Content disarm and reconstruction for antivirus
Content disarm and reconstruction (CDR) allows the FortiGate to sanitize Microsoft documents and PDF (disarm) by removing active content such as hyperlinks, embedded media, javascript, macros, and so on from the Office document files without affecting the integrity of its textual content (reconstruction).
This feature allows network admins to protect their users from malicious Office document files.
Files processed by CDR can have the original copy quarantined on the FortiGate, allowing admins to observe them. These original copies can also be obtained in the event of a false positive.
Support and limitations
- CDR can only be performed on Microsoft Office document and PDF files.
- Local disk CDR quarantine is only possible on FortiGate models that contain a hard disk.
- CDR is only supported on HTTP, SMTP, POP3, IMAP.
- SMTP splice and client-comfort mode is not supported.
- CDR does not work on flow-based inspection modes.
- CDR can only work on files in .ZIP type archives.
Network topology example
Configuring the feature
In order to configure antivirus to work with CDR, you must enable CDR on your antivirus profile, set the quarantine location, and then fine-tune the CDR detection parameters.
To enable CDR on your antivirus profile:
- Go to Security Profiles > AntiVirus.
- Edit an antivirus profile, or create a new one.
- Enable the toggle for Content Disarm and Reconstruction under APT Protection Options.
To set a quarantine location:
- Go to Security Profiles > AntiVirus.
- Edit an antivirus profile, or create a new one.
- Select a quarantine location from the available options: Discard, File Quarantine, or FortiSandbox.
Discard The default setting, which discards the original document file. File Quarantine Saves the original document file to disk (if possible) or a connected FortiAnalyzer based on the FortiGate's log settings, visible through Config Global > Config Log FortiAnalyzer Setting. FortiSandbox Saves the original document file to a connected FortiSandbox. - Click Apply.
To fine-tune CDR detection parameters in the CLI:
- Select which active content to detect/process:
By default, all active office and PDF content types are enabled. To fine-tune CDR to ignore certain content, you must disable that particular content parameter. The example below configures the CDR to ignore Microsoft Office macros.
config antivirus profile edit av config content-disarm set ? original-file-destination Destination to send original file if active content is removed. office-macro Enable/disable stripping of macros in Microsoft Office documents. office-hylink Enable/disable stripping of hyperlinks in Microsoft Office documents. office-linked Enable/disable stripping of linked objects in Microsoft Office documents. office-embed Enable/disable stripping of embedded objects in Microsoft Office documents. office-dde Enable/disable stripping of Dynamic Data Exchange events in Microsoft Office documents. office-action Enable/disable stripping of PowerPoint action events in Microsoft Office documents. pdf-javacode Enable/disable stripping of JavaScript code in PDF documents. pdf-embedfile Enable/disable stripping of embedded files in PDF documents. pdf-hyperlink Enable/disable stripping of hyperlinks from PDF documents. pdf-act-gotor Enable/disable stripping of PDF document actions that access other PDF documents. pdf-act-launch Enable/disable stripping of PDF document actions that launch other applications. pdf-act-sound Enable/disable stripping of PDF document actions that play a sound. pdf-act-movie Enable/disable stripping of PDF document actions that play a movie. pdf-act-java Enable/disable stripping of PDF document actions that execute JavaScript code. pdf-act-form Enable/disable stripping of PDF document actions that submit data to other targets. cover-page Enable/disable inserting a cover page into the disarmed document. detect-only Enable/disable only detect disarmable files, do not alter content. set office-macro disable end next end
- Detect but do not modify active content:
By default, CDR will disarm any detected documents containing active content. To prevent CDR from disarming documents, you can set it to operate in detect-only mode. To do this, the option detect-only must be enabled.
config antivirus profile edit av config content-disarm set detect-only enable end next end
- Enable/disable the CDR cover page:
By default, a cover page will be attached to the file's content when the file has been processed by CDR. To disable the cover page, the
cover-page
parameter needs to be disabled.config antivirus profile edit av config content-disarm set cover-page disable end next end