?

Fortinet Configuration

FortiGate Configuration Guide for Malware Patrol Threat Intel Feeds

FortiGate NGFW delivers industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can weave security deep into the hybrid IT architecture and build security-driven networks to achieve:

  • Ultra-fast security, end to end
  • Consistent real-time defense with FortiGuard Services
  • Excellent user experience with security processing units
  • Operational efficiency and automated workflows

Malware Patrol offers (5) feeds formatted for integration into the FortiGate Security Fabric (External Connectors/Threat Feeds). Customers can choose the feed(s) that meet their needs:

  • DNS-over-HTTPS (DoH) Servers (domains)
  • Malicious Domains
  • Malicious Hashes
  • Malicious IPs
  • Malware/Ransomware URLs

We have written this FortiGate configuration guide for both connecting and enabling protection with Malware Patrol feeds. Please note that some of the functionalities covered in this guide require a subscription, such as FortiGuard AntiVirus for using Malicious Hashes.

Also, following the instructions in the FortiGate Administration Guide, we have mostly modified default settings and policies whenever adding Malware Patrol’s feeds. For logging or other purposes you may wish to create new ones instead. Additional resources are included at the end of this guide, including a link to FortiGate’s manual.

Adding External Threat Data Feeds – A FortiGate Configuration Guide

1) From inside the FortiGate interface, select Security Fabric > External Connectors. For this configuration guide, we have already added the Malware Patrol Malicious Hashes feed as an example, seen below.

2) Click Create New

Step 2 in the Malware Patrol Fortinet Configuration Guide

3) Scroll down to Threat Feeds section

Step 3 in the Malware Patrol Fortinet Configuration Guide

4) Select feed type to be added. Options are:

a. FortiGuard Category (for URL lists)
b. IP Address
c. Domain Name (for this example)
d. Malware Hash

Step 4 in the Malware Patrol Fortinet Configuration Guide

5) Complete the following in the fields on the next page:

  • Feed name: We will use Malware Patrol Malicious Domains
  • URL: You can find the URL of the Malware Patrol Malicious Domains data feed in the evaluation or customer portal
  • Login credentials: Username and password for Malware Patrol evaluation or customer portal
  • Refresh rate: We use 61 minutes as our feeds are updated hourly

Step 5 in the Malware Patrol Fortinet Configuration Guide

6) Click OK to save. You will now see the new feed added to the list of connectors.

Step 6 in the Malware Patrol Fortinet Configuration Guide

7) Click Create New to add any additional feed(s) you have. Instructions for each are the same as the previous example. For the examples in this how-to, we use the names below:

a. FortiGuard Category (for URL lists) – Malware Patrol Malicious URLs
b. IP Address – Malware Patrol Malicious IPs
c. Domain Name – Malware Patrol Malicious Domains
d. Malware Hash – Malware Patrol Malicious Hashes

8) Click the refresh button and hover over any feed to see details, including number of valid/invalid entries

Step 8 in the Malware Patrol Fortinet Configuration Guide

9) Click View Entries to see the feed’s entries

Step 9 in the Malware Patrol Fortinet Configuration Guide

Adding IP data feeds to firewall policies

1) Navigate to Policy & Objects > Firewall Policy

2) Click Create New

Step 2 in Adding IP data feeds to firewall policies in the Malware Patrol Fortinet Configuration Guide

3) Complete the following in the fields on the next page:

  • Name: We will use Malware Patrol IP Deny List
  • Select incoming and outgoing interfaces: per your needs/environment
  • Source: All
  • Destination: Malware Patrol Malicious IPs list (menu appears on right, scroll down)
  • Schedule: Always
  • ServiceAll
  • Action: Deny

Step 3 in Adding IP data feeds to firewall policies in the Malware Patrol Fortinet Configuration Guide

4) Click OK to save. New policy will appear in list

Step 4 in Adding IP data feeds to firewall policies in the Malware Patrol Fortinet Configuration Guide

FortiGate policy details: https://docs.fortinet.com/document/fortigate/7.0.2/administration-guide/118003/policies

FortiGate video: https://youtu.be/dpvlQ0xU2NU

Adding an external malware blocklist (hashes) to the AntiVirus

1) Navigate to Security Profiles > AntiVirus

2) Click to edit the default profile

Step 2 in Adding an external malware blocklist (hashes) to the Antivirus in the Malware Patrol Fortinet Configuration Guide

3) Enable Use external malware block list (toward bottom of page). Also enable Quarantine if desired.

4) Select ‘Specify’ in the Virus Outbreak Prevention

Step 4 in Adding an external malware blocklist (hashes) to the Antivirus in the Malware Patrol Fortinet Configuration Guide

5) Click the + and select the Malware Patrol Malicious Hashes feed from the menu

Step 5 in Adding an external malware blocklist (hashes) to the Antivirus in the Malware Patrol Fortinet Configuration Guide

Step 5.2 in Adding an external malware blocklist (hashes) to the Antivirus in the Malware Patrol Fortinet Configuration Guide

6) Click OK to save

FortiGate AntiVirus details: https://docs.fortinet.com/document/fortigate/7.0.2/administration-guide/913906/external-blocklist-file-hashes

Adding a URL blocklist to the web filter

1) Navigate to Security Profiles > Web Filter

2) Click to edit the default profile

Step 2 in Adding a URL blocklist to the web filter in the Malware Patrol Fortinet Configuration Guide

3) Select Malware Patrol Malicious URLs from FortiGuard Category Based Filter menu

Step 3 in Adding a URL blocklist to the web filter in the Malware Patrol Fortinet Configuration Guide

4) Right click on Disable and select Block from dropdown menu

Step 4 in Adding a URL blocklist to the web filter in the Malware Patrol Fortinet Configuration Guide

Step 4.1 in Adding a URL blocklist to the web filter in the Malware Patrol Fortinet Configuration Guide

5) Click OK to save

FortiGate Web Filter details: https://docs.fortinet.com/document/fortigate/7.0.2/administration-guide/833698/web-filter

 

Adding a domain blocklist to the DNS filter

1) Navigate to Security Profiles > DNS Filter

2) Double click to edit the default profile

Step 2 in Adding a domain blocklist to the DNS filter in the Malware Patrol Fortinet Configuration Guide

3) Select Malware Patrol Malicious Domains from FortiGuard Category Based Filter menu (scroll down to Remote Categories section)

Step 3 in Adding a domain blocklist to the DNS filter in the Malware Patrol Fortinet Configuration Guide

4) Right click on Allow and select Redirect to Block Portal from dropdown menu

Step 4 in Adding a domain blocklist to the DNS filter in the Malware Patrol Fortinet Configuration Guide

Step 4.1 in Adding a domain blocklist to the DNS filter in the Malware Patrol Fortinet Configuration Guide

5) Click OK to save

FortiGate DNS Filter details: https://docs.fortinet.com/document/fortigate/7.0.2/administration-guide/605868/dns-filter

Additional resources

FortiGate Administration Guide: https://docs.fortinet.com/document/fortigate/7.0.2/administration-guide/954635/getting-started

FortiGate Administration Guide, threat data feeds: https://docs.fortinet.com/document/fortigate/7.0.2/administration-guide/9463/threat-feeds

Excellent walk-through video for adding and enabling external threat feeds: Configure and use 3rd Party threat feeds on a FortiGate Firewall by GraniteDan https://youtu.be/CarI6_URN90

If you need any assistance with this FortiGate configuration guide, please email support (@) malwarepatrol.net or contact your Account Manager.

?