Tenant control
In this example, tenant control is configured for Microsoft in the inline CASB profile for the fortinet-us.com domain.
To configure an inline CASB profile with tenant control in the GUI:
-
Configure the inline CASB profile:
-
Go to Security Profiles > Inline-CASB and click Create new.
-
Enter a Name, such as microsoft_test.
-
In the SaaS Applications table, click Create new. The Create SaaS Application Rules pane opens.
-
Search Microsoft and select the Microsoft application, then click Next.
-
Enable Tenant control. Click the + and enter fortinet-us.com.
-
Click OK to save the rule.
-
Click OK to save the CASB Profile.
-
-
Configure the firewall policy:
-
Go to Policy & Objects > Firewall Policy. Edit an existing policy, or create a new one.
-
Set the Inspection Mode to Proxy-based.
-
In the Security Profiles section, enable Inline-CASB and select the microsoft_test profile.
-
Set the SSL Inspection profile to one that uses deep inspection.
-
Configure the other settings as needed.
-
Click OK.
-
To configure an inline CASB profile with tenant control in the CLI:
-
Configure the inline CASB profile:
config casb profile edit "microsoft_test" config saas-application edit "microsoft" set tenant-control enable set tenant-control-tenants "fortinet-us.com" next end next end -
Configure the firewall policy:
config firewall policy edit 8 set name "casb_test_microsoft" set srcintf "port1" set dstintf "port3" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "ssl" set casb-profile "microsoft_test" set nat enable next end
To test the configuration:
-
Open a browser and attempt to log in to Microsoft Office 365 with a fortinet-us.com account.
-
Since the domain is valid, the user can log in successfully.
-
Attempt to log in to Microsoft Office 365 with another account with a different domain.
-
The domain is invalid. The user is unable to log in, and an error message appears: Your network administrator has blocked access.
Sample log:
1: date=2026-04-08 time=09:33:27 eventtime=1775666006955935136 tz="-0700" logid="2500010002" type="utm" subtype="casb" eventtype="casb" level="information" vd="root" policyid=8 poluuid="23fa6e58-fd3a-51f0-fcba-755a1c0b5610" sessionid=484445 srcip=13.13.13.13 dstip=20.190.190.130 srcport=59380 dstport=443 srcintf="port1" srcintfrole="undefined" srcuuid="1c9e034e-72bc-51f0-4866-42e7eacff7bb" dstintf="port3" dstintfrole="undefined" dstuuid="70b43f6e-1e2b-51f1-c748-c3c24466ed2e" proto=6 url="https://login.microsoftonline.com/common/login" action="monitor" profile="microsoft_test" saasapp="microsoft" useractivity="microsoft-tenant-control" operation="tenant" subaction="monitor" tenantmatch="missed" activitycategory="tenant-control" msg="CASB access was monitored because it contained activity."