FortiMail
FortiMail provides advanced, multi-layer protection against the full spectrum of email-borne threats
mattia1
Staff
Staff
Article Id 296951
Description

This article describes how to Configure Fortimail to detect a spoofed header from an address.

Scope FortiMail.
Solution
  1. Navigate to Profile -> Dictionary -> Dictionary -> New -> Anti-Spoofing-Header-From.

 

Dictionary profile1.PNG 

  1. Navigate to Profile -> Dictionary -> Dictionary -> Edit -> Anti-Spoofing-Header-From -> Move down to Dictionary Entries -> New -> Enter the below values and replace the domain name in regex pattern 'internal.local' with the Actual internal domain name.

 

Dictionary profile 2.PNG

 

  1. Navigate to Profile -> Antispam -> Edit/New -> The Antispam profile which is used in the matching recipient policy -> Move down to Dictionary and Expand -> Under 'With dictionary profile', choose the recently created Dictionary profile -> Choose the necessary action regarding Dictionary detection.

Antispam Profile.PNG

 

  1. Move to Policy -> Recipient Policy -> edit/new Matching recipient policy -> Move down to profiles: Under 'Antispam', choose the recently created Antispam profile.

inbound recipient policy.PNG

 

Result:

 

  1. Log details are detected:

 log Detail.PNG

 

  1. Log details accepted:

log detail legtimit.PNG

 

  1. CrossSearchlog1 Detected.

 CrossSearchlog Detected 1.PNG

 

  1. CrossSearchlog2 Accepted.

 CrossSearchlog Accepted.PNG

 

Notes

  • Dictionary profile can be used under Antispam Profile & Content Profile.
  • Recipient Policy should be reordered to accept legitimate users.
  • The Configured 'Pattern' will only match when the 'Search body' button is disabled.