Information
Inline scanning is supported when the FortiGate is licensed with the FortiGuard AI-Based Sandbox Service (FAIS). It works similar to inline scanning for the FortiSandbox appliance, by holding a file up to 50 seconds for the verdict to be returned. Timed out scans can either be set to block, log, or ignore. Inline scanning can be enabled from the GUI on the Cloud Sandbox configuration page.
With FAIS, unknown malware can be detected and blocked using cloud sandboxing technology. Using inline scanning with FAIS, patient zero can also be prevented. This complements the existing antivirus signature-based detection and also acts as an additional layer of defense on top of FortiGate's AV heuristics feature.
Solution
On GUI:
Enable the FortiGate Cloud feature visibility:
1. Go to System > Feature Visibility.
2. In the Additional Features section, enable FortiGate Cloud Sandbox.
3. Click Apply.
Configure the Cloud Sandbox Fabric connector:
1. Go to Security Fabric > Fabric Connectors and double-click the Cloud Sandbox card.
2. Set the Type to FortiGate Cloud.
3. Select a Region.
4. Enable Inline scan.
5. Click OK.
Configure the antivirus profile:
1. Go to Security Profiles > AntiVirus and click Create New.
2. Set the Feature set to Proxy-based.
3. Enable the protocols to inspect.
4. Enable Send files to FortiSandbox for inspection.
5. Set the Scan strategy to Inline, and set the Action to Block.
6. Click OK.
On CLI:Disable FortiSandbox appliance and FortiSandbox Cloud:
config system fortisandbox
set status disable
end
Configure FortiGate Cloud Sandbox (example given is setting it as "Global" region):
# execute forticloud-sandbox region
0 Global
1 Europe
2 Japan
3 US
Please select cloud sandbox region[0-3]:0
Cloud sandbox region is selected: Global
Enable inline scanning for FortiGate Cloud:
config system fortiguard
set sandbox-region "Global"
set sandbox-inline-scan enable
end
Enforced on AV security profile:
config antivirus profileedit set feature-set proxyset fortisandbox-mode inlineconfig httpset fortisandbox blockendconfig ftpset fortisandbox blockendconfig imapset fortisandbox block.....end