Hello,
Can someone help me with Impersonation analysis. I need to receive email from some partners, like Salesforce for example. They send messages that hit Impersonation analysis, like that: Email Notification: Envelope From: User.name1=mydomain.com__0-8x750xd3p4l7gk@msni3v4k8nrmq4.a-gujumaa.na72.bnc.salesforce.com Envelope To: User.Name2@mydomain.com From: User Name1 < User.Name1@mydomain.com> To: "user.name2@mydomain.com" < user.name2@mydomain.com> Subject: Approval Request The part of email address in bold is randomly generated by sender systems and uses many different sending servers. Wildcards or regular expressions in match/exemption rules doesn't work, if I try to create rule like that: Display name pattern: * Email address: *@*.salesforce.com I get the error:
Invalid input: Failed: CMDB error!: cmdb error: -61
What would be the best way to solve this?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1845 | |
1130 | |
769 | |
447 | |
258 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.