<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Webmail Control via URL in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/webmail-control-via-url/m-p/245254#M290</link>
    <description>&lt;P&gt;Hi&amp;nbsp;mojunhwan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The best way of blocking naver is by application, but there are other ways as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a security rule that blocks/denies the app&amp;nbsp;&lt;SPAN&gt;naver-mail. But this rule will maybe require you to have an outgoing decrypt rule to actually see this app over ssl/443. Port 80 would be fine.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two other ways of blocking naver:&lt;/P&gt;&lt;P&gt;2. Create a FQDN address object called mail.naver.com with FQDN=mail.naver.com and put this in a security rule on destination server with action equal reset-client or reset.both.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Create a custom URL-category called "Denied URLs" and but the url *.naver.com in this URL-category. On the outgoing allowed rule for the clients add this URL-category to the URL filtering profil (in the security profile) with a Site Access set to "Block".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Kim&lt;/P&gt;</description>
    <pubDate>Tue, 08 Jan 2019 17:34:33 GMT</pubDate>
    <dc:creator>Kim_Hansen</dc:creator>
    <dc:date>2019-01-08T17:34:33Z</dc:date>
    <item>
      <title>Webmail Control via URL</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/webmail-control-via-url/m-p/245165#M289</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Can paloalto control the sending of web mail?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i want to make it impossible to send out from the webmail.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There is a service called Naver that provides web mail like Google.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;for example,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The URL for sending is as follows.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;mail.naver.com/n=111113333&amp;amp;v=f#%7B"fClass"%3A"write"%2C"oParameter"%3A%7B"orderType"%3A"new"%2C"sMailList"%3A""%7D%7D&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I created a policy using the URL category.&lt;BR /&gt;mail.naver.com/^=f#%7B"fClass"%3A"write"%2C"oParameter"%3A%7B"orderType"%3A"new"%2C"sMailList"%3A""%7D%7D&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;mail.naver.com/*=f#%7B"fClass"%3A"write"%2C"oParameter"%3A%7B"orderType"%3A"new"%2C"sMailList"%3A""%7D%7D&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I would like to set a policy that is impossible to send through the URL. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The results of the URL test were not blocked. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Using the http protocol and using 80 ports. Is it possible to implement it? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If there's anything I missed, give me some advice&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I also wonder if the gmail can also be controlled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It was not long after I started the Palo Alto firewall. I hope you understand.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 07:08:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/webmail-control-via-url/m-p/245165#M289</guid>
      <dc:creator>mojunhwan</dc:creator>
      <dc:date>2019-01-08T07:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: Webmail Control via URL</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/webmail-control-via-url/m-p/245254#M290</link>
      <description>&lt;P&gt;Hi&amp;nbsp;mojunhwan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The best way of blocking naver is by application, but there are other ways as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a security rule that blocks/denies the app&amp;nbsp;&lt;SPAN&gt;naver-mail. But this rule will maybe require you to have an outgoing decrypt rule to actually see this app over ssl/443. Port 80 would be fine.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two other ways of blocking naver:&lt;/P&gt;&lt;P&gt;2. Create a FQDN address object called mail.naver.com with FQDN=mail.naver.com and put this in a security rule on destination server with action equal reset-client or reset.both.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Create a custom URL-category called "Denied URLs" and but the url *.naver.com in this URL-category. On the outgoing allowed rule for the clients add this URL-category to the URL filtering profil (in the security profile) with a Site Access set to "Block".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Kim&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 17:34:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/webmail-control-via-url/m-p/245254#M290</guid>
      <dc:creator>Kim_Hansen</dc:creator>
      <dc:date>2019-01-08T17:34:33Z</dc:date>
    </item>
  </channel>
</rss>

