FortiMail 6.2.0 has been approved and is being distributed to the support site. This release adds several new features including:
MS Office 365 Active Threat Remediation
FortiMail can now perform post-delivery on-demand scan of the email on MS Office 365 out of band using the MS Graph API (License required). Real-time scan will be added in future releases.
FortiMail is now able to participate in the security fabric with FortiIsolator. FortiMail can rewrite URLs on a per category basis to FortiIsolator for zero trust browser isolation.
Fortinet Security Fabric
Added support for the new security fabric integration using in FortiOS 6.2. Note that
previous integration with FortiOS 6.0 is no longer supported.
In order to comply with compliance standards such as GDPR, the following new features
have been added:
- Detailed log of all configuration changes
- Detailed log of all actions performed by an admin user on queues and quarantines
- Log of all search terms used
GeoIP database can be used in IP policies for geography-based filtering. Also displays the
GeoIP information on the GUI / log embellishment.
Support for DLP filtering based on attachment metadata.
TLS 1.3 support
Starting from 6.2 release, TLS 1.3 is supported for HTTPS access to FortiMail. SSO support In addition to webmail, SSO is also supported on admin GUI logon now.
New variables in email template
The Envelope From address and the Message-ID attribute can now be added as a variable in the quarantine report template.
Local host and local domain variables can be added in the email notification template.
The variable %%MESSAGE_ID%% is renamed to %%EMAIL_ID%% to avoid confusion.
The email ID is assigned by FortiMail to the quarantined email while the message ID is the standard message ID in the email header.
As part of this release, a new licensing has been introduced to cover the newly added feature:
FortiMail for Office 365 - Office365 API Integration Service, available on FortiMail 400F / FortiMail VM02 and above
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.