Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Alpestrian
New Contributor

Wildcard and Regular expressions in Impersonation analysis

Hello,

Can someone help me with Impersonation analysis. I need to receive email from some partners, like Salesforce for example. They send messages that hit Impersonation analysis, like that: Email Notification: Envelope From:    User.name1=mydomain.com__0-8x750xd3p4l7gk@msni3v4k8nrmq4.a-gujumaa.na72.bnc.salesforce.com Envelope To:    User.Name2@mydomain.com From:    User Name1 &lt User.Name1@mydomain.com> To:    "user.name2@mydomain.com" &lt user.name2@mydomain.com> Subject:    Approval Request The part of email address in bold is randomly generated by sender systems and uses many different sending servers. Wildcards or regular expressions in match/exemption rules doesn't work, if I  try to create rule like that: Display name pattern: * Email address: *@*.salesforce.com I get the error:


Invalid input: Failed: CMDB error!: cmdb error: -61

What would be the best way to solve this?

0 REPLIES 0
Labels
Top Kudoed Authors