Fortinet white logo
Fortinet white logo

CLI Reference

antispam quarantine-report

antispam quarantine-report

Use these commands to configure global settings for quarantine reports.

Quarantine reports notify email users of email added to their per-recipient quarantine, and allow them to release or delete email from the quarantine.

Alternatively, you can configure quarantine report settings specifically for each protected domain. For details, see config domain-setting.

By default, insecure clear text HTTP requests to access the quarantine are redirected to secure HTTPS. See alsohttps-redirect-status {enable | disable}.

Syntax

config antispam quarantine-report

set report-template-name {default | default-with-icons}

set schedule-days {monday tuesday wednesday thursday friday saturday sunday}

set schedule-hours {<hour_int>,...}

set web-release-hostname <fortimail_fqdn>

set web-release-unauth-expiry <hour_int>

end

Variable

Description

Default

report-template-name {default | default-with-icons}

Enter a report template.

default

schedule-days {monday tuesday wednesday thursday friday saturday sunday}

Enter a space-delimited list of days of the week on which the FortiMail unit will generate spam reports.

monday tuesday wednesday thursday friday saturday sunday

schedule-hours {<hour_int>,...}

Enter a comma-delimited list of numbers corresponding to the hours of the day on which the FortiMail unit will generate spam reports.

For example, to generate spam reports on 1:00 AM, 2:00 PM, and 11:00 PM, you would enter 1,14,23.

Valid numbers are from 0 to 23, based upon a 24-hour clock.

12

web-release-hostname <fortimail_fqdn>

Enter an alternate resolvable fully qualified domain name (FQDN) to use in web release hyperlinks that appear in spam reports.

web-release-unauth-expiry <hour_int>

Expiry time, in hours, of time limited webmail access to quarantine email without authorization.

Valid values are from 0 to 720. To disable expiry, enter 0.

0

Related topics

antispam bounce-verification

antispam deepheader-analysis

antispam greylist exempt

antispam settings

antispam trusted

antispam quarantine-report

antispam quarantine-report

Use these commands to configure global settings for quarantine reports.

Quarantine reports notify email users of email added to their per-recipient quarantine, and allow them to release or delete email from the quarantine.

Alternatively, you can configure quarantine report settings specifically for each protected domain. For details, see config domain-setting.

By default, insecure clear text HTTP requests to access the quarantine are redirected to secure HTTPS. See alsohttps-redirect-status {enable | disable}.

Syntax

config antispam quarantine-report

set report-template-name {default | default-with-icons}

set schedule-days {monday tuesday wednesday thursday friday saturday sunday}

set schedule-hours {<hour_int>,...}

set web-release-hostname <fortimail_fqdn>

set web-release-unauth-expiry <hour_int>

end

Variable

Description

Default

report-template-name {default | default-with-icons}

Enter a report template.

default

schedule-days {monday tuesday wednesday thursday friday saturday sunday}

Enter a space-delimited list of days of the week on which the FortiMail unit will generate spam reports.

monday tuesday wednesday thursday friday saturday sunday

schedule-hours {<hour_int>,...}

Enter a comma-delimited list of numbers corresponding to the hours of the day on which the FortiMail unit will generate spam reports.

For example, to generate spam reports on 1:00 AM, 2:00 PM, and 11:00 PM, you would enter 1,14,23.

Valid numbers are from 0 to 23, based upon a 24-hour clock.

12

web-release-hostname <fortimail_fqdn>

Enter an alternate resolvable fully qualified domain name (FQDN) to use in web release hyperlinks that appear in spam reports.

web-release-unauth-expiry <hour_int>

Expiry time, in hours, of time limited webmail access to quarantine email without authorization.

Valid values are from 0 to 720. To disable expiry, enter 0.

0

Related topics

antispam bounce-verification

antispam deepheader-analysis

antispam greylist exempt

antispam settings

antispam trusted