<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA-1410 / PAN-OS 11 doesn't include many MS Root CA's in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557360#M1817</link>
    <description>&lt;P class="lia-indent-padding-left-30px"&gt;We do TLS decryption, and cutover a site to new PA-1410's running 11.0.2.&amp;nbsp; While testing MS updates on endpoints, we were getting notifications that the client couldn't contact the update server.&amp;nbsp; Looking in the decryption log, none of the calls to the MS URL's were trusted.&amp;nbsp; I looked at the default included trusted CA's from our 820's that were are moving from, and sure enough, many of the MS root CA's are not imported into PAN-OS 11.x.&amp;nbsp; I exported ones missing from our 820's and imported into the 1410's and marked them as trusted to work around this.&amp;nbsp; Why would PAN not include these?&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Here's the default trusted CA's from our 820's running 10.1:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="820.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53579i66821DD0679BC0BB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="820.png" alt="820.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Here's what was default on the 1410's:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1410.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53580i48ECD637360D7496/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1410.png" alt="1410.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Sep 2023 14:19:04 GMT</pubDate>
    <dc:creator>brucegarlock</dc:creator>
    <dc:date>2023-09-11T14:19:04Z</dc:date>
    <item>
      <title>PA-1410 / PAN-OS 11 doesn't include many MS Root CA's</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557360#M1817</link>
      <description>&lt;P class="lia-indent-padding-left-30px"&gt;We do TLS decryption, and cutover a site to new PA-1410's running 11.0.2.&amp;nbsp; While testing MS updates on endpoints, we were getting notifications that the client couldn't contact the update server.&amp;nbsp; Looking in the decryption log, none of the calls to the MS URL's were trusted.&amp;nbsp; I looked at the default included trusted CA's from our 820's that were are moving from, and sure enough, many of the MS root CA's are not imported into PAN-OS 11.x.&amp;nbsp; I exported ones missing from our 820's and imported into the 1410's and marked them as trusted to work around this.&amp;nbsp; Why would PAN not include these?&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Here's the default trusted CA's from our 820's running 10.1:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="820.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53579i66821DD0679BC0BB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="820.png" alt="820.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Here's what was default on the 1410's:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1410.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53580i48ECD637360D7496/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1410.png" alt="1410.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 14:19:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557360#M1817</guid>
      <dc:creator>brucegarlock</dc:creator>
      <dc:date>2023-09-11T14:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA-1410 / PAN-OS 11 doesn't include many MS Root CA's</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557447#M1820</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/151332"&gt;@brucegarlock&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PA &lt;EM&gt;default trusted certificate authorities&lt;/EM&gt; store is updated&amp;nbsp;&lt;SPAN&gt;in major releases.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This means, it may (or may not) have different certificates in 10.1.x and in 11.0.x&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can upload the necessary certificates to the &lt;EM&gt;device certificate store&lt;/EM&gt; and mark them as trusted.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 02:26:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557447#M1820</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-09-12T02:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: PA-1410 / PAN-OS 11 doesn't include many MS Root CA's</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557926#M1840</link>
      <description>&lt;P&gt;Yes, this is what I am doing, but what I don't understand is why those were not included as defaults like they were in the older models.&amp;nbsp; It seems like a lot of the default CA's included in previous PAN OS versions are not included on 11.x&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 12:01:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/pa-1410-pan-os-11-doesn-t-include-many-ms-root-ca-s/m-p/557926#M1840</guid>
      <dc:creator>brucegarlock</dc:creator>
      <dc:date>2023-09-14T12:01:30Z</dc:date>
    </item>
  </channel>
</rss>

