain Disabled
Cluster by policy Disabled
Cluster by sender email address Disabled
Cluster by remote email domain Disabled

Supported actions: Block email, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email sent with ZIP file attachment

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 9.1.0 or later

Detects when, in Classic Outlook or New Outlook, a user sends an unauthorized email containing a ZIP file.

Note

All configured fields must be met to generate a detection or block an email.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to receive email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to receive email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Content inspection parameters
Content file names Advanced asset list A list of file path expressions that, when matched to a zipped file, make the ZIP file it is contained within authorized or unauthorized to be sent via email. The match can use glob-style pattern matching rules (e.g. **\*.pdf would match all PDF files). An empty list will match all zipped files. Case-insensitive matching is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .zip) to monitor for unauthorized ZIP file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Attachment origin parameters
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by remote email domain Disabled
Cluster by recipient domain Disabled
Cluster by policy Disabled

Supported actions: Block outbound email, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email tool used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a user runs an unauthorized email application.

Parameter Type Description
Process parameters
Authorized applications String list A list of email applications users are authorized to use. This template can detect use of Thunderbird, Windows Mail App, Windows Live Mail, Outlook (including new Outlook for Windows), eM Client, Pidgen, and Apple Mail.
Tactic Technique Sub-technique
TA0042 (Resource Development)
attack.mitre.org/tactics/TA0042/
T1588 (Obtain Capabilities)
attack.mitre.org/techniques/T1588/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process

Email templates

Email templates

Templates for building policies based on user email activity.

Note

To use this functionality, you must enable email monitoring for Agents. For details, refer to the FortiDLP Agent Deployment Guide and FortiDLP Administration Guide.

Note

For Agent 10.1.0+, the FortiDLP Email Add-in is required to monitor New Outlook on Windows and macOS, and Outlook on the Web for both platforms. The FortiDLP Email Plugin (Legacy) is required to monitor Classic Outlook on Windows.

Unauthorized email attachment opened or saved

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 7.8.0 or later

Detects when a user either opens an Outlook email attachment in an unauthorized application or saves an unauthorized email attachment from Outlook. A five-minute cache period is used to suppress detections for repeated file access events by the same process.

Note

This policy only monitors the Microsoft Outlook desktop application and does not support New Outlook.

Note

From Agent 9.1.0+, the "File extensions" parameter is deprecated and will only be used if the "File types" parameter (preferred) is not configured.

Parameter Type Description
File action parameters
Attachment actions to monitor String list A list of attachment actions to monitor. If "Opened" is selected, detections will be raised when an email attachment is opened by an unauthorized application. If "Saved" is selected, detections will be raised when an email attachment is saved to disk by Microsoft Outlook.
Process parameters
Binary names Advanced asset list A list of binary names (e.g. word.exe) authorized or unauthorized to open attachments. Case-insensitive matching is used.
File parameters
Filename keywords Advanced asset list A list of keywords that match if they appear anywhere in the attachment name (e.g. passwords, secret, confidential). Case-insensitive matching is used.
File types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 9.1.0+.
File extensions Advanced asset list A list of attachment file extensions that users are authorized or unauthorized to open or save (e.g. .doc, .docx, .pdf). The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated for Agent 9.1.0+ and will only be used if the "File types" parameter has not been configured or the Agent version does not support MIME type identification. The "File types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf".
Tactic Technique Sub-technique
T1213 (Data from Information Repositories)
attack.mitre.org/techniques/T1213/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by filename Disabled
Cluster by file extension Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Unauthorized email received (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 9.1.0 or later

Detects when, in Classic Outlook, a user receives an unauthorized email.

Note

Two sets of content inspection parameters can be configured to search for different data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels) in different sections of an email. For example, you could search for a credit card number in the email body and attachments and raise a detection only if the the keyword "Finance" was not in the subject line.

Note

All configured parameters must be met to generate a detection. If all parameters are left empty, all emails will be allowed. To perform content inspection, at least one data identifier and location is required.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to send email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to send email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Maximum permitted recipient domains Float The maximum number of allowed recipient email domains. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Recipient type String list A list of email recipient types to match on.
Content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Extended content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Attachment parameters
Prohibit email attachments Boolean The toggle to enable/disable prohibiting all email attachments. If this is enabled and no other parameters are set, a detection will be generated when an email containing an attachment is received. If this is enabled and other parameters are set, a detection will be generated when an email containing an attachment which matches the configured parameters is received.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Maximum permitted attachment size (MB) Float The maximum size of allowed attachments in megabytes. If this field is set to 0, no limit will be applied.
Email attachment file types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) authorized or unauthorized to be attached to emails. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured when using Agent 9.1.0+, the "Email attachment file extensions" parameter will be ignored. Requires Agent 9.1.0+.
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .doc, .docx, .xls, .xlsx) authorized or unauthorized to be attached to emails. The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated and will only be used if the "Email attachment file types" parameter has not been configured. The "Email attachment file types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf".
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by content Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email received with encrypted file attachment (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 10.1.1 or later

Detects when, in Classic Outlook, a user receives an unauthorized email containing an encrypted or password-protected file.

Note

All configured fields must be met to generate a detection.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to send email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to send email. Case-insensitive matching is used.
Maximum number of recipients Float The maximum size of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .pdf) to monitor for encrypted file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email received with link (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 9.0.1 or later

Detects when, in Classic Outlook, a user receives an email from an unauthorized sender, and that email contains a prohibited or suspicious link.

Note

In order for a detection to be generated, no configured allowlists must be matched, and, if configured, at least one denylist or toggle must be matched. If none of the parameters have been configured, all email links will be reported.

Parameter Type Description
Sender parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized for sending emails with links. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized for sending emails with links. Case-insensitive matching is used.
Link parameters
Prohibit links to URLs with IP addresses Boolean The toggle to enable/disable generating a detection when a user receives an email containing a link to a URL with an IP address (e.g. http://192.168.0.1/).
Prohibit URLs displayed as different addresses Boolean The toggle to enable/disable generating a detection when a user receives an email containing a link where the display text is a URL (e.g. https://example.com/) with a different domain than the target URL (e.g. https://phishing.com/).
Domains Advanced asset list A list of domain names (e.g. example.com) that are authorized or unauthorized to be included as links in an email.
URL regex patterns Advanced asset list A list of patterns matching URLs that are authorized or unauthorized to be included as links in an email. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo.
Tactic Technique Sub-technique
TA0001 (Initial Access)
attack.mitre.org/tactics/TA0001/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by remote email domain Disabled
Cluster by hostname Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot

Unauthorized email received with ZIP file attachment (Classic Outlook only)

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows, Agent version 9.1.0 or later

Detects when, in Classic Outlook, a user receives an unauthorized email containing a ZIP file.

Note

All configured fields must be met to generate a detection.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to send email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to send email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Content inspection parameters
Content file names Advanced asset list A list of file path expressions that, when matched to a zipped file, make the ZIP file it is contained within authorized or unauthorized to be received via email. The match can use glob-style pattern matching rules (e.g. **\*.pdf would match all PDF files). An empty list will match all zipped files. Case-insensitive matching is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .zip) to monitor for unauthorized ZIP file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email sent

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 9.1.0 or later

Detects when, in Classic Outlook or New Outlook, a user sends an unauthorized email.

Note

Two sets of content inspection parameters can be configured to search for different data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels) in different sections of an email. For example, you could search for a credit card number in the email body and attachments and raise a detection only if the the keyword "Finance" was not in the subject line.

Note

All configured parameters must be met to generate a detection or block an email. If all parameters are left empty, all emails will be allowed. To perform content inspection, at least one data identifier and location is required.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to receive email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to receive email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Maximum permitted recipient domains Float The maximum number of allowed recipient email domains. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Recipient type String list A list of email recipient types to match on.
Content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection. Note: The FortiDLP Email Plugin (Legacy) requires Windows. The FortiDLP Email Add-in for Windows and macOS requires Agent 10.4.0+ for header inspection and Agent 10.1.3+ for attachment inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Extended content inspection parameters
Content inspection location String list A list of email sections to perform content inspection on. Detections will be generated based on the total match count across all selected locations. Select "All email attachments" to combine match counts across all attachments, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 3 matches will be added to the total. Alternatively, select "Individual email attachments" to perform a separate total calculation for each attachment, e.g. if an email has 1 attachment with 2 matches and another with 1 match, 2 matches will be added to the first total.
Content inspection patterns Advanced asset list A list of patterns for matching email contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match emails containing US social security numbers. To match all emails use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched.
Content inspection keywords Advanced asset list The keywords matched to email contents during content inspection.
Microsoft sensitivity labels Asset list The Microsoft sensitivity labels matched to files during content inspection. Note: The FortiDLP Email Plugin (Legacy) requires Windows. The FortiDLP Email Add-in for Windows and macOS requires Agent 10.4.0+ for header inspection and Agent 10.1.3+ for attachment inspection.
Content inspection match type String The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document.
Content inspection match frequency Integer The minimum number of times each pattern must be present in an email.
Attachment parameters
Prohibit email attachments Boolean The toggle to enable/disable prohibiting all email attachments. If this is enabled and no other parameters are set, a detection will be generated when an email containing an attachment is sent. If this is enabled and other parameters are set, a detection will be generated when an email containing an attachment which matches the configured parameters is sent.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Maximum permitted attachment size (MB) Float The maximum size of allowed attachments in megabytes. If this field is set to 0, no limit will be applied.
Email attachment file types Advanced asset list A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) authorized or unauthorized to be attached to emails. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured when using Agent 9.1.0+, the "Email attachment file extensions" parameter will be ignored. Requires Agent 9.1.0+.
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .doc, .docx, .xls, .xlsx) authorized or unauthorized to be attached to emails. The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated and will only be used if the "Email attachment file types" parameter has not been configured. The "Email attachment file types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf".
Attachment origin parameters
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by remote email domain Disabled
Cluster by recipient domain Disabled
Cluster by content Disabled
Cluster by policy Disabled

Supported actions: Block email, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email sent with encrypted file attachment

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 10.1.1 or later

Detects when, in Classic Outlook or New Outlook, a user sends an unauthorized email containing an encrypted or password-protected file.

Note

All configured fields must be met to generate a detection or block an email.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to receive email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to receive email. Case-insensitive matching is used.
Maximum number of recipients Float The maximum size of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .pdf) to monitor for encrypted file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Attachment origin parameters
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by recipient domain Disabled
Cluster by policy Disabled
Cluster by sender email address Disabled
Cluster by remote email domain Disabled

Supported actions: Block email, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email sent with ZIP file attachment

Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed

Requirements: Windows or macOS, Agent version 9.1.0 or later

Detects when, in Classic Outlook or New Outlook, a user sends an unauthorized email containing a ZIP file.

Note

All configured fields must be met to generate a detection or block an email.

Parameter Type Description
Sender/recipient parameters
Email domains Advanced asset list A list of email domain names (e.g. example.com) authorized or unauthorized to receive email. Case-insensitive matching is used. Subdomains will match.
Email addresses Advanced asset list A list of email addresses (e.g. abc@example.com) authorized or unauthorized to receive email. Case-insensitive matching is used.
Maximum permitted recipients Float The maximum number of allowed email recipients. If this field is set to 0, no limit will be applied. Case-insensitive counting is used.
Content inspection parameters
Content file names Advanced asset list A list of file path expressions that, when matched to a zipped file, make the ZIP file it is contained within authorized or unauthorized to be sent via email. The match can use glob-style pattern matching rules (e.g. **\*.pdf would match all PDF files). An empty list will match all zipped files. Case-insensitive matching is used.
Attachment parameters
Email attachment file extensions Advanced asset list A list of file extensions (e.g. .zip) to monitor for unauthorized ZIP file content. The dot can be omitted and the extension name is case-insensitive.
File names Advanced asset list A list of regular expressions matching email attachment names authorized or unauthorized to be attached to emails. Case-insensitive matching is used.
Attachment origin parameters
SaaS apps SaaS app filter A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+.
URL patterns Advanced asset list A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+.
User account domains (Preview) Advanced asset list A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+.
Monitor unknown user accounts (Preview) Boolean The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable.
Tactic Technique Sub-technique
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/
T1048 (Exfiltration Over Alternative Protocol)
attack.mitre.org/techniques/T1048/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by sender email address Disabled
Cluster by remote email domain Disabled
Cluster by recipient domain Disabled
Cluster by policy Disabled

Supported actions: Block outbound email, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy

Unauthorized email tool used

Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed

Detects when a user runs an unauthorized email application.

Parameter Type Description
Process parameters
Authorized applications String list A list of email applications users are authorized to use. This template can detect use of Thunderbird, Windows Mail App, Windows Live Mail, Outlook (including new Outlook for Windows), eM Client, Pidgen, and Apple Mail.
Tactic Technique Sub-technique
TA0042 (Resource Development)
attack.mitre.org/tactics/TA0042/
T1588 (Obtain Capabilities)
attack.mitre.org/techniques/T1588/

Note: MITRE ATT&CK indicators require Agent 11.4.1+.

Incident clustering rule Default
Cluster by binary name Disabled
Cluster by policy Disabled

Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process