<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Safely Enable Office 365 Using MineMeld [deprecated] in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/ta-p/120280</link>
    <description>&lt;DIV class="alert alert-warning" align="center"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Discontinuation Notice&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Microsoft &lt;A href="https://support.office.com/en-us/article/managing-office-365-endpoints-99cab9d4-ef59-4207-9f2b-3728eb46bf9a" target="_self"&gt;announced&lt;/A&gt; a new WEB Service that will deprecate the dynamic XML document used by the miners listed in this document. A new class and corresponding set of MineMeld prototypes was introduced in version 0.9.50 to deal with the new WEB Service.&lt;BR /&gt;&lt;BR /&gt;To to safely enable access to Office 365 please follow the instructions in the updated document at:&lt;BR /&gt;&lt;A title="Enable Access to Office 365 with MineMeld | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/MineMeld-Articles/How-to-Safely-Enable-access-to-Office-365-using-MineMeld-Updated/ta-p/224148" target="_self"&gt;Enable Access to Office 365 with MineMeld&lt;/A&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Overview&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;As customers migrate to Office 365 they find themselves whitelisting a range of App-IDs for the various workloads they might use in the Office 365 product sets, such as Skype for Business, OneNote, Exchange Online and so on. Because Microsoft publishes Office 365 over a huge range of URLs, and IP addresses, a security admin would be tempted to simply allow access in policies to a destination of ‘any’, and this gets complicated when the Office 365 App-IDs tend to have dependencies on explicitly allowing web-browsing and SSL. It would be preferable to configure external dynamic lists and reference that in our security policies, and as it happens, Microsoft dynamically publishes a fully up-to-date list of all IPs, URLs and ports used by each of the 17 components of Office 365 every hour that we can use! This article will take you through setting up the open source MineMeld utility to parse this data into EDLs for PAN-OS to consume, and creation of a couple of example security policies for your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1. Deploy MineMeld &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;First, visit &lt;A href="https://live.paloaltonetworks.com/t5/MineMeld/ct-p/MineMeld" target="_blank" rel="noopener"&gt;&lt;SPAN class="s2"&gt;https://live.paloaltonetworks.com/t5/MineMeld/ct-p/MineMeld&lt;/SPAN&gt;&lt;/A&gt; and select the article (from the top right) about installing and running MineMeld appropriate to your environment. Note, if using the VMWare desktop instructions (&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Articles/Running-MineMeld-on-VMWare-desktop/ta-p/72038" target="_blank" rel="noopener"&gt;&lt;SPAN class="s2"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Articles/Running-MineMeld-on-VMWare-desktop/ta-p/72038&lt;/SPAN&gt;&lt;/A&gt;) you can go ahead with the "Super fast setup" but please download the cloud-init ISO and mount it on first boot. Assuming an IP comes via DHCP and you have internet access, your VM will automatically be updated&amp;nbsp; to the latest version of Minemeld.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Make note of MineMelds IP address (from an ifconfig) as you’ll need it for the Web UI in the next step.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2. Obtain &amp;amp; Import Configuration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;MineMeld does already come with Prototypes for each of the O365 services but you would normally need to create a miner for each of these from those Prototypes, along with 3 processors and 3 outputs (one each for IPv4 addresses, IPv6 addresses and URLs respectfully).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Browse to &lt;STRONG&gt;&lt;SPAN class="s2"&gt;&lt;A href="https://Your-MM-IP-address/" target="_blank" rel="noopener"&gt;https://Your-MM-IP-address/&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; (obtained above) and sign in with the username admin and password minemeld. Next click CONFIG at the top followed by IMPORT.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6598i00B79B513A2503F2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;This will bring up the IMPORT CONFIGURATION window. Copy and paste all the text from the .yml file you downloaded in step 2 into here and click Replace (or Append, if you have already configured this instance of Minemeld for another purpose.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6599iE0222B89CCD0FD26/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Accept to replace the candidate configuration, followed by clicking the COMMIT button and waiting some time for the engine to restart.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Can't see an&amp;nbsp;IMPORT button&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="s1"&gt;?&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN class="s1"&gt;This is simply because you are using an older version of MineMeld.&amp;nbsp; If you cannot upgrade for whatever reason, follow step 2a below instead.&amp;nbsp; If not, carry on to step 3.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2a.&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Importing configuration &lt;I&gt;for an OLDER version of MineMeld only&lt;/I&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nb: Skip this step if you were able to import using the web interface as above!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;SCP&amp;nbsp;&lt;SPAN class="s1"&gt;the .yml file you downloaded in Step 2 to your MineMeld instance.&amp;nbsp;&lt;/SPAN&gt;For example, on a Mac, run the following with the default password &lt;STRONG&gt;rsplizardspock&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt;$ scp ./office365-config.yml &lt;A href="mailto:ubuntu@10.193.23.98" target="_blank" rel="noopener"&gt;ubuntu@10.193.23.98&lt;/A&gt;: &lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;To &lt;STRONG&gt;replace&lt;/STRONG&gt; the configuration of a fresh install, SSH into your MineMeld instance (again as the ubuntu user) and run the following command:&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt;$ sudo -u minemeld cp office365-config.yml /opt/minemeld/local/config/committed-config.yml&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;Or, to &lt;STRONG&gt;append&lt;/STRONG&gt; an existing configuration (ie. you have other configuration you would like to keep such as the default Spamhaus polling), run the following command or manually append the contents of office365-config.yml to the end of committed-config.yml yourself in a text editor:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;PRE&gt;&lt;SPAN class="s1"&gt;$ sudo -u minemeld cat office365-config.yml &amp;gt;&amp;gt; /opt/minemeld/local/config/committed-config.yml&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Now run the command to restart MineMeld:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt; sudo service minemeld restart&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3.&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Review Connection Graph and retrieve Feed Base URLs&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;After giving the MineMeld engine a few minutes to restart, click “Nodes” in the banner at the top of the interface and then, click any of the nodes in the list.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6600i9170E72F23ED8F0B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Then click the Graph tab (asterisk sign) to bring up the Connection Graph which should look like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6602i5453C6E26C91F681/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Here you see each of the miner nodes on the left scraping Microsoft’s dynamically updated XML File (direct link for your reference: &lt;A href="https://support.content.office.net/en-us/static/O365IPAddresses.xml" target="_blank" rel="noopener"&gt;&lt;SPAN class="s2"&gt;https://support.content.office.net/en-us/static/O365IPAddresses.xml&lt;/SPAN&gt;&lt;/A&gt;), the processor nodes that receive URLs, IPv4 and IPv6 addresses, and finally the 3 output nodes that publish a URL that your firewall can poll for an External Dynamic List (EDL).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Click each of the Output notes and make a note of the Feed Base URL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.png" style="width: 648px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6603iC847EF2544508D15/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4. Consume&amp;nbsp;MineMeld’s output&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Log into your firewall (or Panorama) and go to Objects &amp;gt; External Dynamic Lists (or Objects &amp;gt; Dynamic Block Lists if using PAN-OS prior to v7.1). Click Add and create Dynamic IP address lists and URL lists to ‘subscribe’ to each of outputs created in the previous step. &amp;nbsp;In my example below, I have created three dynamic lists matching the three Minemeld outputs above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-10-20_16-15-13.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5998i0C2DC27103673BAF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2016-10-20_16-15-13.png" alt="2016-10-20_16-15-13.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5. Create a URL Filtering Profile&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will allow you to limit your access onto to the URLs in the O365-URLs dynamic list, which you’ll apply to your security polic(ies) allowing O365 later.&amp;nbsp; Add a URL filtering profile, and block all categories &lt;EM&gt;(&lt;/EM&gt;&lt;EM&gt;hint: Click the top checkbox to select all items, then click the Action banner in the list, and then click “Set Selected Actions”, then block to block all categories at once)&lt;/EM&gt;.&amp;nbsp; Scroll to the bottom and allow &lt;STRONG&gt;only&lt;/STRONG&gt; the external dynamic list of O365 URLs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-10-20_16-27-03.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5999iF30B0E60CDCF187C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2016-10-20_16-27-03.png" alt="2016-10-20_16-27-03.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 6: Create Security Policies&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now that we have EDLs and a URL profile in place it’s time to modify/create our security policies. In the example below, we are allowing our Office 365 apps for all known users in the trust zone. The destination zone has been set to untrust zone but with the IPv4/6 lists as destination addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-10-20_16-33-14.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6001iAA722966023D4A57/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2016-10-20_16-33-14.png" alt="2016-10-20_16-33-14.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;App-IDs that you may find detected during use of Office 365 (depending on the clients and product sets being used)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;activesync&lt;/LI&gt;
&lt;LI&gt;mapi-over-http&lt;/LI&gt;
&lt;LI&gt;ms-exchange&lt;/LI&gt;
&lt;LI&gt;ms-office365&lt;/LI&gt;
&lt;LI&gt;ms-onedrive&lt;/LI&gt;
&lt;LI&gt;rpc-over-http&lt;/LI&gt;
&lt;LI&gt;soap&lt;/LI&gt;
&lt;LI&gt;ssl&lt;/LI&gt;
&lt;LI&gt;stun&lt;/LI&gt;
&lt;LI&gt;web-browsing&lt;/LI&gt;
&lt;LI&gt;webdav&lt;/LI&gt;
&lt;LI&gt;ms-office365&lt;/LI&gt;
&lt;LI&gt;office-live&lt;/LI&gt;
&lt;LI&gt;office-on-demand&lt;/LI&gt;
&lt;LI&gt;outlook-web-online&lt;/LI&gt;
&lt;LI&gt;ms-lync-online&lt;/LI&gt;
&lt;LI&gt;ms-lync-online-apps-sharing&lt;/LI&gt;
&lt;LI&gt;sharepoint-online&lt;/LI&gt;
&lt;LI&gt;ms-lync-online-file-transfer&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;What if there's still some O365 activity that is NOT hitting my new security&amp;nbsp;policy?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You may find from using&amp;nbsp;a catch-all rule with logging, that some sessions are &lt;STRONG&gt;not&lt;/STRONG&gt; hitting this O365 rule when they should be. The reason is because Microsoft use CDN networks, which are outside of the IPv4/v6 ranges Microsoft use, like CloudFront for some applications in O365. The following URL will allow you to confirm if this is the case and whether you need to widen your whitelist to allow for these CDNs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2" target="_blank" rel="noopener"&gt;https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To allow access to the CDNs that do not match the security policy above, simply create a&amp;nbsp;second security policy that allows from&amp;nbsp;trust to untrust, from the same set of applications in the previous rule, and&amp;nbsp;a destination of&amp;nbsp;&lt;STRONG&gt;any&lt;/STRONG&gt;. In the Service/URL category tab, insert the custom&amp;nbsp;URL category&amp;nbsp;from Step 5. &amp;nbsp;The FQDNs will be present in that URL category and thus match this second rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="us3_demo_paloaltonetworks_com.png" style="width: 707px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6605i9CC94AE309779873/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="us3_demo_paloaltonetworks_com.png" alt="us3_demo_paloaltonetworks_com.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jun 2025 10:31:37 GMT</pubDate>
    <dc:creator>sperich</dc:creator>
    <dc:date>2025-06-03T10:31:37Z</dc:date>
    <item>
      <title>Safely Enable Office 365 Using MineMeld [deprecated]</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/ta-p/120280</link>
      <description>&lt;DIV class="alert alert-warning" align="center"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;Discontinuation Notice&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Microsoft &lt;A href="https://support.office.com/en-us/article/managing-office-365-endpoints-99cab9d4-ef59-4207-9f2b-3728eb46bf9a" target="_self"&gt;announced&lt;/A&gt; a new WEB Service that will deprecate the dynamic XML document used by the miners listed in this document. A new class and corresponding set of MineMeld prototypes was introduced in version 0.9.50 to deal with the new WEB Service.&lt;BR /&gt;&lt;BR /&gt;To to safely enable access to Office 365 please follow the instructions in the updated document at:&lt;BR /&gt;&lt;A title="Enable Access to Office 365 with MineMeld | Palo Alto Networks" href="https://live.paloaltonetworks.com/t5/MineMeld-Articles/How-to-Safely-Enable-access-to-Office-365-using-MineMeld-Updated/ta-p/224148" target="_self"&gt;Enable Access to Office 365 with MineMeld&lt;/A&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Overview&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;As customers migrate to Office 365 they find themselves whitelisting a range of App-IDs for the various workloads they might use in the Office 365 product sets, such as Skype for Business, OneNote, Exchange Online and so on. Because Microsoft publishes Office 365 over a huge range of URLs, and IP addresses, a security admin would be tempted to simply allow access in policies to a destination of ‘any’, and this gets complicated when the Office 365 App-IDs tend to have dependencies on explicitly allowing web-browsing and SSL. It would be preferable to configure external dynamic lists and reference that in our security policies, and as it happens, Microsoft dynamically publishes a fully up-to-date list of all IPs, URLs and ports used by each of the 17 components of Office 365 every hour that we can use! This article will take you through setting up the open source MineMeld utility to parse this data into EDLs for PAN-OS to consume, and creation of a couple of example security policies for your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1. Deploy MineMeld &lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;First, visit &lt;A href="https://live.paloaltonetworks.com/t5/MineMeld/ct-p/MineMeld" target="_blank" rel="noopener"&gt;&lt;SPAN class="s2"&gt;https://live.paloaltonetworks.com/t5/MineMeld/ct-p/MineMeld&lt;/SPAN&gt;&lt;/A&gt; and select the article (from the top right) about installing and running MineMeld appropriate to your environment. Note, if using the VMWare desktop instructions (&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Articles/Running-MineMeld-on-VMWare-desktop/ta-p/72038" target="_blank" rel="noopener"&gt;&lt;SPAN class="s2"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Articles/Running-MineMeld-on-VMWare-desktop/ta-p/72038&lt;/SPAN&gt;&lt;/A&gt;) you can go ahead with the "Super fast setup" but please download the cloud-init ISO and mount it on first boot. Assuming an IP comes via DHCP and you have internet access, your VM will automatically be updated&amp;nbsp; to the latest version of Minemeld.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Make note of MineMelds IP address (from an ifconfig) as you’ll need it for the Web UI in the next step.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2. Obtain &amp;amp; Import Configuration&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;MineMeld does already come with Prototypes for each of the O365 services but you would normally need to create a miner for each of these from those Prototypes, along with 3 processors and 3 outputs (one each for IPv4 addresses, IPv6 addresses and URLs respectfully).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Browse to &lt;STRONG&gt;&lt;SPAN class="s2"&gt;&lt;A href="https://Your-MM-IP-address/" target="_blank" rel="noopener"&gt;https://Your-MM-IP-address/&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; (obtained above) and sign in with the username admin and password minemeld. Next click CONFIG at the top followed by IMPORT.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6598i00B79B513A2503F2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;This will bring up the IMPORT CONFIGURATION window. Copy and paste all the text from the .yml file you downloaded in step 2 into here and click Replace (or Append, if you have already configured this instance of Minemeld for another purpose.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6599iE0222B89CCD0FD26/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Accept to replace the candidate configuration, followed by clicking the COMMIT button and waiting some time for the engine to restart.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Can't see an&amp;nbsp;IMPORT button&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="s1"&gt;?&lt;/SPAN&gt;&lt;EM&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN class="s1"&gt;This is simply because you are using an older version of MineMeld.&amp;nbsp; If you cannot upgrade for whatever reason, follow step 2a below instead.&amp;nbsp; If not, carry on to step 3.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2a.&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Importing configuration &lt;I&gt;for an OLDER version of MineMeld only&lt;/I&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nb: Skip this step if you were able to import using the web interface as above!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;SCP&amp;nbsp;&lt;SPAN class="s1"&gt;the .yml file you downloaded in Step 2 to your MineMeld instance.&amp;nbsp;&lt;/SPAN&gt;For example, on a Mac, run the following with the default password &lt;STRONG&gt;rsplizardspock&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt;$ scp ./office365-config.yml &lt;A href="mailto:ubuntu@10.193.23.98" target="_blank" rel="noopener"&gt;ubuntu@10.193.23.98&lt;/A&gt;: &lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;To &lt;STRONG&gt;replace&lt;/STRONG&gt; the configuration of a fresh install, SSH into your MineMeld instance (again as the ubuntu user) and run the following command:&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt;$ sudo -u minemeld cp office365-config.yml /opt/minemeld/local/config/committed-config.yml&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI class="p1"&gt;&lt;SPAN class="s1"&gt;Or, to &lt;STRONG&gt;append&lt;/STRONG&gt; an existing configuration (ie. you have other configuration you would like to keep such as the default Spamhaus polling), run the following command or manually append the contents of office365-config.yml to the end of committed-config.yml yourself in a text editor:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;PRE&gt;&lt;SPAN class="s1"&gt;$ sudo -u minemeld cat office365-config.yml &amp;gt;&amp;gt; /opt/minemeld/local/config/committed-config.yml&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Now run the command to restart MineMeld:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;PRE&gt; sudo service minemeld restart&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3.&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Review Connection Graph and retrieve Feed Base URLs&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;After giving the MineMeld engine a few minutes to restart, click “Nodes” in the banner at the top of the interface and then, click any of the nodes in the list.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6600i9170E72F23ED8F0B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Then click the Graph tab (asterisk sign) to bring up the Connection Graph which should look like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6602i5453C6E26C91F681/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Here you see each of the miner nodes on the left scraping Microsoft’s dynamically updated XML File (direct link for your reference: &lt;A href="https://support.content.office.net/en-us/static/O365IPAddresses.xml" target="_blank" rel="noopener"&gt;&lt;SPAN class="s2"&gt;https://support.content.office.net/en-us/static/O365IPAddresses.xml&lt;/SPAN&gt;&lt;/A&gt;), the processor nodes that receive URLs, IPv4 and IPv6 addresses, and finally the 3 output nodes that publish a URL that your firewall can poll for an External Dynamic List (EDL).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Click each of the Output notes and make a note of the Feed Base URL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.png" style="width: 648px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6603iC847EF2544508D15/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4. Consume&amp;nbsp;MineMeld’s output&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Log into your firewall (or Panorama) and go to Objects &amp;gt; External Dynamic Lists (or Objects &amp;gt; Dynamic Block Lists if using PAN-OS prior to v7.1). Click Add and create Dynamic IP address lists and URL lists to ‘subscribe’ to each of outputs created in the previous step. &amp;nbsp;In my example below, I have created three dynamic lists matching the three Minemeld outputs above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-10-20_16-15-13.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5998i0C2DC27103673BAF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2016-10-20_16-15-13.png" alt="2016-10-20_16-15-13.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5. Create a URL Filtering Profile&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will allow you to limit your access onto to the URLs in the O365-URLs dynamic list, which you’ll apply to your security polic(ies) allowing O365 later.&amp;nbsp; Add a URL filtering profile, and block all categories &lt;EM&gt;(&lt;/EM&gt;&lt;EM&gt;hint: Click the top checkbox to select all items, then click the Action banner in the list, and then click “Set Selected Actions”, then block to block all categories at once)&lt;/EM&gt;.&amp;nbsp; Scroll to the bottom and allow &lt;STRONG&gt;only&lt;/STRONG&gt; the external dynamic list of O365 URLs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-10-20_16-27-03.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5999iF30B0E60CDCF187C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2016-10-20_16-27-03.png" alt="2016-10-20_16-27-03.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 6: Create Security Policies&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now that we have EDLs and a URL profile in place it’s time to modify/create our security policies. In the example below, we are allowing our Office 365 apps for all known users in the trust zone. The destination zone has been set to untrust zone but with the IPv4/6 lists as destination addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-10-20_16-33-14.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6001iAA722966023D4A57/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2016-10-20_16-33-14.png" alt="2016-10-20_16-33-14.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;App-IDs that you may find detected during use of Office 365 (depending on the clients and product sets being used)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;activesync&lt;/LI&gt;
&lt;LI&gt;mapi-over-http&lt;/LI&gt;
&lt;LI&gt;ms-exchange&lt;/LI&gt;
&lt;LI&gt;ms-office365&lt;/LI&gt;
&lt;LI&gt;ms-onedrive&lt;/LI&gt;
&lt;LI&gt;rpc-over-http&lt;/LI&gt;
&lt;LI&gt;soap&lt;/LI&gt;
&lt;LI&gt;ssl&lt;/LI&gt;
&lt;LI&gt;stun&lt;/LI&gt;
&lt;LI&gt;web-browsing&lt;/LI&gt;
&lt;LI&gt;webdav&lt;/LI&gt;
&lt;LI&gt;ms-office365&lt;/LI&gt;
&lt;LI&gt;office-live&lt;/LI&gt;
&lt;LI&gt;office-on-demand&lt;/LI&gt;
&lt;LI&gt;outlook-web-online&lt;/LI&gt;
&lt;LI&gt;ms-lync-online&lt;/LI&gt;
&lt;LI&gt;ms-lync-online-apps-sharing&lt;/LI&gt;
&lt;LI&gt;sharepoint-online&lt;/LI&gt;
&lt;LI&gt;ms-lync-online-file-transfer&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;What if there's still some O365 activity that is NOT hitting my new security&amp;nbsp;policy?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You may find from using&amp;nbsp;a catch-all rule with logging, that some sessions are &lt;STRONG&gt;not&lt;/STRONG&gt; hitting this O365 rule when they should be. The reason is because Microsoft use CDN networks, which are outside of the IPv4/v6 ranges Microsoft use, like CloudFront for some applications in O365. The following URL will allow you to confirm if this is the case and whether you need to widen your whitelist to allow for these CDNs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2" target="_blank" rel="noopener"&gt;https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To allow access to the CDNs that do not match the security policy above, simply create a&amp;nbsp;second security policy that allows from&amp;nbsp;trust to untrust, from the same set of applications in the previous rule, and&amp;nbsp;a destination of&amp;nbsp;&lt;STRONG&gt;any&lt;/STRONG&gt;. In the Service/URL category tab, insert the custom&amp;nbsp;URL category&amp;nbsp;from Step 5. &amp;nbsp;The FQDNs will be present in that URL category and thus match this second rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="us3_demo_paloaltonetworks_com.png" style="width: 707px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6605i9CC94AE309779873/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="us3_demo_paloaltonetworks_com.png" alt="us3_demo_paloaltonetworks_com.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2025 10:31:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/ta-p/120280</guid>
      <dc:creator>sperich</dc:creator>
      <dc:date>2025-06-03T10:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/129544#M462</link>
      <description>&lt;P&gt;i,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have installed Minemild and I applied article and create dbl for Offcie365:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Articles/How-to-Safely-Enable-access-to-Office-365-using-MineMeld/ta-p/120280" target="_blank"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Arti&lt;WBR /&gt;cles/How-to-Safely-Enable-access-to-Office-365-usi&lt;WBR /&gt;...&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have cretate 2 rules for Office 365 to test if feed sources Office 365 works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a rule to match with feed list office 365 servers and application Office365 and all traffic should match with this rule. And I have below this rule other rule with destination "any" and application Office 365.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Log shows traffic match with 2 rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;That means there are IPs that are not in the sources provided by Minemeld.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the other hand, System Log Pa-500 shows this message:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;'EBL(O365-IPV4) Refresh Aborted. No changes to list file&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what's mean this message? Is an error ?&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_16.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6550i7AB2218732317CD8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_16.png" alt="Screenshot_16.png" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_15.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6551i0BBD681C47516DA6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_15.png" alt="Screenshot_15.png" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_14.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6548i119B5920B032E463/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_14.png" alt="Screenshot_14.png" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_13.png" style="width: 346px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6549i9069DF1B2C7A2501/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_13.png" alt="Screenshot_13.png" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;img /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline"&gt;&lt;img /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 11:12:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/129544#M462</guid>
      <dc:creator>Sistemas_SanLucar</dc:creator>
      <dc:date>2016-11-29T11:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/129840#M463</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Sistemas_SanLucar,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your reply. Yup, that traffic that doesnt match the first rule will be attempts by O365 apps to access resources hosted on CDNs which are outside of those IP ranges. &amp;nbsp;I just updated the instructions above to add a second security policy in this instance, please let me know how you get on.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the log, it could be that Minemeld is not reachable at the time a refresh is supposed to happen from the PA-500 or it could be that there were no differences between the currently committed and the 'latest' version from MM? Do you get the log for all 3 outputs or just one?&amp;nbsp;When you test connectivity in the EDL edit screen does that work?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 13:30:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/129840#M463</guid>
      <dc:creator>sperich</dc:creator>
      <dc:date>2016-11-30T13:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/130594#M464</link>
      <description>&lt;P&gt;Hi Sperich,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this article was very helpful and all works like a charm. We has so much issues caused by the dynamic IP-Addresses and added / removed URLs by Microsoft. This Tools and you guideline helps us out and user acceptance is getting better and better!&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 12:13:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/130594#M464</guid>
      <dc:creator>enssenje</dc:creator>
      <dc:date>2016-12-02T12:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/148048#M465</link>
      <description>&lt;P&gt;Recently started using Minemeld to help with our Office 365 deployment. &amp;nbsp;Word of caution when using the URL list for an allow category.&lt;/P&gt;
&lt;P&gt;These URLs below are all in the office365_officeMobile node list and we didn't want to "allow" access to any of them. &amp;nbsp;Review the lists from Minemeld and make sure they match what you are trying to do in your environment. &amp;nbsp;Is there an easy way to exclude an indicator from a list? &amp;nbsp;I see a way to whitelist, but not blacklist?&lt;/P&gt;
&lt;P&gt;accounts.google.com&lt;BR /&gt;mail.google.com&lt;BR /&gt;&lt;A href="http://www.googleapis.com" target="_blank"&gt;www.googleapis.com&lt;/A&gt;&lt;BR /&gt;api.login.yahoo.com&lt;BR /&gt;social.yahooapis.com&lt;BR /&gt;&lt;A href="http://www.dropbox.com" target="_blank"&gt;www.dropbox.com&lt;/A&gt;&lt;BR /&gt;api.dropboxapi.com&lt;BR /&gt;app.box.com&lt;BR /&gt;m.facebook.com&lt;BR /&gt;graph.facebook.com&lt;BR /&gt;&lt;A href="http://www.evernote.com" target="_blank"&gt;www.evernote.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.wunderlist.com" target="_blank"&gt;www.wunderlist.com&lt;/A&gt;&lt;BR /&gt;a.wunderlist.com&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:42:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/148048#M465</guid>
      <dc:creator>JayD</dc:creator>
      <dc:date>2017-03-16T14:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/148060#M466</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/24179"&gt;@JayD&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;best solution would be to only allow a specific subset of app-ids to the URL listed in the feeds.&lt;/P&gt;
&lt;P&gt;On MineMeld you can use whitelists to remove indicators from the feed. If you create a whitelist for URLs based on stdlib.listURLGeneric with a name starting with "wl" and attach it to office365_URLaggregator. There you can list the indicators you want to remove from the feed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 15:04:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/148060#M466</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-03-16T15:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/148072#M467</link>
      <description>&lt;P&gt;Great, thanks for the quick reply. &amp;nbsp;I guess I assumed Whitelist was to add something to the feed but after reading a little I see how I can use it to get rid of the URLs in question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did try the app-id, and it worked fine, but there was no idication to my users on why they could not get the link, just a page does not load, which then generates calls to the helpdesk. &amp;nbsp;If they get the URL block page, then they usually don't argue too much.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again!!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 15:38:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/148072#M467</guid>
      <dc:creator>JayD</dc:creator>
      <dc:date>2017-03-16T15:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/151450#M468</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've setup minemeld to gather all URLs for All - Office365 apps.&lt;/P&gt;
&lt;P&gt;I have in the FW two rules.&lt;/P&gt;
&lt;P&gt;1. Allow office-apps + Dest: any + EDL URL from Minemeld&lt;/P&gt;
&lt;P&gt;2. Allow office-apps + Dest: any&amp;nbsp;&amp;nbsp; (to catch traffic not matchig the #1) this one should be removed later&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By reading the blog, I thought that by using EDL-URLs I could spare the EDL-IPs story. But here we are, my rule #2 catchs some connections like:&lt;/P&gt;
&lt;P&gt;app: ms-onedrive-base , dest-IP: 40.77.226.246, but not matching any URL from minemeld.... I wonder why...&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;app: ms-lync-base, dest-IP: 52.112.194.77, but not matching any URL from minemeld... I wonder why again....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it because the EDL-URLs list is incomplete, or is it because the FW cannot see the URL inside the packets?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;THanks for any explanation,&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2017 10:37:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/151450#M468</guid>
      <dc:creator>CNS-SUPPORT</dc:creator>
      <dc:date>2017-04-06T10:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/152195#M469</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27942"&gt;@CNS-SUPPORT&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;it could be that part of those protocols are not web based and there is no URL to match. Have you enabled URL Filtering logging on policy #2 to track the URLs that didn't match #1 ?&lt;/P&gt;
&lt;P&gt;Note that security policy in #6 use both IP and URL for matching.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Luigi&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2017 15:04:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/152195#M469</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-04-11T15:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/152510#M470</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to import only "product name = o365" &amp;nbsp;in the list of&amp;nbsp;&lt;A href="https://support.content.office.net/en-us/static/O365IPAddresses.xml" target="_blank"&gt;https://support.content.office.net/en-us/static/O365IPAddresses.xml&lt;/A&gt; ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Product name = ProPlus" and &amp;nbsp;"product name = OfficeMobile" is not required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Naoya&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 10:49:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/152510#M470</guid>
      <dc:creator>NaoyaToida</dc:creator>
      <dc:date>2017-04-13T10:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/152670#M471</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/33032"&gt;@NaoyaToida&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;to achieve that you can just remove all the O365 miners from the O365 configs except for office365_O365. That miner only retrieves IPs and URLs of the product o365.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 11:05:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/152670#M471</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-04-14T11:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/153596#M472</link>
      <description>&lt;P&gt;hi Luigi-san&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for message.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would you teach me how to implement it concretely ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Naoya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2017 11:57:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/153596#M472</guid>
      <dc:creator>NaoyaToida</dc:creator>
      <dc:date>2017-04-21T11:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/153771#M473</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/33032"&gt;@NaoyaToida&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;please, could you open a new discussion under MineMeld discussions ? I will then show you how to change the config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;luigi&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 06:39:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/153771#M473</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-04-24T06:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/158009#M474</link>
      <description>&lt;P&gt;While configuring this with an enterprise account I came across another application that I had to add that wasn't on the initial list in this article.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;office365-enterprise-access&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If memory serves me correctly this application was added relatively recently to deliniate between enterprise and consumer level accounts of Office365.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2017 03:47:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/158009#M474</guid>
      <dc:creator>mfrance</dc:creator>
      <dc:date>2017-05-24T03:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/158252#M475</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37286"&gt;@mfrance&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;good point ! Thanks !&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2017 05:47:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/158252#M475</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-05-25T05:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/209245#M476</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Microsoft have sent out an early warning about a change to how Office 365 IP Addresses and URLs are published (&lt;STRONG&gt;will this Method still be valid or can it be rewritten to collect Office365 Addresses still via MineMeld???&lt;/STRONG&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;We’re making changes to Office 365 IP Address range and URL publication&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MC133236&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Plan For Change&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Published On : April 2, 2018&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We're making some changes to how Office 365 IP Addresses and URLs are published. Starting today, we're providing the data on new REST based Web Services and on October 2nd, we will stop publishing the &lt;A href="https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2" target="_blank"&gt;previous HTML, XML, and RSS format of this data&lt;/A&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How does this affect me?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;This data is commonly used by customers for configuring firewalls, proxy servers, and related networking equipment for optimal connectivity to Office 365. If you are using this data today for device configuration and you don't move to the new IP/URL web services then new servers added for Office 365 may not be accessible to your users. These updates typically occur once a month.&lt;BR /&gt;&lt;BR /&gt;If you are not configuring firewalls, proxy servers or related networking equipment, in this way, you can safely ignore this message.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What do I need to do to prepare for this change?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;If you are not using the Office 365 IP Addresses and URLs now, no action is required. &lt;BR /&gt;&lt;BR /&gt;If you are using the Office 365 IP Addresses and URLs to make monthly updates to your firewalls, proxy servers, or other networking devices, then we encourage you to review the new IP/URL Web Services so that you can migrate any process you have related to this data.&lt;BR /&gt;&lt;BR /&gt;Please click Additional Information to learn more.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://aka.ms/ipurlblog" target="_blank"&gt;Additional information&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 13:29:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/209245#M476</guid>
      <dc:creator>enssenje</dc:creator>
      <dc:date>2018-04-09T13:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/209246#M477</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/14345"&gt;@enssenje&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the Palo Alto Networks MineMeld core team is aware of this announcement an a tracking issue is available at &lt;A href="https://github.com/PaloAltoNetworks/minemeld-core/issues/267" target="_self"&gt;https://github.com/PaloAltoNetworks/minemeld-core/issues/267&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No new miner classes need to coded to pool from these new Office API entry points. Just new prototypes.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 13:36:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/209246#M477</guid>
      <dc:creator>xhoms</dc:creator>
      <dc:date>2018-04-09T13:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/209250#M478</link>
      <description>&lt;P&gt;Thanks for the quick response. I will keep an eye on the Issue Tracker!&lt;/P&gt;</description>
      <pubDate>Mon, 09 Apr 2018 14:08:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/209250#M478</guid>
      <dc:creator>enssenje</dc:creator>
      <dc:date>2018-04-09T14:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/210481#M480</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Following this instructions blocks traffic to office365 in my environement. It looks like many of the url:s are being categorized as not 365 url:s (the Url filter I created from minemeld) but&amp;nbsp;others.&amp;nbsp;Here you can see that traffic for application ms teams url is catgegorized as internet-communications-and-telephony. &amp;nbsp;And since the url filters is set to block all categories but the EDL from minemeld traffic is denied. What am I doing wrong?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14768i04848584E5B014AE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="policy.jpg" alt="policy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks, Mikael&lt;/P&gt;</description>
      <pubDate>Tue, 17 Apr 2018 10:09:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/210481#M480</guid>
      <dc:creator>mgusta</dc:creator>
      <dc:date>2018-04-17T10:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to Safely Enable access to Office 365 using MineMeld</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/219122#M481</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/12792"&gt;@mgusta&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had a similar experience and was confused until I read this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If a URL that is included in an external dynamic list is also included in a custom URL category, or &lt;A class="xref" title="" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/url-filtering-concepts/block-and-allow-lists#ide877dd1a-8fcd-44bb-9670-fd54c87b77ef" target="_self" data-scope="local" data-format="dita" data-type=""&gt;Block and Allow Lists&lt;/A&gt; , the action specified in the custom category or the block and allow list will take precedence over the external dynamic list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;found in &lt;A href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/use-an-external-dynamic-list-in-a-url-filtering-profile" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/use-an-external-dynamic-list-in-a-url-filtering-profile&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since I had custom URLs for Office365 already, the Minemeld EDL feed did not take precidence.&amp;nbsp; To facilitate the migration, I had to add my prexisting custom URL categories (where overlap occurred) to the allowed URL Filtering Policy rather than "block" for all.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jun 2018 15:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/safely-enable-office-365-using-minemeld-deprecated/tac-p/219122#M481</guid>
      <dc:creator>drdowns</dc:creator>
      <dc:date>2018-06-25T15:31:42Z</dc:date>
    </item>
  </channel>
</rss>

