Created on 02-17-2020 12:28 AM Edited on 11-21-2024 05:59 AM By odahy
Description
This article describes that the external malware block list is a new feature introduced in FortiOS 6.2.0, which falls under the umbrella of outbreak prevention.
This feature provides another means of supporting the Antivirus Database by allowing users to add their own malware signatures in the form of MD5, SHA1, and SHA256 hashes.
This feature provides a mechanism for antivirus to retrieve an external malware hash list from a remote server and polls the hash list every minute for updates.
Support and limitations.
Malware detection using the external malware block list can be used in both proxy-based and flow-based policy inspections.
Just like FortiGuard outbreak prevention, an external dynamic block list is not supported in AV quick scan mode.
Using different types of hashes simultaneously may slow down the performance of malware scanning.
For this reason, users are recommended to only use one type of hash (either MD5, SHA1, or SHA256), not all three simultaneously.
This article describes this feature.
Scope
FortiGate.
Solution
Network topology example:
To configure the antivirus to work with an external block list:
Create the malware hash list:
The malware hash list follows a strict format in order for its contents to be valid. Malware hash signature entries must be separated into each line. A valid signature needs to follow the format below:
MD5 Entry with hash description
aa67243f746e5d76f68ec809355ec234 md5_sample1# SHA1 Entry with hash description
a57983cb39e25ab80d7d3dc05695dd0ee0e49766 sha1_sample2
SHA256 Entry with hash description
ae9bc0b4c5639d977d720e4271da06b50f7c60d1e2070e9c75cc59ab30e49379 sha256_sample1
Entry without hash description
0289b0d967cb7b1fb1451339c7b9818a621903090e0020366ab415c549212521
Invalid entries
7688499dc71b932feb126347289c0b8a_md5_sample2
7614e98badca10b5e2d08f8664c519b7a906fbd5180ea5d04a82fce9796a4b87sha256_sample3
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.