Description |
This article describes how to receive CDR logs on FortiAnalyzer and how to troubleshoot the CDR configuration on FortiGate. |
Scope | FortiAnalyzer, FortiGate. |
Solution |
Definition: Content Disarm and Reconstruction (CDR) is a security technique used to mitigate the risk of file-based attacks by sanitizing and reconstructing potentially malicious content. CDR works by removing or neutralizing potentially harmful elements from files while preserving the overall functionality and usability of the content.
The main objective of CDR is to neutralize or eliminate any embedded threats within files, such as malware, exploits, or malicious code, by removing or disabling them. This process involves analyzing the file's structure, inspecting its components, and applying various techniques to sanitize the content.
Once the potentially malicious components are disarmed, the file is reconstructed to ensure its functionality is preserved. This reconstruction process aims to maintain the file's intended purpose and behavior while eliminating any hidden threats or vulnerabilities.
This article will use an example environment.
Network diagram of the setup environment:
In this example, FortiAnalyzer is used to receive the disarmed file content. Content that can be scanned includes PDF and Microsoft Office files leaving the network on CDR-supported protocols.
This article does not cover the case of a FortiSandbox appliance as the original file destination, where the original file could be archived and can be retrieved if necessary. The FortiGate embedded CDR engine is used.
Solution:
Step 1: Configure CDR in FortiGate.
In the aim of receiving CDR logs on FortiAnalyzer, it is first necessary to configure CDR in FortiGate.
The CDR engine will use the AV security profile(s) and the protocol option mentioned in the proxy-based policy to fully inspect and analyze file content at a granular level.
Step 2: Connect FortiGate to send logs to FortiAnalyzer.
Step 3: How to see the CDR logs and download the reconstructed and disarmed files on FortiAnalyzer.
To view and download Content Disarm and Reconstruction (CDR) logs on a FortiAnalyzer (FAZ), follow these steps:
Step 4: Troubleshooting on FortiGate.
config antivirus profile edit default set inspection-mode proxy next end
If an error message is received when attempting to enable Content Disarm and Reconstruction on the AntiVirus profile, check the Proxy Options settings in the CLI Console and disable splice and clientcomfort on CDR-supported protocols:
config firewall profile-protocol-options edit default config smtp unset options splice next config HTTP unset options clientcomfort next end end
Confirm the Antivirus profile’s protocol settings under config antivirus profile:
Ensure that 'set options scan' is enabled on CDR-supported protocols. If 'set options av-monitor' is configured on a CDR-supported protocol, it overrides the config content-disarm detect-only setting (and CDR will not occur).
If the CDR configuration is correctly applied to the relevant traffic but the disarmed file is not being stored locally on the FortiAnalyzer, the following CLI command can be executed on the FortiAnalyzer:
execute log device permissions <device_id> <permission> {enable | disable}
The following options are available:
Related article: Troubleshooting Tip: FortiGate to FortiAnalyzer connectivity |