...
If this is enabled and the check is skipped because the file is too big, the file is considered “clean” (like if the check was performed and found no problems). If this is disabled, then such file is considered “unclean” “suspicious/dangerous” (like if the check was performed and found a problem) and the whole package will be quarantined.
Block following ratings
The result of a check by the sandbox engine can in case of new unknown threats be one of the following values:
Low risk
Medium risk
High risk
This setting specifies, which of these results are treated as dangerous and will be blocked (quarantined). It is recommended to block medium and high risk results. Low risk is to be considered, as it can be more often a “false positive” result.
Check only selected file types
If enabled, only the selected file types (extensions) listed below are sent for inspection. If disabled, all files are sent for inspection.
It is advisable to enable and configure file extension restrictions to align with the settings and capabilities of the sandbox engine, ensuring that unnecessary files, which the sandbox is not prepared to process efficiently, are not sent for analysis.
Allowed file types (extensions)
List of file extensions (separated by line breaks) to be sent to the detection engine.
Place files of other (not allowed) types (extensions) in quarantine
If this option is enabled, files that are not of the listed types (extensions) are quarantined.
Remote access mode
Specifies whether to use HTTP or HTTPS to access the FortiSandbox API. HTTP should be used only in internal networks.
...
Using the Test button it is possible to test the access to the FortiSandbox using the parameters entered above and verify if it works.
This whole settings dialog looks like this:
...