system fortiguard antispam
Use this command to configure how the FortiMail unit will connect to the FortiGuard servers to query for antispam signatures.
Syntax
config system fortiguard antispam
set cache-status {enable | disable}
set cache-mpercent <percentage_int>
set query-timeout <timeout_int>
set threshold-ip-connect {1 | 2 | 3}
set server-override-status {enable | disable}
set server-override-ip {<host_fqdn> | <host_ipv4>}
set url-redirect-lookup {enable | disable}
set server-location {any | usa}
set outbreak-protection-level {disable | high | low | medium}
set outbreak-protection-period <minutes_int>
set submission-status {enable | disable}
set submission-per-domain {enable | disable}
set submission-retention <days_int>
set submission-spam-addr <spam-sample_email>
set submission-ham-addr <not-spam-sample_email>
end
Variable |
Description |
Default |
Enter the percentage of memory the antispam cache is allowed to use in percentage. The range is 1-15%. |
2 |
|
Enable cache and specify the cache time to live (TTL) to improve performance. Also configure cache ttl <ttl_int> and cache-mpercent <percentage_int>. |
enable |
|
Enter the TTL in seconds for cache entries. If the entry is not refreshed before this time, then it expires and is removed from cache. |
300 |
|
Select the threshold level for spam outbreak protection. Higher levels mean stricter filtering. This feature temporarily holds email for a certain period of time (see Conversely, in order to reduce the types of email to be deferred for outbreak, set this command to |
medium |
|
Specify how long (in minutes) FortiMail will hold email before it query the FortiGuard server for the second time. |
30 |
|
Enter the port number used to communicate with the FortiGuard Antispam query servers. |
53 |
|
Enter the protocol used to communicate with the FortiGuard servers. |
https |
|
Enter the timeout value for the FortiMail unit to query the FortiGuard Antispam query server. |
7 |
|
Select which geographic regions of FortiGuard servers to use if required by regulatory compliance or for network performance. |
any |
|
If server-override-status {enable | disable} is |
|
|
Enable to override the default FortiGuard Antispam query server to which the FortiMail unit connects to and checks for antispam signatures. |
disable |
|
submission-handling-type {admin-review | direct-to-fortiguard} |
Select whether you want an administrator to manually review spam sample submissions, or you want them to be sent directly to FortiGuard. |
admin-review |
If you have multiple protected domains, enable this option to allow domain administrators to view spam sample submissions for their own domain. |
disable |
|
Enter the email address that will receive samples of normal email (not spam). Note: Sample submission email addresses must:
|
|
|
Enter a number of days between 0-60, after which the sample spam submission will be deleted. |
14 |
|
Enter the email address that will receive samples of spam email. Note: Sample submission email addresses must:
|
|
|
Enable to submit samples of spam and non-spam that were not detected correctly to FortiGuard or your FortiMail administrators. This information can be used to improve the catch rate. Users can submit samples of spam and non-spam via the Report Spam plugin for Microsoft Outlook. The plugin is available for download at https://support.fortinet.com/. To review the submitted samples, go to Monitor > Quarantine > Sample Submission. |
disable |
|
Enable to query to the FortiGuard Distribution Network (FDN) for FortiGuard Antispam ratings. This option must be enabled for antispam profiles where the FortiGuard Antispam scan is enabled to have an effect. |
enable |
|
When you configure the FortiGuard IP reputation check under sender reputation in a session profile, if you select the client connection option, FortiGuard Antispam Service determines if the IP address of the SMTP server is blocklisted during the connection phase. FortiGuard categorizes the blocklisted IP addresses into three levels: level 3 has bad reputation; level 2 has worse reputation; and level 1 has the worst reputation. To avoid false positives, you can specify which level to block. Enter the threshold to block email whose rating is equal to or worse than that level. For example, if you want to block level 1 and level 2 but not level 3, enter |
2 |
|
Enable to connect to web servers in order to resolve URL redirects to their target URLs (for example, a tiny URL that expands to a longer URL). The FortiMail unit can then queriy the FortiGuard AntiSpam database about the target URL — not the redirected URL. Note: Your network must allow the FortiMail unit to send HTTP/HTTPS requests to web servers in order to get the destination URL. See also required port numbers in the FortiMail Administration Guide. |
enable |