Description
This article describes how to configure automation stitches for the Fortinet Security Fabric.
Each automation pairs an event trigger and one or more actions, which allows for monitoring of the network and taking appropriate action when the Security Fabric detects a threat.
Use automation stitches to detect events from any source in the Security Fabric and apply actions to any destination.

In this example, the following automation stitches are created:
Scope
FortiGate.
Solution
To create the automation stitches:
Example configuration in the CLI:
config system automation-stitch
edit "Compromised-IP-Banned"
set trigger "Compromised Host"
config actions
edit 1
set action "IP Ban"
set delay <0-3600s> <----- Optional.
set required enable
next
end
next
end
Note:
Delay can also be configured between the automation-stitch action. Once the automation-stitch is triggered, it will implement the set action after the delay timer. If multiple actions are in place, the set delay per action will be implemented depending on the action sequence.
Set 'Action' to 'Email Notification', select 'Apply' and select 'OK'.
Example configuration in the CLI:
config system automation-stitch
edit "HA-failover"
set trigger "HA Failover"
config actions
edit 1
set action "Email Notification"
set required enable
next
end
set destination "HA-failover"
next
end



The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.