Browser templates
Templates for building policies based on user browser activity.
|
|
To use this functionality, you must enable web monitoring for Agents. For details, refer to the FortiDLP Agent Deployment Guide and FortiDLP Administration Guide. |
Browser extension changed
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.0.1 or later
Detects when a user installs or modifies a browser extension.
| Parameter | Type | Description |
|---|---|---|
| Extension parameters | ||
| Extension names | Advanced asset list | A list of browser extension names to include or exclude from monitoring. Case-insensitive matching is used. |
| Extension IDs | Advanced asset list | A list of browser extension IDs to include or exclude from monitoring. Case-insensitive and partial matching is used. |
| Monitor parameters | ||
| Monitor extension installation | Boolean | The toggle to enable/disable the detection of monitored browser extensions being installed. |
| Monitor extension enabling | Boolean | The toggle to enable/disable the detection of monitored browser extensions being enabled. |
| Monitor extension uninstallation | Boolean | The toggle to enable/disable the detection of monitored browser extensions being uninstalled. |
| Monitor extension disabling | Boolean | The toggle to enable/disable the detection of monitored browser extensions being disabled. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0042 (Resource Development)
attack.mitre.org/tactics/TA0042/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by browser extension | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Browser run in private browsing mode
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.4.3 or later
Detects when a user runs a browser in private browsing mode.
|
|
Subsequent detections and actions for the same process will not be generated until at least 30 minutes after the first detection/action. |
|
|
Private browsing sessions initiated from the browser menu will not be reported for macOS when Firefox is used or for Linux when Chrome or Firefox is used unless the FortiDLP Browser Extension has been installed and configured to monitor incognito activity. |
| Parameter | Type | Description |
|---|---|---|
| Process parameters | ||
| Private browsing called paths | Advanced asset list | A list of regular expressions matching command line arguments or called paths that enable private browsing (e.g. -incognito). The match is case-sensitive. |
| Reporting parameters | ||
| Detect private browsing for unmonitored browsers only | Boolean | The toggle to enable the detection of private browsing activity only for browsers in which web monitoring is disabled. Leaving this toggle off detects private browsing activity for browsers in which web monitoring is enabled or disabled. Requires Google Chrome or Microsoft Edge. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Encrypted file downloaded
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 10.1.1 or later
Detects when a user attempts to download an encrypted or password-protected file via a browser, and optionally blocks the download.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which downloads are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which downloads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| File parameters | ||
| File extensions | Advanced asset list | A list of file extensions to filter on (e.g. .doc, .docx, .pdf). The dot can be omitted, and case-insensitive matching is used. |
| File names | Advanced asset list | A list of regular expressions matching file names that users are authorized or unauthorized to download. Case-insensitive matching is used. |
| Maximum file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/ |
|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by file extension | Disabled |
| Cluster by filename | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser download, Display message, Lock, Isolate, Take screenshot, Reboot
Encrypted file uploaded
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 10.1.1 or later
Detects when a user attempts to upload an encrypted or password-protected file via a browser, and optionally blocks the upload.
|
|
As part of this feature, an in-browser banner is displayed to users to notify them when content inspection is performed. This can be disabled using Agent configuration groups. |
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which uploads are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which uploads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when an encrypted file is uploaded to a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| File parameters | ||
| File extensions | Advanced asset list | A list of file extensions to filter on (e.g. .docx). The dot can be omitted, and case-insensitive matching is used. |
| File paths | Advanced asset list | A list of file path expressions to match against. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would match all files in the Shared folder under users' home directories and **\*.pdf would match all PDF files). Case-insensitive matching is used. |
| Maximum file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| File origin parameters (Windows and macOS only) | ||
| SaaS apps | SaaS app filter | A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1027 (Obfuscated Files or Information)
attack.mitre.org/techniques/T1027/ |
|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by file extension | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser upload, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy
File downloaded from IP address
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.8.0 or later
Detects when a user downloads a file directly from an IP address instead of through a host with a DNS entry.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| IP addresses | Advanced asset list | A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) from which file downloads are authorized or unauthorized if present in the URL. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser download, Display message, Lock, Isolate, Take screenshot, Reboot
FortiDLP Browser Extension tampered with
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 8.1.2 or later
Detects when a user tampers with the FortiDLP Browser Extension.
|
|
Subsequent detections and actions for the same browser process will not be generated until at least one day after the first detection/action. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
T1562 (Impair Defenses)
attack.mitre.org/techniques/T1562/ |
T1562.001 (Disable or Modify Tools)
attack.mitre.org/techniques/T1562/001/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by binary name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot, Kill process
Password entered on website
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.4.0 or later
Detects when a user enters a password on a website.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which password entry is authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which password entry is authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a user enters a password on a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| URL regex patterns | Advanced asset list | A list of URLs for which password entry is authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| Machine learning parameters | ||
| Only report new websites | Boolean | The toggle to enable/disable generating a detection if a password is entered on the same unauthorized website multiple times. If enabled, a detection will only be generated the first time a password is entered on a particular unauthorized website. |
| Training period (days) | Integer | The time period (in days) during which the list of websites on which passwords are typically entered on a node are learned. No detections will be generated during this period if "Only report new websites" is enabled. The FortiDLP Agent will continue to learn password activity after this period. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Password entered on website opened from Outlook
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows, Agent version 7.6.2 or later
Detects when a user opens a link from Microsoft Outlook and then enters a password on an unauthorized website.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps on which users are authorized or unauthorized to enter passwords. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which users are authorized or unauthorized to enter passwords. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a user enters a password on a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| URL regex patterns | Advanced asset list | A list of URLs on which users are authorized or unauthorized to enter passwords. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0043 (Reconnaissance)
attack.mitre.org/tactics/TA0043/ |
T1598 (Phishing for Information)
attack.mitre.org/techniques/T1598/ |
T1598.003 (Spearphishing Link)
attack.mitre.org/techniques/T1598/003/ |
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Prohibited content posted on social media website
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 8.4.0 or later
Detects when a user posts disallowed content on a prohibited social media website.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which POST requests are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which POST requests are either authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a user posts on a social media website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| URL regex patterns | Advanced asset list | A list of URL regex patterns matching websites to which POST requests are either authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| Form field keywords | Advanced asset list | A list of keywords matching form fields in the POST request body to either ignore or monitor when performing content inspection. Case-insensitive matching is used, and the keyword will match if it appears anywhere in the form field name. For example, entering "include" would match the "include_ext_alt_text" form field. Note: Keyword matching on raw fields will only be performed on the first 16KiB. |
| Content inspection parameters | ||
| Content inspection patterns | Advanced asset list | A list of patterns for matching form contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match posts containing US social security numbers. To match all posts use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched. Note: Content inspection on raw fields will only be performed on the first 16KiB. Requires Agent 12.1.0+ on Linux. |
| Content inspection keywords | Advanced asset list | The keywords matched form contents during content inspection. Note: Content inspection on raw fields will only be performed on the first 16KiB. Requires Agent 12.1.0+ on Linux. |
| Content inspection match type | String | The match type applied to data identifiers (content inspection patterns and keywords/keyphrases). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. Requires Agent 12.1.0+ on Linux. |
| Content inspection match frequency | Integer | The minimum number of times each pattern must be present in a post. Requires Agent 12.1.0+ on Linux. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Prohibited web request made using browser
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 6.0.2 or later
Detects when a user makes a prohibited web request using a browser.
| Parameter | Type | Description |
|---|---|---|
| Request parameters | ||
| Method | String list | The HTTP method for the request, such as POST, GET, PUT, or DELETE. This can be left empty to match all methods. |
| Scheme | Advanced asset list | The URI scheme for the request (e.g. HTTPS or HTTP). This can be left empty to match all URI schemes. |
| Domain | Advanced asset list | The domain for the request (e.g. example.com). Subdomains will match. This can be left empty to match all domains. |
| IP addresses | Advanced asset list | The IPv4 or IPv6 address in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) for the request if a domain name is not used. |
| Path | Advanced asset list | The path of the URL following the top-level domain. Glob pattern matching is supported. For example, to match all paths under https://example.com/customers/, use /customers/**. Note that some service providers have dynamic URLs that change per request and therefore cannot be used. The path to a static URL is required. |
| Query parameters | Advanced asset list | The query parameters appended to the URL to match on a web request. For example, to match the URL https://example.com/path?customer=name%20with%20space, you would enter customer=name%20with20space. If multiple parameters are specified, the ordering does not matter. This can be left empty to match all query parameters. |
| Query patterns | Advanced asset list | The pattern used to match the decoded URL query of a request. Full regular expression (regex) grammar is supported. For example, to match the URL https://example.com/path?customer=056%20name, you would enter customer=[0-9]+ [a-z]+. This can be left empty to match all query parameters. |
| Request body pattern | Advanced asset list | A list of patterns for matching the contents of the web request body. Full regular expression (regex) grammar is supported. This can be left empty to match all request bodies. Note: Pattern matching on raw fields will only be performed on the first 16KiB. |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a request is made on a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Sensitive content submitted on unauthorized website
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Windows or macOS, Agent version 8.4.0 or later
Detects when a user submits sensitive content in a web request using a browser. The "SaaS apps" and/or "URL patterns" parameter(s) must be configured to generate a detection.
| Parameter | Type | Description |
|---|---|---|
| Request parameters | ||
| Method | String list | The HTTP method for the request, such as POST, GET, or PUT. This can be left empty to match all methods. |
| SaaS apps | SaaS app filter | A list of SaaS apps for which web requests are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which web requests are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a request is made on a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| Content inspection parameters | ||
| Content inspection patterns | Advanced asset list | A list of patterns for matching the web request body contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match requests containing US social security numbers. To match all requests use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched. Note: Content inspection on raw fields will only be performed on the first 16KiB. |
| Content inspection keywords | Advanced asset list | The keywords matched to web request body contents during content inspection. Note: Content inspection on raw fields will only be performed on the first 16KiB. |
| Content inspection match type | String | The match type applied to data identifiers (content inspection patterns and keywords/keyphrases). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. |
| Content inspection match frequency | Integer | The minimum number of times each pattern must be present in a request. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Sensitive file downloaded
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 8.4.0 or later
Detects when a user attempts to download a sensitive file via a browser and optionally blocks the download.
|
|
From Agent 10.0.3+, the "File extensions" parameter is deprecated and will only be used if the "File types" parameter (preferred) is not configured. |
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which downloads are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which downloads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| URL regex patterns | Advanced asset list | A list of URLs from which downloads are authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| File parameters | ||
| File names | Advanced asset list | A list of regular expressions matching file names that users are authorized or unauthorized to download. Case-insensitive matching is used. |
| Maximum permitted file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| File types | Advanced asset list | A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 10.0.3+. |
| File extensions | Advanced asset list | A list of file extensions to filter on (e.g. .doc, .docx, .pdf). The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated for Agent 10.0.3+ and will only be used if the "File types" parameter has not been configured or the Agent version does not support MIME type identification. The "File types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf". |
| Machine learning parameters | ||
| Prohibit downloads from new websites | Boolean | The toggle to enable/disable generating a detection when a file is downloaded from a new website. If enabled, a detection will be generated the first time a file is downloaded from a particular website, even if the "Prohibit listed URLs" download rule is selected and the website is not present in the URL list. If the "Allow listed URLs" download rule is selected and the URL is present in the URL list, no detection will be generated, even if the website has not been downloaded from before. Requires a FortiDLP Enterprise or FortiDLP Managed license. |
| Training period (hours) | Integer | The uptime period (in hours) during which the list of websites to which files are typically uploaded is learned. No detections will be generated due to downloads from new websites during this period. The FortiDLP Agent will continue to learn download activity after this period. Requires a FortiDLP Enterprise or FortiDLP Managed license. |
| Content inspection parameters | ||
| Content inspection patterns | Advanced asset list | A list of patterns for matching file contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match files containing US social security numbers. To match all files use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched. Requires Agent 12.1.0+ on Linux. |
| Content inspection keywords | Advanced asset list | The keywords matched to file contents during content inspection. Requires Agent 12.1.0+ on Linux. |
| Microsoft sensitivity labels | Asset list | The Microsoft sensitivity labels matched to files during content inspection. Requires Agent 12.1.0+ on Linux. |
| Content inspection match type | String | The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. Requires Agent 12.1.0+ on Linux. |
| Content inspection match frequency | Integer | The minimum number of times each pattern must be present in a document. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1213 (Data from Information Repositories)
attack.mitre.org/techniques/T1213/ |
|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1530 (Data from Cloud Storage)
attack.mitre.org/techniques/T1530/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser download, Display message, Lock, Isolate, Take screenshot, Reboot
Sensitive file downloaded from personal file share website
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 8.4.0 or later
Detects when a user attempts to download a sensitive file from a file share website using a personal account, and optionally blocks the download.
|
|
From Agent 10.0.3+, the "File extensions" parameter is deprecated and will only be used if the "File types" parameter (preferred) is not configured. |
| Parameter | Type | Description |
|---|---|---|
| File share parameters | ||
| Monitored file share websites | String list | A list of file share websites to monitor. |
| User account parameters | ||
| Authorized corporate account domains | Advanced asset list | A list of corporate account domains for which downloads are allowed when using file share websites. For example, entering "company.com" would allow a user to download files from file shares using their name@company.com account, but not their name@gmail.com account. Case-insensitive matching is used. |
| Monitor unknown user accounts | Boolean | The toggle to monitor downloads when the account login details are unavailable. |
| File parameters | ||
| File names | Advanced asset list | A list of regular expressions matching file names that users are authorized or unauthorized to download. Case-insensitive matching is used. |
| Maximum permitted file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| File types | Advanced asset list | A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 10.0.3+. |
| File extensions | Advanced asset list | A list of file extensions that users are authorized or unauthorized to download (e.g. .doc, .docx, .pdf). The doc can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated for Agent 10.0.3+ and will only be used if the "File types" parameter has not been configured or the Agent version does not support MIME type identification. The "File types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf". |
| Content inspection parameters | ||
| Content inspection patterns | Advanced asset list | A list of patterns for matching file contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match files containing US social security numbers. To match all files use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched. Requires Agent 12.1.0+ on Linux. |
| Content inspection keywords | Advanced asset list | The keywords matched to file contents during content inspection. Requires Agent 12.1.0+ on Linux. |
| Microsoft sensitivity labels | Asset list | The Microsoft sensitivity labels matched to files during content inspection. Requires Agent 12.1.0+ on Linux. |
| Content inspection match type | String | The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. Requires Agent 12.1.0+ on Linux. |
| Content inspection match frequency | Integer | The minimum number of times each pattern must be present in a document. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1213 (Data from Information Repositories)
attack.mitre.org/techniques/T1213/ |
|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1530 (Data from Cloud Storage)
attack.mitre.org/techniques/T1530/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser download, Display message, Lock, Isolate, Take screenshot, Reboot
Sensitive file uploaded
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 8.4.0 or later
Detects when a user attempts to upload a sensitive file via a browser and optionally blocks the upload.
|
|
As part of this feature, an in-browser banner is displayed to users to notify them when content inspection is performed. This can be disabled using Agent configuration groups. |
|
|
Upload blocking based on content inspection requires a Chromium-based browser for Agent versions < 8.6.0. |
|
|
From Agent 9.1.0+, the "File extensions" parameter is deprecated and will only be used if the "File types" parameter (preferred) is not configured. |
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which uploads are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which uploads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a file is uploaded to a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| URL regex patterns | Advanced asset list | A list of URLs to which uploads are authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| File parameters | ||
| File paths | Advanced asset list | A list of file path expressions to match against. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would match all files in the Shared folder under users' home directories and **\*.pdf would match all PDF files). Case-insensitive matching is used. |
| Maximum permitted file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| File types | Advanced asset list | A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 9.1.0+. |
| File extensions | Advanced asset list | A list of file extensions to filter on (e.g. .doc, .docx, .pdf). The dot can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated for Agent 9.1.0+ and will only be used if the "File types" parameter has not been configured or the Agent version does not support MIME type identification. The "File types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf". |
| Machine learning parameters | ||
| Prohibit uploads to new websites | Boolean | The toggle to enable/disable generating a detection when a file is uploaded to a new website. If enabled, a detection will be generated the first time a file is uploaded to a particular website, even if the "Prohibit listed domains" upload rule is selected and the domain is not present in the domain list. If the "Allow listed domains" upload rule is selected and the domain is present in the domain list, no detection will be generated, even if the website has not been uploaded to before. Requires a FortiDLP Enterprise or FortiDLP Managed license. |
| Training period (hours) | Integer | The uptime period (in hours) during which the list of websites to which files are typically uploaded is learned. No detections will be generated due to uploads to new websites during this period. The FortiDLP Agent will continue to learn upload activity after this period. Requires a FortiDLP Enterprise or FortiDLP Managed license. |
| Content inspection parameters | ||
| Content inspection patterns | Advanced asset list | A list of patterns for matching file contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match files containing US social security numbers. To match all files use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched. Requires Agent 12.1.0+ on Linux. |
| Content inspection keywords | Advanced asset list | The keywords matched to file contents during content inspection. Requires Agent 12.1.0+ on Linux. |
| Microsoft sensitivity labels | Asset list | The Microsoft sensitivity labels matched to files during content inspection. Requires Agent 12.1.0+ on Linux. |
| Content inspection match type | String | The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. Requires Agent 12.1.0+ on Linux. |
| Content inspection match frequency | Integer | The minimum number of times each pattern must be present in a document. |
| File origin parameters (Windows and macOS only) | ||
| SaaS apps | SaaS app filter | A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser upload, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy
Sensitive file uploaded to personal file share website
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 8.4.0 or later
Detects when a user attempts to upload a sensitive file to a file share website using a personal account, and optionally blocks the upload.
|
|
As part of this feature, an in-browser banner is displayed to notify users when uploaded files are verified against policies. This can be disabled using Agent configuration groups. |
|
|
Upload blocking based on content inspection requires a Chromium-based browser for Agent versions < 8.6.0. |
|
|
From Agent 9.1.0+, the "File extensions" parameter is deprecated and will only be used if the "File types" parameter (preferred) is not configured. |
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| Monitored file share websites | String list | A list of file share websites to monitor. |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a file is uploaded to a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| User account parameters | ||
| Authorized corporate account domains | Advanced asset list | A list of corporate account domains for which uploads are allowed when using file share websites. For example, entering "company.com" would allow a user to upload files to file shares using their name@company.com account, but not their name@gmail.com account. Case-insensitive matching is used. |
| Monitor unknown user accounts | Boolean | The toggle to monitor uploads when the account login details are unavailable. |
| File parameters | ||
| File paths | Advanced asset list | A list of file path expressions to match against. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would match all files in the Shared folder under users' home directories and **\*.pdf would match all PDF files). Case-insensitive matching is used. |
| Maximum permitted file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| File types | Advanced asset list | A list of MIME type patterns (e.g. audio/mpeg, image/*, application/pdf) to filter on. The * wildcard character can be used to match all MIME types beginning with the specified prefix (e.g. image/* would match files of type image/png, and application/dns* would match files of type application/dns-message). If this parameter is configured and the Agent version supports MIME type identification, the "File extensions" parameter will be ignored. Requires Agent 9.1.0+. |
| File extensions | Advanced asset list | A list of file extensions that users are authorized or unauthorized to upload (e.g. .doc, .docx, .pdf). The doc can be omitted, and case-insensitive matching is used. Note: This parameter is deprecated for Agent 9.1.0+ and will only be used if the "File types" parameter has not been configured or the Agent version does not support MIME type identification. The "File types" parameter should be used instead to identify files of a particular type. For example, PDF files should be matched using the MIME type "application/pdf" (or alternatively, the glob pattern "**\*.pdf") instead of the file extension ".pdf". |
| Content inspection parameters | ||
| Content inspection patterns | Advanced asset list | A list of patterns for matching file contents during content inspection. Full regular expression (regex) grammar is supported. For example, entering "[0-9]{3}-[0-9]{2}-[0-9]{4}" could match files containing US social security numbers. To match all files use the ".*" pattern (without the double quotes). Select "narrow breadth" if you have selected an asset and only want detections to be raised when at least one of the asset's keywords/keyphrases is matched along with the asset's pattern. Select "wide breadth" if you have selected an asset and want detections to be raised when just the asset's pattern is matched. Requires Agent 12.1.0+ on Linux. |
| Content inspection keywords | Advanced asset list | The keywords matched to file contents during content inspection. Requires Agent 12.1.0+ on Linux. |
| Microsoft sensitivity labels | Asset list | The Microsoft sensitivity labels matched to files during content inspection. Requires Agent 12.1.0+ on Linux. |
| Content inspection match type | String | The match type applied to data identifiers (content inspection patterns, keywords/keyphrases, and Microsoft sensitivity labels). "Match all" generates a detection when all chosen data identifiers are present in the document, "Match none" generates a detection when none of the chosen data identifiers are present in the document, "Match any" generates a detection if any of the chosen data identifiers are present in the document, and "Match at least [N]" generates a detection when at least 2, 3, 4, or 5 of the chosen data identifiers are present in the document. Requires Agent 12.1.0+ on Linux. |
| Content inspection match frequency | Integer | The minimum number of times each pattern must be present in a document. |
| File origin parameters (Windows and macOS only) | ||
| SaaS apps | SaaS app filter | A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser upload, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy
Sensitive ZIP file downloaded
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.8.0 or later
Detects when a user downloads a ZIP file from an unauthorized URL, and that file contains unauthorized content.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which downloads are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which downloads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| URL regex patterns | Advanced asset list | A list of URLs from which downloads are authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| File parameters | ||
| File extensions | Advanced asset list | A list of file extensions to filter on (e.g. .zip). The dot can be omitted, and case-insensitive matching is used. |
| File names | Advanced asset list | A list of regular expressions matching file names that users are authorized or unauthorized to download. Case-insensitive matching is used. |
| Maximum permitted file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| Content inspection parameters | ||
| Content file names | Advanced asset list | A list of file path expressions that, when matched to a zipped file, make the ZIP file it is contained within unauthorized for download. The match can use glob-style pattern matching rules (e.g. **\*.pdf would match all PDF files). An empty list will match all zipped files. Case-insensitive matching is used. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1213 (Data from Information Repositories)
attack.mitre.org/techniques/T1213/ |
|
|
TA0009 (Collection)
attack.mitre.org/tactics/TA0009/ |
T1530 (Data from Cloud Storage)
attack.mitre.org/techniques/T1530/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser download, Display message, Lock, Isolate, Take screenshot, Reboot
Sensitive ZIP file uploaded
Available under any of the following licenses: FortiDLP Standard, FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.8.0 or later
Detects when a user attempts to upload a ZIP file via a browser, and optionally blocks the upload.
|
|
As part of this feature, an in-browser banner is displayed to users to notify them when content inspection is performed. This can be disabled using Agent configuration groups. |
|
|
Upload blocking based on content inspection requires a Chromium-based browser for Agent versions < 8.6.0. |
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps for which uploads are authorized or unauthorized. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites on which uploads are authorized or unauthorized. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| Tab titles | Advanced asset list | A list of patterns matched against the browser tab's title. Full regular expression (regex) grammar is supported and case-insensitive matching is used. For example, entering "con(fidential|tent)" would generate a detection when a file is uploaded to a website with a browser tab title containing "confidential" or "content". Requires Agent 10.2.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains that are authorized or unauthorized to use for website login. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor web activity when the account login details are unavailable. |
| URL regex patterns | Advanced asset list | A list of URLs to which uploads are authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| File parameters | ||
| File extensions | Advanced asset list | A list of file extensions to filter on (e.g. .zip). The dot can be omitted, and case-insensitive matching is used. |
| File paths | Advanced asset list | A list of file path expressions to match against. The match can use glob-style pattern matching rules (e.g. C:\Users\**\Shared\** would match all files in the Shared folder under users' home directories and **\*.pdf would match all PDF files). Case-insensitive matching is used. |
| Maximum permitted file size (MB) | Float | The maximum size of allowed files in megabytes. Files smaller than this will not generate detections. If this field is set to 0, no limit will be applied. |
| Content inspection parameters | ||
| Content file names | Advanced asset list | A list of file path expressions that, when matched to a zipped file, make the ZIP file it is contained within unauthorized for upload. The match can use glob-style pattern matching rules (e.g. **\*.pdf would match all PDF files). An empty list will match all zipped files. Case-insensitive matching is used. |
| File origin parameters (Windows and macOS only) | ||
| SaaS apps | SaaS app filter | A list of protected SaaS apps, from which downloaded files are monitored to prevent exfiltration. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for protected websites, from which downloaded files are monitored to prevent exfiltration. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/download* will match any subdomain of example.com with any path, as long as the final path segment begins with "download". Requires Agent 11.3.0+. |
| User account domains (Preview) | Advanced asset list | A list of account domains to monitor for users downloading files from protected websites. For example, entering "company.com" would monitor user accounts in the format name@company.com. Case-insensitive matching is used. Subdomains will match. Requires Agent 11.3.0+. |
| Monitor unknown user accounts (Preview) | Boolean | The toggle to monitor use of files downloaded from protected websites when the account login details are unavailable. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by filename | Disabled |
| Cluster by policy | Disabled |
Supported actions: Block browser upload, Display message, Lock, Isolate, Take screenshot, Reboot, Make shadow copy
Specified term used in web search
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 5.2.3 or later
Detects when a user searches the web using a specified term. Google, Yahoo, Bing, Ask, and DuckDuckGo search engines are supported.
| Parameter | Type | Description |
|---|---|---|
| Search parameters | ||
| Search terms | Advanced asset list | A list of terms to filter by. Case-insensitive matching is used. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0043 (Reconnaissance)
attack.mitre.org/tactics/TA0043/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by content | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unapproved browser extension version installed
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.0.1 or later
Detects when a user installs an unapproved browser extension version.
| Parameter | Type | Description |
|---|---|---|
| Extension parameters | ||
| Approved extension versions | Asset | A string mapping asset that maps an extension name to approved versions. For example, {"Sheets": "1.0.0", "Docs": "2.0.0"} would approve version 1.0.0 of the Google Sheets extension and version 2.0.0 of the Google Docs extension. |
| Monitor parameters | ||
| Prohibit older extensions | Boolean | The toggle to enable/disable generating a detection for extensions older than the approved version. |
| Prohibit newer extensions | Boolean | The toggle to enable/disable generating a detection for extensions newer than the approved version. |
| Reporting interval (days) | Float | The frequency in which a detection is generated for an unapproved extension. For example, setting this to 1 enables detections to be generated once a day per extension, setting this to 2 enables detections to be generated once every two days per extension, and so on. When set to 0, only one detection is generated for each extension, ever. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0042 (Resource Development)
attack.mitre.org/tactics/TA0042/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by browser extension version | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unauthorized browser used
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.6.2 or later
Detects when a user runs an unauthorized browser.
| Parameter | Type | Description |
|---|---|---|
| Browser parameters | ||
| Authorized browsers | String list | A list of browsers that are permitted for use. This can include Arc, Brave, Firefox, Google Chrome, Internet Explorer, Maxthon, Microsoft Edge, MSEdgeWebView, Opera Browser, Safari, Tor, Torch, Vivaldi, WebKit and Yandex. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0005 (Defense Evasion)
attack.mitre.org/tactics/TA0005/ |
|
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by binary name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unauthorized website accessed
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 5.2.3 or later
Detects when a user visits a disallowed website.
|
|
If the "URL patterns" and "URL regex patterns" parameters are left empty, the policy will not monitor any websites. |
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of authorized or unauthorized SaaS apps. Requires Agent 11.3.0+. |
| URL patterns | Advanced asset list | A list of URL patterns for websites authorized or unauthorized to be accessed. Supports a single asterisk (*) wildcard which matches 0 or more characters within a domain/path segment, and a double asterisk (**) wildcard which matches 0 or more whole domain/path segments. The URL schema, path, query, and fragment are optional and will match anything if omitted. For example, the pattern **.example.com/**/login* will match any subdomain of example.com with any path, as long as the final path segment begins with "login". |
| URL regex patterns | Advanced asset list | A list of URLs to which access is authorized or unauthorized. Full regular expression (regex) grammar is supported. Note: Characters such as "." and "?" should be escaped with a backslash ("\"), e.g. example\.com/search\?q=foo. Note: This parameter is deprecated for Agent 10.0.3+; please use the "URL patterns" parameter instead. |
| Monitor automatically loaded subframes | Boolean | The toggle to enable/disable monitoring of auto subframes. This is any content that is automatically loaded in a non-top-level frame. For example, if a page consists of several frames containing ads, those ad URLs are loaded in subframes. The user may not even realize the content in these pages is a separate frame, and so may not care about the URL. |
| Detection parameters | ||
| Rate limit (minutes) | Float | The minimum time (in minutes) between consecutive detections for the same domain. Set to 0 to disable. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Unusual browser file transfer
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 7.9.3 or later
Detects when a user's browser file upload or download behavior deviates from their normal behavior.
| Parameter | Type | Description |
|---|---|---|
| Event type parameters | ||
| Transfer types to profile | String list | A list of file transfer types to be profiled. |
| Event types to profile | String list | A list of file transfer event types to be profiled. |
| Machine learning parameters | ||
| Size sensitivity | Integer | Controls how sensitive the policy is to unusually large file transfers. Increasing this value will lower the threshold for what is considered unusual with regards to the size of a file transfer, resulting in more detections. |
| Maximum permitted transfer size (MB) | Integer | The maximum size of transfer (in MB). Unusual transfers larger than this threshold will generate a detection. |
| New event sensitivity | Integer | Controls how sensitive the policy is to new hosts and file types. Increasing this value will lower the threshold for what is considered unusual with regards to new hosts and file types, resulting in more detections. |
| Minimum training data | Integer | The minimum number of data points required before this policy is able to generate detections. One data point represents the aggregate transfer activity to/from a website over a single aggregate window. |
| Aggregation window (minutes) | Integer | The duration (in minutes) over which multiple transfer events are aggregated. |
| Training period (days) | Integer | The time period (in days) during which the FortiDLP Agent learns user's upload and download behavior. The FortiDLP Agent will continue to learn after this period. No detections will be generated during this period. |
| Website parameters | ||
| SaaS apps | SaaS app filter | A list of SaaS apps to/from which transfers are authorized or unauthorized. Requires Agent 11.3.0+. |
| Domains | Advanced asset list | A list of domains to/from which transfers are authorized or unauthorized. Case-insensitive matching is used. Subdomains will match. Authorized domains will not generate a detection but the associated data points will still be used to train the model used to detect unusual transfers. To exclude certain domains from the model entirely see "Domains (model data)". |
| SaaS apps (model data) | SaaS app filter | A list of SaaS apps to/from which transfers are included or excluded from training the model used to detect unusual transfers. Excluded SaaS apps will not generate a detection. |
| Domains (model data) | Advanced asset list | A list of domains to/from which transfers are included or excluded from training the model used to detect unusual transfers. Excluded domains will not generate a detection. Case-insensitive matching is used. Subdomains will match. |
| Tactic | Technique | Sub-technique |
|---|---|---|
|
TA0010 (Exfiltration)
attack.mitre.org/tactics/TA0010/ |
T1567 (Exfiltration Over Web Service)
attack.mitre.org/techniques/T1567/ |
|
Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot
Website visited through insecure protocol
Available under any of the following licenses: FortiDLP Enterprise, FortiDLP Managed
Requirements: Agent version 4.2.5 or later
Detects when a user visits an HTTP or FTP website.
| Parameter | Type | Description |
|---|---|---|
| Website parameters | ||
| Insecure protocols | String list | A list of prohibited protocols. |
| SaaS apps | SaaS app filter | A list of authorized or unauthorized SaaS apps. Requires Agent 11.3.0+. |
| Domains | Advanced asset list | A list of authorized or unauthorized domain names. |
| IP addresses | Advanced asset list | A list of IPv4 or IPv6 addresses in CIDR format (e.g. 192.0.2.1/16 or 2001:db8::68/128) authorized or unauthorized if a domain name is not used. |
| Monitor automatically loaded subframes | Boolean | The toggle to enable/disable monitoring of auto subframes. This is any content that is automatically loaded in a non-top-level frame. For example, if a page consists of several frames containing ads, those ad URLs are loaded in subframes. The user may not even realize the content in these pages is a separate frame, and so may not care about the URL. |
No default MITRE ATT&CK indicators. Note: MITRE ATT&CK indicators require Agent 11.4.1+.
| Incident clustering rule | Default |
|---|---|
| Cluster by domain name | Disabled |
| Cluster by policy | Disabled |
Supported actions: Display message, Lock, Isolate, Take screenshot, Reboot