Fortinet white logo
Fortinet white logo

CLI Reference

system threat-feed

system threat-feed

Use this command to configure threat feeds.

Threat feeds are plain text files that contain a list of security threats. Threat feeds can be hosted on FortiClient EMS, third party servers, or your own HTTP/HTTPS web server. In this way, FortiMail units can utilize security information from many vendors, security communities, and specialist teams in your own organization. Once FortiMail is connected to threat feeds, you can select them when you configure security features such as antivirus file signatures and antispam IP reputation and URL filters.

FortiMail periodically synchronizes with threat feeds and automatically imports changes.

Note

If the threat feed's web server becomes unreachable and there is a connection status error, then the FortiMail continues to use its existing local cache of the threat feed, regardless of reboot. To get threat feed updates, you must re-establish network connectivity.

Syntax

config system threat-feed

edit <profile_name>

[set comment<comment_str>]

set status {enable | disable}

set type {ip-address | malware-hash | url-category}

set resource-url <feed_url>

set server-identity-check {basic | full | none}

set username <user_str>

set password <password_str>

[set update-method {pull}]

set update-interval <minutes_int>

next

end

Variable

Description

Default

<profile_name>

Enter the name of the profile.

comment<comment_str>

Optional description of the local category.

password <password_str>

If the server requires authentication, enter the password that FortiMail will use to connect.

resource-url <feed_url>

Enter the URI of the threat feed.

FortiMail also supports OASIS STIX/TAXII format. To use the TAXII protocol, use the stix:// prefix instead of https://.

server-identity-check {basic | full | none}

Select the level of server certificate validation strictness, either:

  • none — No certificate validation.
  • basic — Validate the server certificate. It must not be revoked or expired, and must be signed by a trusted CA. See also system certificate ca.
  • full — In addition to validation requirements in basic, the domain name in resource-url <feed_url> must match the common name (CN) field in the server certificate.
Note

To harden security, select full.

none

status {enable | disable}

Enable or disable the threat feed.

enable

type {ip-address | malware-hash | url-category}

Select the type of threat feed, either:

  • ip-address — IPv4 or IPv6 addresses.
  • malware-hash — MD5, SHA1, or SHA256 file checksums.
  • url-category — URIs such as https://example.com:4443/url/*

For details on the types and their required file format, see the FortiMail Administration Guide.

ip-address

update-interval <minutes_int>

Enter the frequency in minutes of synchronization with the threat feed. Default value is 30 minutes. Valid range is from 1 to 43200 minutes (30 days).

30

update-method {pull}

Currently, only the pull method of threat feed synchronization is supported.

pull

username <user_str>

If the server requires authentication, enter the username that FortiMail will use to connect.

Related topics

file signature

profile antispam

system webfilter customized-category

system threat-feed

system threat-feed

system threat-feed

Use this command to configure threat feeds.

Threat feeds are plain text files that contain a list of security threats. Threat feeds can be hosted on FortiClient EMS, third party servers, or your own HTTP/HTTPS web server. In this way, FortiMail units can utilize security information from many vendors, security communities, and specialist teams in your own organization. Once FortiMail is connected to threat feeds, you can select them when you configure security features such as antivirus file signatures and antispam IP reputation and URL filters.

FortiMail periodically synchronizes with threat feeds and automatically imports changes.

Note

If the threat feed's web server becomes unreachable and there is a connection status error, then the FortiMail continues to use its existing local cache of the threat feed, regardless of reboot. To get threat feed updates, you must re-establish network connectivity.

Syntax

config system threat-feed

edit <profile_name>

[set comment<comment_str>]

set status {enable | disable}

set type {ip-address | malware-hash | url-category}

set resource-url <feed_url>

set server-identity-check {basic | full | none}

set username <user_str>

set password <password_str>

[set update-method {pull}]

set update-interval <minutes_int>

next

end

Variable

Description

Default

<profile_name>

Enter the name of the profile.

comment<comment_str>

Optional description of the local category.

password <password_str>

If the server requires authentication, enter the password that FortiMail will use to connect.

resource-url <feed_url>

Enter the URI of the threat feed.

FortiMail also supports OASIS STIX/TAXII format. To use the TAXII protocol, use the stix:// prefix instead of https://.

server-identity-check {basic | full | none}

Select the level of server certificate validation strictness, either:

  • none — No certificate validation.
  • basic — Validate the server certificate. It must not be revoked or expired, and must be signed by a trusted CA. See also system certificate ca.
  • full — In addition to validation requirements in basic, the domain name in resource-url <feed_url> must match the common name (CN) field in the server certificate.
Note

To harden security, select full.

none

status {enable | disable}

Enable or disable the threat feed.

enable

type {ip-address | malware-hash | url-category}

Select the type of threat feed, either:

  • ip-address — IPv4 or IPv6 addresses.
  • malware-hash — MD5, SHA1, or SHA256 file checksums.
  • url-category — URIs such as https://example.com:4443/url/*

For details on the types and their required file format, see the FortiMail Administration Guide.

ip-address

update-interval <minutes_int>

Enter the frequency in minutes of synchronization with the threat feed. Default value is 30 minutes. Valid range is from 1 to 43200 minutes (30 days).

30

update-method {pull}

Currently, only the pull method of threat feed synchronization is supported.

pull

username <user_str>

If the server requires authentication, enter the username that FortiMail will use to connect.

Related topics

file signature

profile antispam

system webfilter customized-category

system threat-feed