FortiMail Appliance and VM 8.0.0 wprowadza szereg nowych funkcji i usprawnień, koncentrując się na zwiększeniu bezpieczeństwa poczty elektronicznej, integracji z Microsoft 365 oraz poprawie wydajności i zarządzania systemem. W tej wersji dodano m.in. obsługę Microsoft 365 Inline Scan i Shared Mailbox Scan, skanowanie kodów QR w archiwach PDF, ponowne skanowanie wiadomości po zwolnieniu z kwarantanny oraz nowe mechanizmy ochrony załączników zabezpieczonych hasłem. Rozszerzono także możliwości integracji z SAML SSO, FortiIdentity Cloud i FortiAuthenticator, a administratorzy otrzymali nowy interfejs GUI oraz dodatkowe statystyki i monitoring systemu. Wydanie eliminuje również liczne problemy związane z analizą treści, wydajnością CPU, obsługą HA oraz bezpieczeństwem, w tym podatności typu SQL Injection, Path Traversal i ujawnienie wrażliwych informacji. Więcej informacji poniżej.
Co nowego w wersji 8.0.0:
Antispam/Content
| Feature | Description |
|---|---|
| Microsoft 365 Inline Scan | Use Microsoft Exchange Online connectors and rules to route internal/inbound/outbound emails from Microsoft 365 to FortiMail for scanning. |
| Microsoft 365 Shared Mailbox Scan | Scan shared mailboxes in Microsoft 365 for accounts with sign-in blocked. |
| Option to Send Notification via FortiMail MTA in Microsoft & Google API Mode | When FortiMail runs in Microsoft & Google API mode, customization of the header From: field in the notification email templates is not supported by default.
Use the following CLI command to change the behavior: config cloud-api setting set notify-method {api | smtp} end
|
| Password-protected Attachment Scan | Prompt the user for a password before scanning a password-protected attachment. |
| QR Code in PDF Archives | Scan QR code URL in PDF archives. |
| Quarantine Release Rescan | Under Security > Quarantine > Quarantine Control, there are now settings to re-scan email with content and DLP scans when the email is released from quarantine. |
| Office File Metadata and HTML Hidden Content Handling | CDR settings in content profiles can now be used to retain or remove Microsoft Office file metadata and HTML hidden content, such as transparent, hidden, or tiny images and text that are hard to see. |
| Access Control with From: | (Advanced management license required) Added the following CLI setting in access control receive policies to select whether to match the sender email address in the SMTP envelope (MAIL FROM:), message header (From:), or both. Default setting is envelope-from.
config policy access-control receive edit <rule_id> set sender-option {envelope-from | envelope-or-header-from | header-from} end |
| Safelisting with Reply-To: | The Reply-to: message header can now be used with the safe lists.
config antispam setting set safelist-check-reply-to {enable | disable} end |
GUI
| Feature | Description |
|---|---|
| New Administrator GUI | New framework for the administrator GUI. |
| Support SAML SSO with Separate SP for Webmail | Separate the SAML SSO SP setting so that the webmail and administrative GUI can be distinguished separately on the IdP. |
| 2FA Integration with FortiIdentity Cloud | Multi-factor authentication (MFA) tokens with FortiIdentity Cloud (formerly FortiToken Cloud) can now be used for administrator accounts. |
| Client IP Address from X-Header | HTTP X-headers can now be used to identify the original client IP address under System > Configuration > Web Service. This is useful when there is an upstream proxy or load balancer that is not transparent, and therefore the original client’s IP address is not directly visible for features such as repeat offender control. |
| Unreleased /Released Quarantine Count | Message counts for email that are released or not released from the quarantine are now shown under Monitor > Quarantine. |
| Disk Usage History | Disk usage history is now in a widget on the dashboard. |
| TLS Connection Statistics | TLS statistics are now included under FortiView. |
System
| Feature | Description |
|---|---|
| Personal Block/Safe List Size Limit and Tracking | (Advanced management license required) Control personal block/safe list size and display the usage information under Security > Block/Safe List > Personal. |
| Sender Exclusion | Sender exclusion can now be configured in recipient-based policies. |
| Secure RADIUS | RADIUS profiles now support secure (TLS) RADIUS. |
| SNMPv3 Enhancement | Added support for SNMPv3 authentication with SHA256/SHA384/SHA512 and privacy (encryption) with AES256 under System > configuration > SNMP > User. |
| Archive Action in Microsoft & Google API Mode | Archive action is now supported in Microsoft & Google API mode. |
| Disclaimer Enhancement | Mobile devices’ banner notifications for new email may include a preview of the start of the email.To avoid including the disclaimer in the preview, there are now options to convert plain text to HTML email, and for HTML email, to hide the disclaimer in the preview. |
| Regex Support in Header Manipulation | Regular expressions can now be used in header manipulation in session profiles. |
| Mail Delivery Status | New delivery status, „Delivering”, is now used. Also added the failure reason if the delivery failed. |
| Mail Delivery Status on FortiAnalyzer | Store and update the delivery status on FortiAnalyzer. |
| SED Drive Auto Lock | Enable use of the MegaRAID SafeStore „Auto Lock” feature of the RAID controller with self-encrypting drives on the FML-900G model. |
| Remote Email Archive Port Number | Port numbers are now configurable with the host name for remote email archive servers. |
| FortiAuthenticator Integration | (Server mode only) FortiMail can now connect to FortiAuthenticator for remote management of user accounts. This is useful in large deployments, so that you do not need to leave the FortiMail administrator GUI in order to create, update, delete, import, or export accounts that are stored remotely on FortiAuthenticator. |
Rozwiązane problemy:
Antispam/antivirus
| Bug ID | Description |
|---|---|
| 1165264 | Embedded URLs in PDF attachments were not detected. |
| 1172602 | EMF files were incorrectly detected as application/zip. |
| 1184804 | Wrong MIME type detection. |
| 1183090 | JPEG image files were incorrectly detected as RAR files. |
| 1200245 | When sender address rate control reached the limit and some email are in the FortiSandbox queue, FortiMail received No Result from FortiSandbox. |
| 1191454 | Replacement message action in the content profile action did not work properly. |
| 1194912 | SPF checks failed if there were unknown modifiers. |
| 1189764 | Decompressed large files were not scanned or sent to quarantine. |
| 1190142 | Content type was changed although Deliver to original host was set to Unmodified copy. |
| 1199314 | URLs in invisible HTML text were not scanned. |
| 1203450 | Antispam IP reputation did not work after FortiSandbox was disabled. |
| 1227717 | More variables were needed in the password protected attachment notification email template. |
| 1280682 | Password-protected XLS spreadsheet files were not be decrypted. |
| 1277001 | XLSX files inside of a winmail.dat file were incorrectly detected as XLS files. |
| 1212055 | Split QR codes in PDF files were not detected. |
| 1215411 | When the FortiSandbox timeout was reached, URL click protection returned an error message instead of allowing the URL according to the FortiSandbox timeout setting. |
| 1217422 | After an upgrade from FortiMail 7.6.3 to 7.6.4, if re-scan upon quarantine release was enabled, email in personal quarantines could not be release. |
| 1236369 | Color-coded URLs changed the URL format or category. |
| 1237789 | DMARC failure occurred for some valid senders. |
| 1240303 | Threat feed for a resource URL did not work properly. |
| 1240477 | URI redirect lookup did not work properly. |
| 1244117 | Content action in policy matches should have been classified as Not spam instead of Spam. |
| 1244705 | Password-protected attachment notifications should have appeared at the top of the email, not the bottom. |
| 1253486 | URLs with hyphens in PDF attachments were not parsed properly. |
| 1213884 | When the concurrent sessions were high, URI click protection did not work properly. |
| 1267062 | CDR did not work properly with some Microsoft Word files. |
| 1226744 | PDF QR code check should not have extracted embedded files. |
| 1286724 | ZIP files containing BAT files were not detected by the content filter. |
| 1283521 | Newsletter is not detected if FortiMail performs 'Expanding alias’ based on the LDAP profile query. |
Email delivery
| Bug ID | Description |
|---|---|
| 1191404 | Missing header „From:” value. |
| 1180692 | Error messages occurred when clicking the encrypted email notification link if the email had been filtered by other security solutions. |
| 1213935 | If there were multiple long recipient addresses, then the X-FEAS-BEC-Info: message header was longer than 998 characters and not folded, which violates RFC 5322 section 2.1.1. |
| 1212099 | When there were multiple recipients and multiple matching policies, some recipients may not have received the email. |
| 1237301 | Email was dropped when there was an issue with the NAS server. |
| 1239157 | In some cases, email could not be sent. The error message was:
timeout before data read, where=eom |
| 1255101 | Email delivery failed due to a DNS TXT record limit. |
| 1255737 | In some cases, email continuity did not work properly. |
System
| Bug ID | Description |
|---|---|
| 1164834 | After an upgrade to FortiMail 7.6.3, the HA group was out of synchronization. |
| 1209753 | High CPU usage was caused by DLP profiles. |
| 1173175 | Legitimate email was caught by intelligent analysis. |
| 1182035 | In some cases, while in HA mode, a block list entry could be missing |
| 1195444 | When FIPS-CC mode is enabled, LDAPS must disable the use of algorithms and TLS versions that are not FIPS-approved and certified. |
| 1198879 | When FIPS-CC mode is enabled, IBE, S/MIME, and SNMPv3 must disable the use of algorithms that are not FIPS approved and certified.. |
| 1181436 | Some disclaimer variables did not work properly. |
| 1161849 | After an upgrade from FortiMail 7.4.3 to 7.6.3, the system crashed intermittently. The error message was:
Failed to boot default entries. |
| 1189164 | Calendar sharing did not work for Microsoft Outlook. |
| 1181505 | High CPU usage occurred in some cases. |
| 1197184 | Changing banned words or dictionary profiles did not work properly. |
| 1054198 | On a primary unit in an HA group, quarantine search has intermittent issues. |
| 1277031 | Quarantine search took an abnormally long time. |
| 1274586 | Unable to remove DKIM selectors with underscores. |
| 1256422 | The most recently installed CA certificate was not effective in the CA chain. |
| 1272888 | In active-active HA mode, personal block/safe lists created during HA down time were not synchronized after HA was restored. |
| 1260258 | In some cases, quarantine release notification confirmation did not show the password input field. |
| 1217869 | An OFTP connection with FortiAnalyzer 7.4.8 requires the correct certificate option. |
| 1217884 | STARTTLS was not initiated for authentication in relay host tests under System > Mail Setting . Relay Host List. |
| 1254934 | After an upgrade from FortiMail 7.6.4 to 7.6.5 interim release, the HA group was out of sync. |
| 1235809, 1223903 | High CPU usage was caused by the PDF scan. |
| 1249685 | High CPU usage was caused by text extraction from images in the PDF scan. |
| 1227816 | After an upgrade from FortiMail 7.6.3 to 7.6.4, after the command chattr sync-disable, active-passive HA synchronization had issues. |
| 1222230 | High CPU usage occurred on FML-900F models |
| 1220666 | High CPU usage was caused by large files in the PDF scan. |
| 1228791 | High CPU usage was caused by regular expressions in the DLP scan. |
| 1098759 | After an upgrade to FortiMail 7.6.0 or 7.6.1, address books disappeared. |
| 1183070 | Unable to add line break/carriage return in replacement messages. |
| 1282440 | Address map rewriting did not comply with RFC 2047 encoding for Cyrillic display names. |
Log and report
| Bug ID | Description |
|---|---|
| 1195458 | Log reports with a comma in their name could not be generated or deleted. |
| 1248953 | After an uprade to FortiMail 7.6.4, regular expression errors were logged on every SSH login. |
| 1168320 | In antispam logs, the error message database error executing could appear. |
| 1232787 | File names were not displayed correctly in logs. |
| 1260702 | Tables were truncated in downloaded PDF reports. |
Administrator GUI/webmail
| Bug ID | Description |
|---|---|
| 1198315 | Updated the JQuery-UI version. |
| 1176950 | Under Security > URL Filter > Profile, the total number of references did not display correctly. |
| 1196837 | In ForitMail webmail, encrypted email for Zoom session links was replaced with ICS file attachments. |
| 1194351 | Character T and Z appear in FortiMail clawback timestamp for the personal quarantine report email template. |
| 1189608 | In some cases, personal quarantine search did not work properly. |
| 1272998 | When logging into the administrative GUI using SSO, the administrator access profile that was applied (admin_sso) was not the profile that had been selected. |
Common Vulnerabilities and Exposures
FortiMail 8.0.0 is no longer vulnerable to the following CVE/CWE-References.
Visit https://fortiguard.com/psirt for more information.
| Bug ID | Description |
|---|---|
| 1189174 | CWE-358: Improperly Implemented Security Check for Standard |
| 1169607 | CWE-89: Improper Neutralization of Special Elements used in an SQL Command (’SQL Injection’) |
| 1241590 | CWE-22: Improper Limitation of a Pathname to a Restricted Directory (’Path Traversal’) |
| 1202972 | CWE-358: Improperly Implemented Security Check for Standard |
| 1286744 | CWE-472: External Control of Assumed-Immutable Web Parameter |
| 1202972 | CWE-358: Improperly Implemented Security Check for Standard |
| 1173144 | CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere |
Notatki producenta: FortiMail Appliance and VM 8.0.0
Pozdrawiamy,
Zespół B&B
Bezpieczeństwo w biznesie
