Fortinet white logo
Fortinet white logo

URL patterns: origin (Preview)

URL patterns: origin (Preview)

Note

To enable this Preview feature, contact Fortinet Support.

The origin-tracking URL patterns parameter, available in the File origin parameters or Attachment origin parameters template sections, enables you to set URL conditions for triggering detections considering a file's web origin.

The URL patterns parameter lets you define a list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. For comprehensive information about how to specify patterns, see the website URL patterns parameter section.

Note

The origin-tracking URL patterns parameter cannot be used to define an allowlist or a denylist like the website URL patterns parameter.

Some policy templates can be configured to generate detections considering a file's web origin and destination.

Example

For example, using the Sensitive file uploaded template, you could create a policy to prevent sensitive files that are stored on a corporate Google Drive from being uploaded to any website as follows.

In the Website parameters section:

  • Leave the URL patterns parameter empty. This will raise a detection upon attempted uploads to any website. Additionally, if upload blocking is enabled, all uploads will be blocked.

In the File origin parameters section:

  • For the URL patterns parameter, either type a custom value or select an asset that matches your corporate Google Drive, such as drive.google.com/drive.

URL patterns: origin (Preview)

URL patterns: origin (Preview)

Note

To enable this Preview feature, contact Fortinet Support.

The origin-tracking URL patterns parameter, available in the File origin parameters or Attachment origin parameters template sections, enables you to set URL conditions for triggering detections considering a file's web origin.

The URL patterns parameter lets you define a list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. For comprehensive information about how to specify patterns, see the website URL patterns parameter section.

Note

The origin-tracking URL patterns parameter cannot be used to define an allowlist or a denylist like the website URL patterns parameter.

Some policy templates can be configured to generate detections considering a file's web origin and destination.

Example

For example, using the Sensitive file uploaded template, you could create a policy to prevent sensitive files that are stored on a corporate Google Drive from being uploaded to any website as follows.

In the Website parameters section:

  • Leave the URL patterns parameter empty. This will raise a detection upon attempted uploads to any website. Additionally, if upload blocking is enabled, all uploads will be blocked.

In the File origin parameters section:

  • For the URL patterns parameter, either type a custom value or select an asset that matches your corporate Google Drive, such as drive.google.com/drive.