Fortinet white logo
Fortinet white logo

CLI Reference

system fortiguard antivirus

system fortiguard antivirus

Use this command to configure how the FortiMail unit will retrieve the most recent updates to FortiGuard Antivirus engines, antivirus definitions, and antispam definitions (the heuristic antispam rules only). FortiMail can get antivirus updates either directly from a Fortinet Distribution Network (FDN) server or via a web proxy.

Syntax

config system fortiguard antivirus

set scheduled-update-status {enable | disable}

set scheduled-update-frequency {daily | every | weekly}

set scheduled-update-day <day_int>

set scheduled-update-time <time_str>

set virus-db {default | extended | extreme}

set virus-outbreak {disable | enable | enable-with-defer}

set virus-outbreak-protection-period <minutes_int>

set override-server-status {enable | disable}

set override-server-address {<server_ipv4> | <server_fqdn>}

set port 443 | 8890}

set tunneling-status {enable | disable}

set tunneling-address <proxy_fqdn>

set tunneling-port <port_int>

set tunneling-username <username_str>

set tunneling-password <password_str>

end

Variable

Description

Default

override-server-address {<server_ipv4> | <server_fqdn>}

If override-server-status {enable | disable} is enable, enter the IP address of the public or private FortiGuard Distribution Server (FDS) that overrides the default FDS to which the FortiMail unit connects for updates. Then also configure port 443 | 8890}.

override-server-status {enable | disable}

Enable to override the default FDS to which the FortiMail unit connects for updates. Then also configure override-server-address {<server_ipv4> | <server_fqdn>}.

disable

port 443 | 8890}

Enter the listening port number on the public or private FDS for FortiGuard Antivirus updates.

443

scheduled-update-day <day_int>

Enter the day of the week at which the FortiMail unit will request update. Valid range is from 0-6 where 0 means Sunday and 6 means Saturday.

scheduled-update-frequency {daily | every | weekly}

Enter the frequency at which the FortiMail unit will request updates. Also configure scheduled-update-day <day_int> and scheduled-update-time <time_str>.

weekly

scheduled-update-status {enable | disable}

Enable to request FortiGuard Antivirus updates according to a schedule. Also configure scheduled-update-frequency {daily | every | weekly}.

enable

scheduled-update-time <time_str>

Enter the time of the day at which the FortiMail unit will request updates. Use the format hh:mm, where:

  • hh is the hour according to a 24-hour clock. Valid range is from 1 to 23.

  • mm is the minute. Valid range is from 0-59, or 60 for a random minute.

01:00

tunneling-address <proxy_fqdn>

If tunneling-status {enable | disable} is enable, enter the IP address or FQDN of the web proxy.

tunneling-password <password_str>

If tunneling-status {enable | disable} is enable, enter the password of the account on the web proxy.

tunneling-port <port_int>

If tunneling-status {enable | disable} is enable, enter the port number on which the web proxy listens.

tunneling-status {enable | disable}

Enable to tunnel antivirus update requests and FortiGuard antispam queries through a web proxy. Then also configure tunneling-address <proxy_fqdn> etc.

disable

tunneling-username <username_str>

If tunneling-status {enable | disable} is enable, enter the user name of the FortiMail unit’s account on the web proxy.

virus-db {default | extended | extreme}

Depending on the FortiMail model, you may be able to select which size of FortiGuard Antivirus database to use:

  • default: Most commonly seen viruses. This option should be sufficient enough for regular antivirus protection.

    FortiMail VM00 supports only this option.

  • extended: A more complete virus database which contains more signatures, including viruses that FortiGuard has not seen detections of for some time.

    FortiMail VM01/VM02/200F/400F and greater models support this option.

  • extreme: The most complete virus database.

    FortiMail VM04/900F and greater models support this option.

default

virus-outbreak {disable | enable | enable-with-defer}

When a virus outbreak occurs, it takes some time for updates to the FortiGuard Antivirus database. Therefore you can choose to defer the delivery of a suspicious email messages, giving time for the update to occur, and then scan the email again.

  • disable: Do not query FortiGuard Antivirus service.
  • enable: Query FortiGuard Antivirus service.
  • enable-with-defer: If the first query returns no results, defer the email for the specified time and then query again.

enable-
with-defer

virus-outbreak-protection-period <minutes_int>

If virus-outbreak {disable | enable | enable-with-defer} is enable-with-defer, enter how many minutes to wait and then perform the second query.

20

Related topics

system fortiguard antispam

update

system fortiguard antivirus

system fortiguard antivirus

Use this command to configure how the FortiMail unit will retrieve the most recent updates to FortiGuard Antivirus engines, antivirus definitions, and antispam definitions (the heuristic antispam rules only). FortiMail can get antivirus updates either directly from a Fortinet Distribution Network (FDN) server or via a web proxy.

Syntax

config system fortiguard antivirus

set scheduled-update-status {enable | disable}

set scheduled-update-frequency {daily | every | weekly}

set scheduled-update-day <day_int>

set scheduled-update-time <time_str>

set virus-db {default | extended | extreme}

set virus-outbreak {disable | enable | enable-with-defer}

set virus-outbreak-protection-period <minutes_int>

set override-server-status {enable | disable}

set override-server-address {<server_ipv4> | <server_fqdn>}

set port 443 | 8890}

set tunneling-status {enable | disable}

set tunneling-address <proxy_fqdn>

set tunneling-port <port_int>

set tunneling-username <username_str>

set tunneling-password <password_str>

end

Variable

Description

Default

override-server-address {<server_ipv4> | <server_fqdn>}

If override-server-status {enable | disable} is enable, enter the IP address of the public or private FortiGuard Distribution Server (FDS) that overrides the default FDS to which the FortiMail unit connects for updates. Then also configure port 443 | 8890}.

override-server-status {enable | disable}

Enable to override the default FDS to which the FortiMail unit connects for updates. Then also configure override-server-address {<server_ipv4> | <server_fqdn>}.

disable

port 443 | 8890}

Enter the listening port number on the public or private FDS for FortiGuard Antivirus updates.

443

scheduled-update-day <day_int>

Enter the day of the week at which the FortiMail unit will request update. Valid range is from 0-6 where 0 means Sunday and 6 means Saturday.

scheduled-update-frequency {daily | every | weekly}

Enter the frequency at which the FortiMail unit will request updates. Also configure scheduled-update-day <day_int> and scheduled-update-time <time_str>.

weekly

scheduled-update-status {enable | disable}

Enable to request FortiGuard Antivirus updates according to a schedule. Also configure scheduled-update-frequency {daily | every | weekly}.

enable

scheduled-update-time <time_str>

Enter the time of the day at which the FortiMail unit will request updates. Use the format hh:mm, where:

  • hh is the hour according to a 24-hour clock. Valid range is from 1 to 23.

  • mm is the minute. Valid range is from 0-59, or 60 for a random minute.

01:00

tunneling-address <proxy_fqdn>

If tunneling-status {enable | disable} is enable, enter the IP address or FQDN of the web proxy.

tunneling-password <password_str>

If tunneling-status {enable | disable} is enable, enter the password of the account on the web proxy.

tunneling-port <port_int>

If tunneling-status {enable | disable} is enable, enter the port number on which the web proxy listens.

tunneling-status {enable | disable}

Enable to tunnel antivirus update requests and FortiGuard antispam queries through a web proxy. Then also configure tunneling-address <proxy_fqdn> etc.

disable

tunneling-username <username_str>

If tunneling-status {enable | disable} is enable, enter the user name of the FortiMail unit’s account on the web proxy.

virus-db {default | extended | extreme}

Depending on the FortiMail model, you may be able to select which size of FortiGuard Antivirus database to use:

  • default: Most commonly seen viruses. This option should be sufficient enough for regular antivirus protection.

    FortiMail VM00 supports only this option.

  • extended: A more complete virus database which contains more signatures, including viruses that FortiGuard has not seen detections of for some time.

    FortiMail VM01/VM02/200F/400F and greater models support this option.

  • extreme: The most complete virus database.

    FortiMail VM04/900F and greater models support this option.

default

virus-outbreak {disable | enable | enable-with-defer}

When a virus outbreak occurs, it takes some time for updates to the FortiGuard Antivirus database. Therefore you can choose to defer the delivery of a suspicious email messages, giving time for the update to occur, and then scan the email again.

  • disable: Do not query FortiGuard Antivirus service.
  • enable: Query FortiGuard Antivirus service.
  • enable-with-defer: If the first query returns no results, defer the email for the specified time and then query again.

enable-
with-defer

virus-outbreak-protection-period <minutes_int>

If virus-outbreak {disable | enable | enable-with-defer} is enable-with-defer, enter how many minutes to wait and then perform the second query.

20

Related topics

system fortiguard antispam

update