Fortinet FortiMail is an email security gateway product that monitors email messages on behalf of an organization to identify messages that contain malicious content, including spam, malware, and phishing attempts.
This document provides information about the Fortinet FortiMail connector, which facilitates automated interactions, with your Fortinet FortiMail server using FortiSOAR™ playbooks. Add the Fortinet FortiMail connector, as a step in FortiSOAR™ playbooks and perform automated operations such as retrieving a list of all domains configured on Fortinet FortiMail and retrieving the sender blacklist and whitelist for session profiles.
Connector Version: 1.1.0
FortiSOAR™ Version Tested on: 6.4.4-3164
Fortinet FortiMail Version Tested on: v6.4.0(GA), build384, 2020.05.07
Authored By: Fortinet
Certified: Yes
Following enhancements have been made to the Fortinet FortiMail connector in version 1.1.0:
From FortiSOAR™ 5.0.0 onwards, use the Connector Store to install the connector. For the detailed procedure to install a connector, click here.
You can also use the following yum command as a root user to install connectors from an SSH session:
yum install cyops-connector-fortinet-fortimail
For the procedure to configure a connector, click here.
In FortiSOAR™, on the Connectors page, click the Fortinet FortiMail connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:
| Parameter | Description |
|---|---|
| Server URL | URL of the Fortinet FortiMail server to which you will connect and perform automated operations. |
| Username | Username of the Fortinet FortiMail server to which you will connect and perform automated operations. |
| Password | Password used to access the Fortinet FortiMail server to which you will connect and perform the automated operations. |
| Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. |
The following automated operations can be included in playbooks, and you can also use the annotations to access operations from version 4.10.0 and onwards:
| Function | Description | Annotation and Category |
|---|---|---|
| Get Domains Configured | Retrieves a list of all domains configured on Fortinet FortiMail. | get_domains Investigation |
| Get AntiSpam Profiles for Domain | Retrieves a list of all AntiSpam Profiles for a specified domain in Fortinet FortiMail, based on the domain ID you have specified. | get_antispam_domains Investigation |
| Get Recipient Policies for Domain | Retrieves a list of all Recipient Profiles for a specified domain in Fortinet FortiMail, based on the domain ID you have specified. | get_recipient_policies Investigation |
| Get GreyList | Retrieves the Greylist configured on Fortinet FortiMail. | grey_list Investigation |
| Get Auto Exempt GreyList | Retrieves the Auto Exempt Greylist configured on Fortinet FortiMail. | grey_list Investigation |
| Get Sender Whitelist For Session Profile | Retrieves a list of sender whitelists from Fortinet FortiMail, based on the profile name you have specified. | get_session_safe_list Investigation |
| Get Sender Blacklist for Session Profile | Retrieves a list of sender blacklists from Fortinet FortiMail, based on the profile name you have specified. | get_session_block_list Investigation |
| Get Profile Name | Retrieves a list of profile names from Fortinet FortiMail, based on the profile type you have specified. | get_profile_name Investigation |
| Block Sender Address | Adds an email address to the sender block list of the specified session profile, based on the profile name and email address you have specified. | block_sender_address Containment |
| Block Recipient Address | Adds an email address to the recipient block list of the specified session profile, based on the profile name and email address you have specified. | block_recipient_address Containment |
| Unblock Sender Address | Unblocks an email address by removing the specified email address from the sender block list of the specified session profile, based on the profile name and email address you have specified. | unblock_sender_address Remediation |
| Unblock Recipient Address | Unblocks an email address by removing the specified email address from the recipient block list of the specified session profile, based on the profile name and email address you have specified. | unblock_recipient_address Remediation |
| Update Block List | Updates, i.e., adds or removes items such as email addresses, domains, IP addresses from the selected block list, based on the input parameters you have specified. | update_block_list Remediation |
| Update Safe List | Updates, i.e., adds or removes items such as email addresses, domains, IP addresses from the selected safe list, based on the input parameters you have specified. | update_safe_list Remediation |
| Update Session Profile | Updates a session profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | update_session_profile Investigation |
| Update Antispam Profile | Updates an antispam profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | update_antispam_profile Investigation |
| Create Session Profile | Creates a session profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | create_session_profile Investigation |
| Create Antispam Profile | Creates an antispam profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | create_antispam_profile Investigation |
| Delete Session Profile | Deletes a session profile from Fortinet FortiMail, based on the profile name you have specified. | delete_session_profile Investigation |
| Delete Antispam Profile | Deletes an antispam profile from Fortinet FortiMail, based on the profile name you have specified. | delete_antispam_profile Investigation |
| Get Session Profile Details | Retrieves details of a session profile from Fortinet FortiMail, based on the profile name you have specified. | get_session_profile Investigation |
| Get Antispam Profile Details | Retrieves details of an antispam profile from Fortinet FortiMail, based on the profile name you have specified. | get_antispam_profile Investigation |
None.
The output contains the following populated JSON schema:
{
"collection": [
{
"mkey": "",
"is_subdomain": "",
"ip": "",
"recipient_verification": "",
"is_association": "",
"maindomain": "",
"mxflag": "",
"is_service_domain": "",
"port": ""
}
],
"objectID": "",
"reqAction": "",
"subCount": "",
"nextPage": "",
"totalRemoteCount": "",
"remoteSorting": ""
}
| Parameter | Description |
|---|---|
| Domain | Name of the domain whose associated AntiSpam Profiles you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"objectID": "",
"reqAction": "",
"totalRemoteCount": "",
"subCount": "",
"remoteSorting": "",
"nextPage": "",
"collection": [
{
"mdomain": "",
"mkey": "",
"dictionary_type": "",
"minimum_dictionary_score": "",
"isReferenced": ""
}
]
}
| Parameter | Description |
|---|---|
| Domain | Name of the domain whose associated Recipient Profiles you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [
{
"auth": "",
"misc": "",
"mkey": "",
"status": "",
"comment": "",
"content": "",
"mdomain": "",
"pkiauth": "",
"pkiuser": "",
"antispam": "",
"antivirus": "",
"direction": "",
"groupmode": "",
"imap_auth": "",
"ldap_auth": "",
"pop3_auth": "",
"smtp_auth": "",
"profile_dlp": "",
"radius_auth": "",
"sender_type": "",
"ldap_profile": "",
"sender_domain": "",
"sender_pattern": "",
"recipient_domain": "",
"recipient_pattern": "",
"sender_email_address_group": "",
"recipient_email_address_group": ""
}
],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
None.
The output contains the following populated JSON schema:
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
None.
The output contains the following populated JSON schema:
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile whose associated sender whitelist you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"totalRemoteCount": "",
"objectID": "",
"collection": [
{
"mkey": ""
}
],
"reqAction": "",
"subCount": "",
"nextPage": "",
"remoteSorting": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile whose associated sender whitelist you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"totalRemoteCount": "",
"objectID": "",
"collection": [
{
"mkey": ""
}
],
"reqAction": "",
"subCount": "",
"nextPage": "",
"remoteSorting": ""
}
| Parameter | Description |
|---|---|
| Profile Type | Select the type of profile based on which you want to retrieve profile names from Fortinet FortiMail. You can choose between Session and Antispam. |
The output contains the following populated JSON schema if 'Session' is selected as the 'Profile Type':
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [
{
"mkey": "",
"action": "",
"isReferenced": ""
}
],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
The output contains the following populated JSON schema if 'Antispam' is selected as the 'Profile Type':
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [
{
"mkey": "",
"isReferenced": "",
"dictionary_type": "",
"minimum_dictionary_score": ""
}
],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile to whose associated sender block list you want to add the specified address. |
| Sender Email Address | Email address that you want to block by adding it to the sender block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"objectID": "",
"reqAction": "",
"nodePermission": "",
"mkey": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile to whose associated recipient block list you want to add the specified address. |
| Recipient Email Address | Email address that you want to block by adding it to the recipient block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"objectID": "",
"reqAction": "",
"nodePermission": "",
"mkey": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile from whose associated sender block list you want to remove the specified address. |
| Sender Email Address | Email address that you want to unblock by removing it from the sender block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"errorType": "",
"errorMsg": "",
"objectID": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile from whose associated recipient block list you want to remove the specified address. |
| Recipient Email Address | Email address that you want to unblock by removing it from the recipient block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"errorType": "",
"errorMsg": "",
"objectID": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Action | Select the action that you want to perform, i.e., whether you want to Add or Remove items from the block list. |
| List Type |
Select the block list you want to update. You can choose between System, Domain, and Personal.
|
| Items | Provide a CSV list of items, i.e., email addresses, IP addresses, or domains, that you want to update (add or remove) in the selected block list. |
The output contains the following populated JSON schema if 'Add' is selected as the 'Action':
{
"mkey": "",
"listname": "",
"objectID": "",
"listitems": "",
"reqAction": "",
"nodePermission": ""
}
The output contains the following populated JSON schema if 'Remove' is selected as the 'Action':
{
"errorMsg": "",
"objectID": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Action | Select the action that you want to perform, i.e., whether you want to Add or Remove items from the safe list. |
| List Type |
Select the safe list you want to update. You can choose between System, Domain, and Personal.
|
| Items | Provide a CSV list of items, i.e., email addresses, IP addresses, or domains, that you want to update (add or remove) in the selected safe list. |
The output contains the following populated JSON schema if 'Add' is selected as the 'Action':
{
"mkey": "",
"listname": "",
"objectID": "",
"listitems": "",
"reqAction": "",
"nodePermission": ""
}
The output contains the following populated JSON schema if 'Remove' is selected as the 'Action':
{
"errorMsg": "",
"objectID": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the profile that you want to update on Fortinet FortiMail. |
| Connection Settings | Select this option to configure the connection setting. If you select this option, then you can specify the following parameters:
|
| Sender Reputation | Select this option to configure sender reputation. If you select this option, then you can specify the following parameters:
|
| Endpoint Reputation | Select this option to configure Endpoint Reputation settings. This option allows you to restrict the ability of an MSISDN or subscriber ID to send email or MM3 multimedia messaging service (MMS) messages from a mobile device, based upon its endpoint reputation score. The MSISDN reputation score is similar to a sender reputation score. Once you select this option, you can configure the following additional parameters:
|
| Sender Validation | Select this option to configure the settings to confirm sender and message authenticity. Once you select this option, you can configure the following additional parameters:
|
| Session Settings | Select this option to configure session profiles. Once you select this option, you can configure the following additional parameters:
|
| Lists | Select this option to configure the sender and recipient block lists and safe lists, if any, to sue with the session profile. Block and safe lists are separate for each session profile and apply only to traffic controlled by the IP-based policy to which the session profile is applied. Once you select this option, you can configure the following additional parameters:
|
The output contains the following populated JSON schema:
{
"spf": "",
"dkim": "",
"mkey": "",
"queue": "",
"route": "",
"action": "",
"eom_ack": "",
"rewrite": "",
"objectID": "",
"conn_hide": "",
"domainkey": "",
"reqAction": "",
"error_free": "",
"remote_log": "",
"bounce_rule": "",
"error_total": "",
"helo_custom": "",
"hide_header": "",
"limit_NOOPs": "",
"limit_RSETs": "",
"limit_helos": "",
"splice_what": "",
"dkim_signing": "",
"limit_emails": "",
"rewrite_helo": "",
"splice_after": "",
"hide_received": "",
"splice_enable": "",
"access_control": "",
"nodePermission": "",
"sender_rewrite": "",
"block_encrypted": "",
"check_client_ip": "",
"conn_concurrent": "",
"error_increment": "",
"allow_pipelining": "",
"blacklist_enable": "",
"check_open_relay": "",
"command_checking": "",
"conn_blacklisted": "",
"limit_recipients": "",
"whitelist_enable": "",
"check_helo_domain": "",
"conn_idle_timeout": "",
"limit_header_size": "",
"recipient_rewrite": "",
"sender_reputation": "",
"check_domain_chars": "",
"check_mason_effect": "",
"conn_rate_how_many": "",
"disallow_encrypted": "",
"limit_message_size": "",
"number_of_messages": "",
"check_sender_domain": "",
"error_initial_delay": "",
"rewrite_helo_custom": "",
"sender_verification": "",
"to_blacklist_enable": "",
"to_whitelist_enable": "",
"bypass_bounce_verify": "",
"number_of_recipients": "",
"check_recipient_domain": "",
"disallow_empty_domains": "",
"remove_current_headers": "",
"session_action_msg_type": "",
"sender_reputation_reject": "",
"sender_reputation_tempfail": "",
"sender_reputation_throttle": "",
"sender_addr_rate_ctrl_state": "",
"sender_verification_profile": "",
"sender_addr_rate_ctrl_action": "",
"dkim_signing_authenticated_only": "",
"msisdn_sender_reputation_action": "",
"msisdn_sender_reputation_status": "",
"msisdn_sender_reputation_trigger": "",
"sender_reputation_throttle_number": "",
"sender_reputation_throttle_percent": "",
"sender_addr_rate_ctrl_max_recipients": "",
"msisdn_sender_reputation_blacklist_duration": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile that you want to update on Fortinet FortiMail. |
| Default Action | Select the default action that this operation should take when the policy matches. You can choose from the following actions: None, Default, Discard, Reject, System Quarantine, User Quarantine, or Tag Subject. |
| Scan Configurations | Select this option to configure the scan on Fortinet FortiMail. If you select this option, then you can configure the following parameters:
|
The output contains the following populated JSON schema:
{
"mkey": "",
"dnsbl": "",
"surbl": "",
"bayesian": "",
"greylist": "",
"objectID": "",
"scan_pdf": "",
"heuristic": "",
"imagespam": "",
"reqAction": "",
"aggressive": "",
"bannedword": "",
"dictionary": "",
"fortiguard": "",
"scanner_rbl": "",
"action_dmarc": "",
"dmarc_status": "",
"phishing_uri": "",
"scan_maxsize": "",
"spf_checking": "",
"impersonation": "",
"scanner_surbl": "",
"spam_outbreak": "",
"whitelistword": "",
"nodePermission": "",
"action_spf_fail": "",
"action_spf_none": "",
"action_spf_pass": "",
"dictionary_type": "",
"heuristic_lower": "",
"heuristic_upper": "",
"scanner_default": "",
"spf_fail_status": "",
"spf_none_status": "",
"spf_pass_status": "",
"bayesian_user_db": "",
"scanner_bayesian": "",
"action_newsletter": "",
"behavior_analysis": "",
"newsletter_status": "",
"scanner_grey_list": "",
"scanner_heuristic": "",
"action_spf_neutral": "",
"scanner_dictionary": "",
"scanner_fortiguard": "",
"scanner_image_spam": "",
"spf_neutral_status": "",
"deepheader_analysis": "",
"deepheader_check_ip": "",
"dictionary_group_id": "",
"fortiguard_check_ip": "",
"scan_bypass_on_auth": "",
"scanner_banned_word": "",
"scanner_deep_header": "",
"action_spf_soft_fail": "",
"apply_action_default": "",
"scanner_phishing_uri": "",
"spf_soft_fail_status": "",
"uri_filter_secondary": "",
"action_spf_perm_error": "",
"action_spf_temp_error": "",
"bayesian_autotraining": "",
"bayesian_usertraining": "",
"spf_perm_error_status": "",
"spf_temp_error_status": "",
"uri_filter_fortiguard": "",
"impersonation_analysis": "",
"heuristic_rules_percent": "",
"action_behavior_analysis": "",
"minimum_dictionary_score": "",
"dictionary_profile_id_new": "",
"scanner_fortiguard_blackip": "",
"action_ip_reputation_level1": "",
"action_ip_reputation_level2": "",
"action_ip_reputation_level3": "",
"action_spf_sender_alignment": "",
"action_uri_filter_secondary": "",
"ip_reputation_level1_status": "",
"ip_reputation_level2_status": "",
"ip_reputation_level3_status": "",
"spf_sender_alignment_status": "",
"uri_filter_secondary_status": "",
"action_suspicious_newsletter": "",
"suspicious_newsletter_status": "",
"action_impersonation_analysis": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Provide the Session Profile Name to Create the Profile. |
| Connection Settings | Select this option to configure the connection setting. If you select this option, then you must specify the following parameters:
|
| Sender Reputation | Select this option to configure sender reputation. If you select this option, then you must specify the following parameters:
|
| Endpoint Reputation | Select this option to configure Endpoint Reputation settings. This option allows you to restrict the ability of an MSISDN or subscriber ID to send email or MM3 multimedia messaging service (MMS) messages from a mobile device, based upon its endpoint reputation score. The MSISDN reputation score is similar to a sender reputation score. Once you select this option, you can configure the following additional parameters:
|
| Sender Validation | Select this option to configure the settings to confirm sender and message authenticity. Once you select this option, you can configure the following additional parameters:
|
| Session Settings | Select this option to configure session profiles. Once you select this option, you can configure the following additional parameters:
|
| Lists | Select this option to configure the sender and recipient block lists and safe lists, if any, to sue with the session profile. Block and safe lists are separate for each session profile and apply only to traffic controlled by the IP-based policy to which the session profile is applied. Once you select this option, you can configure the following additional parameters:
|
The output contains the following populated JSON schema:
{
"spf": "",
"dkim": "",
"mkey": "",
"queue": "",
"route": "",
"action": "",
"eom_ack": "",
"rewrite": "",
"objectID": "",
"conn_hide": "",
"domainkey": "",
"reqAction": "",
"error_free": "",
"remote_log": "",
"bounce_rule": "",
"error_total": "",
"helo_custom": "",
"hide_header": "",
"limit_NOOPs": "",
"limit_RSETs": "",
"limit_helos": "",
"splice_what": "",
"dkim_signing": "",
"limit_emails": "",
"rewrite_helo": "",
"splice_after": "",
"hide_received": "",
"splice_enable": "",
"access_control": "",
"nodePermission": "",
"sender_rewrite": "",
"block_encrypted": "",
"check_client_ip": "",
"conn_concurrent": "",
"error_increment": "",
"allow_pipelining": "",
"blacklist_enable": "",
"check_open_relay": "",
"command_checking": "",
"conn_blacklisted": "",
"limit_recipients": "",
"whitelist_enable": "",
"check_helo_domain": "",
"conn_idle_timeout": "",
"limit_header_size": "",
"recipient_rewrite": "",
"sender_reputation": "",
"check_domain_chars": "",
"check_mason_effect": "",
"conn_rate_how_many": "",
"disallow_encrypted": "",
"limit_message_size": "",
"number_of_messages": "",
"check_sender_domain": "",
"error_initial_delay": "",
"rewrite_helo_custom": "",
"sender_verification": "",
"to_blacklist_enable": "",
"to_whitelist_enable": "",
"bypass_bounce_verify": "",
"number_of_recipients": "",
"check_recipient_domain": "",
"disallow_empty_domains": "",
"remove_current_headers": "",
"session_action_msg_type": "",
"sender_reputation_reject": "",
"sender_reputation_tempfail": "",
"sender_reputation_throttle": "",
"sender_addr_rate_ctrl_state": "",
"sender_verification_profile": "",
"sender_addr_rate_ctrl_action": "",
"dkim_signing_authenticated_only": "",
"msisdn_sender_reputation_action": "",
"msisdn_sender_reputation_status": "",
"msisdn_sender_reputation_trigger": "",
"sender_reputation_throttle_number": "",
"sender_reputation_throttle_percent": "",
"sender_addr_rate_ctrl_max_recipients": "",
"msisdn_sender_reputation_blacklist_duration": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile that you want to create on Fortinet FortiMail. |
| Deafult Action | Select the default action that this operation should take when the policy matches. You can choose from the following actions: None, Default, Discard, Reject, System Quarantine, User Quarantine, or Tag Subject. |
| Scan Configurations | Select this option to configure the scan on Fortinet FortiMail. If you select this option, then you can configure the following parameters:
|
The output contains the following populated JSON schema:
{
"mkey": "",
"dnsbl": "",
"surbl": "",
"bayesian": "",
"greylist": "",
"objectID": "",
"scan_pdf": "",
"heuristic": "",
"imagespam": "",
"reqAction": "",
"aggressive": "",
"bannedword": "",
"dictionary": "",
"fortiguard": "",
"scanner_rbl": "",
"action_dmarc": "",
"dmarc_status": "",
"phishing_uri": "",
"scan_maxsize": "",
"spf_checking": "",
"impersonation": "",
"scanner_surbl": "",
"spam_outbreak": "",
"whitelistword": "",
"nodePermission": "",
"action_spf_fail": "",
"action_spf_none": "",
"action_spf_pass": "",
"dictionary_type": "",
"heuristic_lower": "",
"heuristic_upper": "",
"scanner_default": "",
"spf_fail_status": "",
"spf_none_status": "",
"spf_pass_status": "",
"bayesian_user_db": "",
"scanner_bayesian": "",
"action_newsletter": "",
"behavior_analysis": "",
"newsletter_status": "",
"scanner_grey_list": "",
"scanner_heuristic": "",
"action_spf_neutral": "",
"scanner_dictionary": "",
"scanner_fortiguard": "",
"scanner_image_spam": "",
"spf_neutral_status": "",
"deepheader_analysis": "",
"deepheader_check_ip": "",
"dictionary_group_id": "",
"fortiguard_check_ip": "",
"scan_bypass_on_auth": "",
"scanner_banned_word": "",
"scanner_deep_header": "",
"action_spf_soft_fail": "",
"apply_action_default": "",
"scanner_phishing_uri": "",
"spf_soft_fail_status": "",
"uri_filter_secondary": "",
"action_spf_perm_error": "",
"action_spf_temp_error": "",
"bayesian_autotraining": "",
"bayesian_usertraining": "",
"spf_perm_error_status": "",
"spf_temp_error_status": "",
"uri_filter_fortiguard": "",
"impersonation_analysis": "",
"heuristic_rules_percent": "",
"action_behavior_analysis": "",
"minimum_dictionary_score": "",
"dictionary_profile_id_new": "",
"scanner_fortiguard_blackip": "",
"action_ip_reputation_level1": "",
"action_ip_reputation_level2": "",
"action_ip_reputation_level3": "",
"action_spf_sender_alignment": "",
"action_uri_filter_secondary": "",
"ip_reputation_level1_status": "",
"ip_reputation_level2_status": "",
"ip_reputation_level3_status": "",
"spf_sender_alignment_status": "",
"uri_filter_secondary_status": "",
"action_suspicious_newsletter": "",
"suspicious_newsletter_status": "",
"action_impersonation_analysis": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile that you want to delete from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"objectID": "",
"errorMsg": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile that you want to delete from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"objectID": "",
"errorMsg": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile whose details you want to delete from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"spf": "",
"dkim": "",
"mkey": "",
"queue": "",
"route": "",
"action": "",
"eom_ack": "",
"rewrite": "",
"objectID": "",
"conn_hide": "",
"domainkey": "",
"reqAction": "",
"error_free": "",
"remote_log": "",
"bounce_rule": "",
"error_total": "",
"helo_custom": "",
"hide_header": "",
"limit_NOOPs": "",
"limit_RSETs": "",
"limit_helos": "",
"splice_what": "",
"dkim_signing": "",
"limit_emails": "",
"rewrite_helo": "",
"splice_after": "",
"hide_received": "",
"splice_enable": "",
"access_control": "",
"nodePermission": "",
"sender_rewrite": "",
"block_encrypted": "",
"check_client_ip": "",
"conn_concurrent": "",
"error_increment": "",
"allow_pipelining": "",
"blacklist_enable": "",
"check_open_relay": "",
"command_checking": "",
"conn_blacklisted": "",
"limit_recipients": "",
"whitelist_enable": "",
"check_helo_domain": "",
"conn_idle_timeout": "",
"limit_header_size": "",
"recipient_rewrite": "",
"sender_reputation": "",
"check_domain_chars": "",
"check_mason_effect": "",
"conn_rate_how_many": "",
"disallow_encrypted": "",
"limit_message_size": "",
"number_of_messages": "",
"check_sender_domain": "",
"error_initial_delay": "",
"rewrite_helo_custom": "",
"sender_verification": "",
"to_blacklist_enable": "",
"to_whitelist_enable": "",
"bypass_bounce_verify": "",
"number_of_recipients": "",
"check_recipient_domain": "",
"disallow_empty_domains": "",
"remove_current_headers": "",
"session_action_msg_type": "",
"sender_reputation_reject": "",
"sender_reputation_tempfail": "",
"sender_reputation_throttle": "",
"sender_addr_rate_ctrl_state": "",
"sender_verification_profile": "",
"sender_addr_rate_ctrl_action": "",
"dkim_signing_authenticated_only": "",
"msisdn_sender_reputation_action": "",
"msisdn_sender_reputation_status": "",
"msisdn_sender_reputation_trigger": "",
"sender_reputation_throttle_number": "",
"sender_reputation_throttle_percent": "",
"sender_addr_rate_ctrl_max_recipients": "",
"msisdn_sender_reputation_blacklist_duration": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile whose associated details you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"mkey": "",
"dnsbl": "",
"surbl": "",
"bayesian": "",
"greylist": "",
"objectID": "",
"scan_pdf": "",
"heuristic": "",
"imagespam": "",
"reqAction": "",
"aggressive": "",
"bannedword": "",
"dictionary": "",
"fortiguard": "",
"scanner_rbl": "",
"action_dmarc": "",
"dmarc_status": "",
"phishing_uri": "",
"scan_maxsize": "",
"spf_checking": "",
"impersonation": "",
"scanner_surbl": "",
"spam_outbreak": "",
"whitelistword": "",
"nodePermission": "",
"action_spf_fail": "",
"action_spf_none": "",
"action_spf_pass": "",
"dictionary_type": "",
"heuristic_lower": "",
"heuristic_upper": "",
"scanner_default": "",
"spf_fail_status": "",
"spf_none_status": "",
"spf_pass_status": "",
"bayesian_user_db": "",
"scanner_bayesian": "",
"action_newsletter": "",
"behavior_analysis": "",
"newsletter_status": "",
"scanner_grey_list": "",
"scanner_heuristic": "",
"action_spf_neutral": "",
"scanner_dictionary": "",
"scanner_fortiguard": "",
"scanner_image_spam": "",
"spf_neutral_status": "",
"deepheader_analysis": "",
"deepheader_check_ip": "",
"dictionary_group_id": "",
"fortiguard_check_ip": "",
"scan_bypass_on_auth": "",
"scanner_banned_word": "",
"scanner_deep_header": "",
"action_spf_soft_fail": "",
"apply_action_default": "",
"scanner_phishing_uri": "",
"spf_soft_fail_status": "",
"uri_filter_secondary": "",
"action_spf_perm_error": "",
"action_spf_temp_error": "",
"bayesian_autotraining": "",
"bayesian_usertraining": "",
"spf_perm_error_status": "",
"spf_temp_error_status": "",
"uri_filter_fortiguard": "",
"impersonation_analysis": "",
"heuristic_rules_percent": "",
"action_behavior_analysis": "",
"minimum_dictionary_score": "",
"dictionary_profile_id_new": "",
"scanner_fortiguard_blackip": "",
"action_ip_reputation_level1": "",
"action_ip_reputation_level2": "",
"action_ip_reputation_level3": "",
"action_spf_sender_alignment": "",
"action_uri_filter_secondary": "",
"ip_reputation_level1_status": "",
"ip_reputation_level2_status": "",
"ip_reputation_level3_status": "",
"spf_sender_alignment_status": "",
"uri_filter_secondary_status": "",
"action_suspicious_newsletter": "",
"suspicious_newsletter_status": "",
"action_impersonation_analysis": ""
}
The Sample - Fortinet Fortimail - 1.1.0 playbook collection comes bundled with the Fortinet FortiMail connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Fortinet FortiMail connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during the connector upgrade and delete.
To gain access to the FortiMail REST API and perform operations, you must enable the REST API on FortiMail, which by default is disabled.
To enable the REST API, for FortiMail releases 6.4.x and 7.0.x, use the following CLI command:
config system global
set rest-api enable
end
To enable the REST API, for FortiMail releases 7.2.x, use the following CLI command:
config system web-service
set rest-api enable
end
Additionally, to perform operations using the REST API users must also have the Access Mode "REST API" enabled.
Fortinet FortiMail is an email security gateway product that monitors email messages on behalf of an organization to identify messages that contain malicious content, including spam, malware, and phishing attempts.
This document provides information about the Fortinet FortiMail connector, which facilitates automated interactions, with your Fortinet FortiMail server using FortiSOAR™ playbooks. Add the Fortinet FortiMail connector, as a step in FortiSOAR™ playbooks and perform automated operations such as retrieving a list of all domains configured on Fortinet FortiMail and retrieving the sender blacklist and whitelist for session profiles.
Connector Version: 1.1.0
FortiSOAR™ Version Tested on: 6.4.4-3164
Fortinet FortiMail Version Tested on: v6.4.0(GA), build384, 2020.05.07
Authored By: Fortinet
Certified: Yes
Following enhancements have been made to the Fortinet FortiMail connector in version 1.1.0:
From FortiSOAR™ 5.0.0 onwards, use the Connector Store to install the connector. For the detailed procedure to install a connector, click here.
You can also use the following yum command as a root user to install connectors from an SSH session:
yum install cyops-connector-fortinet-fortimail
For the procedure to configure a connector, click here.
In FortiSOAR™, on the Connectors page, click the Fortinet FortiMail connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:
| Parameter | Description |
|---|---|
| Server URL | URL of the Fortinet FortiMail server to which you will connect and perform automated operations. |
| Username | Username of the Fortinet FortiMail server to which you will connect and perform automated operations. |
| Password | Password used to access the Fortinet FortiMail server to which you will connect and perform the automated operations. |
| Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. |
The following automated operations can be included in playbooks, and you can also use the annotations to access operations from version 4.10.0 and onwards:
| Function | Description | Annotation and Category |
|---|---|---|
| Get Domains Configured | Retrieves a list of all domains configured on Fortinet FortiMail. | get_domains Investigation |
| Get AntiSpam Profiles for Domain | Retrieves a list of all AntiSpam Profiles for a specified domain in Fortinet FortiMail, based on the domain ID you have specified. | get_antispam_domains Investigation |
| Get Recipient Policies for Domain | Retrieves a list of all Recipient Profiles for a specified domain in Fortinet FortiMail, based on the domain ID you have specified. | get_recipient_policies Investigation |
| Get GreyList | Retrieves the Greylist configured on Fortinet FortiMail. | grey_list Investigation |
| Get Auto Exempt GreyList | Retrieves the Auto Exempt Greylist configured on Fortinet FortiMail. | grey_list Investigation |
| Get Sender Whitelist For Session Profile | Retrieves a list of sender whitelists from Fortinet FortiMail, based on the profile name you have specified. | get_session_safe_list Investigation |
| Get Sender Blacklist for Session Profile | Retrieves a list of sender blacklists from Fortinet FortiMail, based on the profile name you have specified. | get_session_block_list Investigation |
| Get Profile Name | Retrieves a list of profile names from Fortinet FortiMail, based on the profile type you have specified. | get_profile_name Investigation |
| Block Sender Address | Adds an email address to the sender block list of the specified session profile, based on the profile name and email address you have specified. | block_sender_address Containment |
| Block Recipient Address | Adds an email address to the recipient block list of the specified session profile, based on the profile name and email address you have specified. | block_recipient_address Containment |
| Unblock Sender Address | Unblocks an email address by removing the specified email address from the sender block list of the specified session profile, based on the profile name and email address you have specified. | unblock_sender_address Remediation |
| Unblock Recipient Address | Unblocks an email address by removing the specified email address from the recipient block list of the specified session profile, based on the profile name and email address you have specified. | unblock_recipient_address Remediation |
| Update Block List | Updates, i.e., adds or removes items such as email addresses, domains, IP addresses from the selected block list, based on the input parameters you have specified. | update_block_list Remediation |
| Update Safe List | Updates, i.e., adds or removes items such as email addresses, domains, IP addresses from the selected safe list, based on the input parameters you have specified. | update_safe_list Remediation |
| Update Session Profile | Updates a session profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | update_session_profile Investigation |
| Update Antispam Profile | Updates an antispam profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | update_antispam_profile Investigation |
| Create Session Profile | Creates a session profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | create_session_profile Investigation |
| Create Antispam Profile | Creates an antispam profile on Fortinet FortiMail, based on the profile name and other input parameters you have specified. | create_antispam_profile Investigation |
| Delete Session Profile | Deletes a session profile from Fortinet FortiMail, based on the profile name you have specified. | delete_session_profile Investigation |
| Delete Antispam Profile | Deletes an antispam profile from Fortinet FortiMail, based on the profile name you have specified. | delete_antispam_profile Investigation |
| Get Session Profile Details | Retrieves details of a session profile from Fortinet FortiMail, based on the profile name you have specified. | get_session_profile Investigation |
| Get Antispam Profile Details | Retrieves details of an antispam profile from Fortinet FortiMail, based on the profile name you have specified. | get_antispam_profile Investigation |
None.
The output contains the following populated JSON schema:
{
"collection": [
{
"mkey": "",
"is_subdomain": "",
"ip": "",
"recipient_verification": "",
"is_association": "",
"maindomain": "",
"mxflag": "",
"is_service_domain": "",
"port": ""
}
],
"objectID": "",
"reqAction": "",
"subCount": "",
"nextPage": "",
"totalRemoteCount": "",
"remoteSorting": ""
}
| Parameter | Description |
|---|---|
| Domain | Name of the domain whose associated AntiSpam Profiles you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"objectID": "",
"reqAction": "",
"totalRemoteCount": "",
"subCount": "",
"remoteSorting": "",
"nextPage": "",
"collection": [
{
"mdomain": "",
"mkey": "",
"dictionary_type": "",
"minimum_dictionary_score": "",
"isReferenced": ""
}
]
}
| Parameter | Description |
|---|---|
| Domain | Name of the domain whose associated Recipient Profiles you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [
{
"auth": "",
"misc": "",
"mkey": "",
"status": "",
"comment": "",
"content": "",
"mdomain": "",
"pkiauth": "",
"pkiuser": "",
"antispam": "",
"antivirus": "",
"direction": "",
"groupmode": "",
"imap_auth": "",
"ldap_auth": "",
"pop3_auth": "",
"smtp_auth": "",
"profile_dlp": "",
"radius_auth": "",
"sender_type": "",
"ldap_profile": "",
"sender_domain": "",
"sender_pattern": "",
"recipient_domain": "",
"recipient_pattern": "",
"sender_email_address_group": "",
"recipient_email_address_group": ""
}
],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
None.
The output contains the following populated JSON schema:
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
None.
The output contains the following populated JSON schema:
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile whose associated sender whitelist you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"totalRemoteCount": "",
"objectID": "",
"collection": [
{
"mkey": ""
}
],
"reqAction": "",
"subCount": "",
"nextPage": "",
"remoteSorting": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile whose associated sender whitelist you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"totalRemoteCount": "",
"objectID": "",
"collection": [
{
"mkey": ""
}
],
"reqAction": "",
"subCount": "",
"nextPage": "",
"remoteSorting": ""
}
| Parameter | Description |
|---|---|
| Profile Type | Select the type of profile based on which you want to retrieve profile names from Fortinet FortiMail. You can choose between Session and Antispam. |
The output contains the following populated JSON schema if 'Session' is selected as the 'Profile Type':
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [
{
"mkey": "",
"action": "",
"isReferenced": ""
}
],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
The output contains the following populated JSON schema if 'Antispam' is selected as the 'Profile Type':
{
"nextPage": "",
"objectID": "",
"subCount": "",
"reqAction": "",
"collection": [
{
"mkey": "",
"isReferenced": "",
"dictionary_type": "",
"minimum_dictionary_score": ""
}
],
"remoteSorting": "",
"nodePermission": "",
"totalRemoteCount": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile to whose associated sender block list you want to add the specified address. |
| Sender Email Address | Email address that you want to block by adding it to the sender block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"objectID": "",
"reqAction": "",
"nodePermission": "",
"mkey": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile to whose associated recipient block list you want to add the specified address. |
| Recipient Email Address | Email address that you want to block by adding it to the recipient block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"objectID": "",
"reqAction": "",
"nodePermission": "",
"mkey": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile from whose associated sender block list you want to remove the specified address. |
| Sender Email Address | Email address that you want to unblock by removing it from the sender block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"errorType": "",
"errorMsg": "",
"objectID": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile from whose associated recipient block list you want to remove the specified address. |
| Recipient Email Address | Email address that you want to unblock by removing it from the recipient block list of the specified session profile. |
The output contains the following populated JSON schema:
{
"errorType": "",
"errorMsg": "",
"objectID": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Action | Select the action that you want to perform, i.e., whether you want to Add or Remove items from the block list. |
| List Type |
Select the block list you want to update. You can choose between System, Domain, and Personal.
|
| Items | Provide a CSV list of items, i.e., email addresses, IP addresses, or domains, that you want to update (add or remove) in the selected block list. |
The output contains the following populated JSON schema if 'Add' is selected as the 'Action':
{
"mkey": "",
"listname": "",
"objectID": "",
"listitems": "",
"reqAction": "",
"nodePermission": ""
}
The output contains the following populated JSON schema if 'Remove' is selected as the 'Action':
{
"errorMsg": "",
"objectID": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Action | Select the action that you want to perform, i.e., whether you want to Add or Remove items from the safe list. |
| List Type |
Select the safe list you want to update. You can choose between System, Domain, and Personal.
|
| Items | Provide a CSV list of items, i.e., email addresses, IP addresses, or domains, that you want to update (add or remove) in the selected safe list. |
The output contains the following populated JSON schema if 'Add' is selected as the 'Action':
{
"mkey": "",
"listname": "",
"objectID": "",
"listitems": "",
"reqAction": "",
"nodePermission": ""
}
The output contains the following populated JSON schema if 'Remove' is selected as the 'Action':
{
"errorMsg": "",
"objectID": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the profile that you want to update on Fortinet FortiMail. |
| Connection Settings | Select this option to configure the connection setting. If you select this option, then you can specify the following parameters:
|
| Sender Reputation | Select this option to configure sender reputation. If you select this option, then you can specify the following parameters:
|
| Endpoint Reputation | Select this option to configure Endpoint Reputation settings. This option allows you to restrict the ability of an MSISDN or subscriber ID to send email or MM3 multimedia messaging service (MMS) messages from a mobile device, based upon its endpoint reputation score. The MSISDN reputation score is similar to a sender reputation score. Once you select this option, you can configure the following additional parameters:
|
| Sender Validation | Select this option to configure the settings to confirm sender and message authenticity. Once you select this option, you can configure the following additional parameters:
|
| Session Settings | Select this option to configure session profiles. Once you select this option, you can configure the following additional parameters:
|
| Lists | Select this option to configure the sender and recipient block lists and safe lists, if any, to sue with the session profile. Block and safe lists are separate for each session profile and apply only to traffic controlled by the IP-based policy to which the session profile is applied. Once you select this option, you can configure the following additional parameters:
|
The output contains the following populated JSON schema:
{
"spf": "",
"dkim": "",
"mkey": "",
"queue": "",
"route": "",
"action": "",
"eom_ack": "",
"rewrite": "",
"objectID": "",
"conn_hide": "",
"domainkey": "",
"reqAction": "",
"error_free": "",
"remote_log": "",
"bounce_rule": "",
"error_total": "",
"helo_custom": "",
"hide_header": "",
"limit_NOOPs": "",
"limit_RSETs": "",
"limit_helos": "",
"splice_what": "",
"dkim_signing": "",
"limit_emails": "",
"rewrite_helo": "",
"splice_after": "",
"hide_received": "",
"splice_enable": "",
"access_control": "",
"nodePermission": "",
"sender_rewrite": "",
"block_encrypted": "",
"check_client_ip": "",
"conn_concurrent": "",
"error_increment": "",
"allow_pipelining": "",
"blacklist_enable": "",
"check_open_relay": "",
"command_checking": "",
"conn_blacklisted": "",
"limit_recipients": "",
"whitelist_enable": "",
"check_helo_domain": "",
"conn_idle_timeout": "",
"limit_header_size": "",
"recipient_rewrite": "",
"sender_reputation": "",
"check_domain_chars": "",
"check_mason_effect": "",
"conn_rate_how_many": "",
"disallow_encrypted": "",
"limit_message_size": "",
"number_of_messages": "",
"check_sender_domain": "",
"error_initial_delay": "",
"rewrite_helo_custom": "",
"sender_verification": "",
"to_blacklist_enable": "",
"to_whitelist_enable": "",
"bypass_bounce_verify": "",
"number_of_recipients": "",
"check_recipient_domain": "",
"disallow_empty_domains": "",
"remove_current_headers": "",
"session_action_msg_type": "",
"sender_reputation_reject": "",
"sender_reputation_tempfail": "",
"sender_reputation_throttle": "",
"sender_addr_rate_ctrl_state": "",
"sender_verification_profile": "",
"sender_addr_rate_ctrl_action": "",
"dkim_signing_authenticated_only": "",
"msisdn_sender_reputation_action": "",
"msisdn_sender_reputation_status": "",
"msisdn_sender_reputation_trigger": "",
"sender_reputation_throttle_number": "",
"sender_reputation_throttle_percent": "",
"sender_addr_rate_ctrl_max_recipients": "",
"msisdn_sender_reputation_blacklist_duration": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile that you want to update on Fortinet FortiMail. |
| Default Action | Select the default action that this operation should take when the policy matches. You can choose from the following actions: None, Default, Discard, Reject, System Quarantine, User Quarantine, or Tag Subject. |
| Scan Configurations | Select this option to configure the scan on Fortinet FortiMail. If you select this option, then you can configure the following parameters:
|
The output contains the following populated JSON schema:
{
"mkey": "",
"dnsbl": "",
"surbl": "",
"bayesian": "",
"greylist": "",
"objectID": "",
"scan_pdf": "",
"heuristic": "",
"imagespam": "",
"reqAction": "",
"aggressive": "",
"bannedword": "",
"dictionary": "",
"fortiguard": "",
"scanner_rbl": "",
"action_dmarc": "",
"dmarc_status": "",
"phishing_uri": "",
"scan_maxsize": "",
"spf_checking": "",
"impersonation": "",
"scanner_surbl": "",
"spam_outbreak": "",
"whitelistword": "",
"nodePermission": "",
"action_spf_fail": "",
"action_spf_none": "",
"action_spf_pass": "",
"dictionary_type": "",
"heuristic_lower": "",
"heuristic_upper": "",
"scanner_default": "",
"spf_fail_status": "",
"spf_none_status": "",
"spf_pass_status": "",
"bayesian_user_db": "",
"scanner_bayesian": "",
"action_newsletter": "",
"behavior_analysis": "",
"newsletter_status": "",
"scanner_grey_list": "",
"scanner_heuristic": "",
"action_spf_neutral": "",
"scanner_dictionary": "",
"scanner_fortiguard": "",
"scanner_image_spam": "",
"spf_neutral_status": "",
"deepheader_analysis": "",
"deepheader_check_ip": "",
"dictionary_group_id": "",
"fortiguard_check_ip": "",
"scan_bypass_on_auth": "",
"scanner_banned_word": "",
"scanner_deep_header": "",
"action_spf_soft_fail": "",
"apply_action_default": "",
"scanner_phishing_uri": "",
"spf_soft_fail_status": "",
"uri_filter_secondary": "",
"action_spf_perm_error": "",
"action_spf_temp_error": "",
"bayesian_autotraining": "",
"bayesian_usertraining": "",
"spf_perm_error_status": "",
"spf_temp_error_status": "",
"uri_filter_fortiguard": "",
"impersonation_analysis": "",
"heuristic_rules_percent": "",
"action_behavior_analysis": "",
"minimum_dictionary_score": "",
"dictionary_profile_id_new": "",
"scanner_fortiguard_blackip": "",
"action_ip_reputation_level1": "",
"action_ip_reputation_level2": "",
"action_ip_reputation_level3": "",
"action_spf_sender_alignment": "",
"action_uri_filter_secondary": "",
"ip_reputation_level1_status": "",
"ip_reputation_level2_status": "",
"ip_reputation_level3_status": "",
"spf_sender_alignment_status": "",
"uri_filter_secondary_status": "",
"action_suspicious_newsletter": "",
"suspicious_newsletter_status": "",
"action_impersonation_analysis": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Provide the Session Profile Name to Create the Profile. |
| Connection Settings | Select this option to configure the connection setting. If you select this option, then you must specify the following parameters:
|
| Sender Reputation | Select this option to configure sender reputation. If you select this option, then you must specify the following parameters:
|
| Endpoint Reputation | Select this option to configure Endpoint Reputation settings. This option allows you to restrict the ability of an MSISDN or subscriber ID to send email or MM3 multimedia messaging service (MMS) messages from a mobile device, based upon its endpoint reputation score. The MSISDN reputation score is similar to a sender reputation score. Once you select this option, you can configure the following additional parameters:
|
| Sender Validation | Select this option to configure the settings to confirm sender and message authenticity. Once you select this option, you can configure the following additional parameters:
|
| Session Settings | Select this option to configure session profiles. Once you select this option, you can configure the following additional parameters:
|
| Lists | Select this option to configure the sender and recipient block lists and safe lists, if any, to sue with the session profile. Block and safe lists are separate for each session profile and apply only to traffic controlled by the IP-based policy to which the session profile is applied. Once you select this option, you can configure the following additional parameters:
|
The output contains the following populated JSON schema:
{
"spf": "",
"dkim": "",
"mkey": "",
"queue": "",
"route": "",
"action": "",
"eom_ack": "",
"rewrite": "",
"objectID": "",
"conn_hide": "",
"domainkey": "",
"reqAction": "",
"error_free": "",
"remote_log": "",
"bounce_rule": "",
"error_total": "",
"helo_custom": "",
"hide_header": "",
"limit_NOOPs": "",
"limit_RSETs": "",
"limit_helos": "",
"splice_what": "",
"dkim_signing": "",
"limit_emails": "",
"rewrite_helo": "",
"splice_after": "",
"hide_received": "",
"splice_enable": "",
"access_control": "",
"nodePermission": "",
"sender_rewrite": "",
"block_encrypted": "",
"check_client_ip": "",
"conn_concurrent": "",
"error_increment": "",
"allow_pipelining": "",
"blacklist_enable": "",
"check_open_relay": "",
"command_checking": "",
"conn_blacklisted": "",
"limit_recipients": "",
"whitelist_enable": "",
"check_helo_domain": "",
"conn_idle_timeout": "",
"limit_header_size": "",
"recipient_rewrite": "",
"sender_reputation": "",
"check_domain_chars": "",
"check_mason_effect": "",
"conn_rate_how_many": "",
"disallow_encrypted": "",
"limit_message_size": "",
"number_of_messages": "",
"check_sender_domain": "",
"error_initial_delay": "",
"rewrite_helo_custom": "",
"sender_verification": "",
"to_blacklist_enable": "",
"to_whitelist_enable": "",
"bypass_bounce_verify": "",
"number_of_recipients": "",
"check_recipient_domain": "",
"disallow_empty_domains": "",
"remove_current_headers": "",
"session_action_msg_type": "",
"sender_reputation_reject": "",
"sender_reputation_tempfail": "",
"sender_reputation_throttle": "",
"sender_addr_rate_ctrl_state": "",
"sender_verification_profile": "",
"sender_addr_rate_ctrl_action": "",
"dkim_signing_authenticated_only": "",
"msisdn_sender_reputation_action": "",
"msisdn_sender_reputation_status": "",
"msisdn_sender_reputation_trigger": "",
"sender_reputation_throttle_number": "",
"sender_reputation_throttle_percent": "",
"sender_addr_rate_ctrl_max_recipients": "",
"msisdn_sender_reputation_blacklist_duration": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile that you want to create on Fortinet FortiMail. |
| Deafult Action | Select the default action that this operation should take when the policy matches. You can choose from the following actions: None, Default, Discard, Reject, System Quarantine, User Quarantine, or Tag Subject. |
| Scan Configurations | Select this option to configure the scan on Fortinet FortiMail. If you select this option, then you can configure the following parameters:
|
The output contains the following populated JSON schema:
{
"mkey": "",
"dnsbl": "",
"surbl": "",
"bayesian": "",
"greylist": "",
"objectID": "",
"scan_pdf": "",
"heuristic": "",
"imagespam": "",
"reqAction": "",
"aggressive": "",
"bannedword": "",
"dictionary": "",
"fortiguard": "",
"scanner_rbl": "",
"action_dmarc": "",
"dmarc_status": "",
"phishing_uri": "",
"scan_maxsize": "",
"spf_checking": "",
"impersonation": "",
"scanner_surbl": "",
"spam_outbreak": "",
"whitelistword": "",
"nodePermission": "",
"action_spf_fail": "",
"action_spf_none": "",
"action_spf_pass": "",
"dictionary_type": "",
"heuristic_lower": "",
"heuristic_upper": "",
"scanner_default": "",
"spf_fail_status": "",
"spf_none_status": "",
"spf_pass_status": "",
"bayesian_user_db": "",
"scanner_bayesian": "",
"action_newsletter": "",
"behavior_analysis": "",
"newsletter_status": "",
"scanner_grey_list": "",
"scanner_heuristic": "",
"action_spf_neutral": "",
"scanner_dictionary": "",
"scanner_fortiguard": "",
"scanner_image_spam": "",
"spf_neutral_status": "",
"deepheader_analysis": "",
"deepheader_check_ip": "",
"dictionary_group_id": "",
"fortiguard_check_ip": "",
"scan_bypass_on_auth": "",
"scanner_banned_word": "",
"scanner_deep_header": "",
"action_spf_soft_fail": "",
"apply_action_default": "",
"scanner_phishing_uri": "",
"spf_soft_fail_status": "",
"uri_filter_secondary": "",
"action_spf_perm_error": "",
"action_spf_temp_error": "",
"bayesian_autotraining": "",
"bayesian_usertraining": "",
"spf_perm_error_status": "",
"spf_temp_error_status": "",
"uri_filter_fortiguard": "",
"impersonation_analysis": "",
"heuristic_rules_percent": "",
"action_behavior_analysis": "",
"minimum_dictionary_score": "",
"dictionary_profile_id_new": "",
"scanner_fortiguard_blackip": "",
"action_ip_reputation_level1": "",
"action_ip_reputation_level2": "",
"action_ip_reputation_level3": "",
"action_spf_sender_alignment": "",
"action_uri_filter_secondary": "",
"ip_reputation_level1_status": "",
"ip_reputation_level2_status": "",
"ip_reputation_level3_status": "",
"spf_sender_alignment_status": "",
"uri_filter_secondary_status": "",
"action_suspicious_newsletter": "",
"suspicious_newsletter_status": "",
"action_impersonation_analysis": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile that you want to delete from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"objectID": "",
"errorMsg": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile that you want to delete from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"objectID": "",
"errorMsg": "",
"errorType": "",
"reqAction": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the session profile whose details you want to delete from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"spf": "",
"dkim": "",
"mkey": "",
"queue": "",
"route": "",
"action": "",
"eom_ack": "",
"rewrite": "",
"objectID": "",
"conn_hide": "",
"domainkey": "",
"reqAction": "",
"error_free": "",
"remote_log": "",
"bounce_rule": "",
"error_total": "",
"helo_custom": "",
"hide_header": "",
"limit_NOOPs": "",
"limit_RSETs": "",
"limit_helos": "",
"splice_what": "",
"dkim_signing": "",
"limit_emails": "",
"rewrite_helo": "",
"splice_after": "",
"hide_received": "",
"splice_enable": "",
"access_control": "",
"nodePermission": "",
"sender_rewrite": "",
"block_encrypted": "",
"check_client_ip": "",
"conn_concurrent": "",
"error_increment": "",
"allow_pipelining": "",
"blacklist_enable": "",
"check_open_relay": "",
"command_checking": "",
"conn_blacklisted": "",
"limit_recipients": "",
"whitelist_enable": "",
"check_helo_domain": "",
"conn_idle_timeout": "",
"limit_header_size": "",
"recipient_rewrite": "",
"sender_reputation": "",
"check_domain_chars": "",
"check_mason_effect": "",
"conn_rate_how_many": "",
"disallow_encrypted": "",
"limit_message_size": "",
"number_of_messages": "",
"check_sender_domain": "",
"error_initial_delay": "",
"rewrite_helo_custom": "",
"sender_verification": "",
"to_blacklist_enable": "",
"to_whitelist_enable": "",
"bypass_bounce_verify": "",
"number_of_recipients": "",
"check_recipient_domain": "",
"disallow_empty_domains": "",
"remove_current_headers": "",
"session_action_msg_type": "",
"sender_reputation_reject": "",
"sender_reputation_tempfail": "",
"sender_reputation_throttle": "",
"sender_addr_rate_ctrl_state": "",
"sender_verification_profile": "",
"sender_addr_rate_ctrl_action": "",
"dkim_signing_authenticated_only": "",
"msisdn_sender_reputation_action": "",
"msisdn_sender_reputation_status": "",
"msisdn_sender_reputation_trigger": "",
"sender_reputation_throttle_number": "",
"sender_reputation_throttle_percent": "",
"sender_addr_rate_ctrl_max_recipients": "",
"msisdn_sender_reputation_blacklist_duration": ""
}
| Parameter | Description |
|---|---|
| Profile Name | Name of the antispam profile whose associated details you want to retrieve from Fortinet FortiMail. |
The output contains the following populated JSON schema:
{
"mkey": "",
"dnsbl": "",
"surbl": "",
"bayesian": "",
"greylist": "",
"objectID": "",
"scan_pdf": "",
"heuristic": "",
"imagespam": "",
"reqAction": "",
"aggressive": "",
"bannedword": "",
"dictionary": "",
"fortiguard": "",
"scanner_rbl": "",
"action_dmarc": "",
"dmarc_status": "",
"phishing_uri": "",
"scan_maxsize": "",
"spf_checking": "",
"impersonation": "",
"scanner_surbl": "",
"spam_outbreak": "",
"whitelistword": "",
"nodePermission": "",
"action_spf_fail": "",
"action_spf_none": "",
"action_spf_pass": "",
"dictionary_type": "",
"heuristic_lower": "",
"heuristic_upper": "",
"scanner_default": "",
"spf_fail_status": "",
"spf_none_status": "",
"spf_pass_status": "",
"bayesian_user_db": "",
"scanner_bayesian": "",
"action_newsletter": "",
"behavior_analysis": "",
"newsletter_status": "",
"scanner_grey_list": "",
"scanner_heuristic": "",
"action_spf_neutral": "",
"scanner_dictionary": "",
"scanner_fortiguard": "",
"scanner_image_spam": "",
"spf_neutral_status": "",
"deepheader_analysis": "",
"deepheader_check_ip": "",
"dictionary_group_id": "",
"fortiguard_check_ip": "",
"scan_bypass_on_auth": "",
"scanner_banned_word": "",
"scanner_deep_header": "",
"action_spf_soft_fail": "",
"apply_action_default": "",
"scanner_phishing_uri": "",
"spf_soft_fail_status": "",
"uri_filter_secondary": "",
"action_spf_perm_error": "",
"action_spf_temp_error": "",
"bayesian_autotraining": "",
"bayesian_usertraining": "",
"spf_perm_error_status": "",
"spf_temp_error_status": "",
"uri_filter_fortiguard": "",
"impersonation_analysis": "",
"heuristic_rules_percent": "",
"action_behavior_analysis": "",
"minimum_dictionary_score": "",
"dictionary_profile_id_new": "",
"scanner_fortiguard_blackip": "",
"action_ip_reputation_level1": "",
"action_ip_reputation_level2": "",
"action_ip_reputation_level3": "",
"action_spf_sender_alignment": "",
"action_uri_filter_secondary": "",
"ip_reputation_level1_status": "",
"ip_reputation_level2_status": "",
"ip_reputation_level3_status": "",
"spf_sender_alignment_status": "",
"uri_filter_secondary_status": "",
"action_suspicious_newsletter": "",
"suspicious_newsletter_status": "",
"action_impersonation_analysis": ""
}
The Sample - Fortinet Fortimail - 1.1.0 playbook collection comes bundled with the Fortinet FortiMail connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Fortinet FortiMail connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during the connector upgrade and delete.
To gain access to the FortiMail REST API and perform operations, you must enable the REST API on FortiMail, which by default is disabled.
To enable the REST API, for FortiMail releases 6.4.x and 7.0.x, use the following CLI command:
config system global
set rest-api enable
end
To enable the REST API, for FortiMail releases 7.2.x, use the following CLI command:
config system web-service
set rest-api enable
end
Additionally, to perform operations using the REST API users must also have the Access Mode "REST API" enabled.