<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Service/URL category in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585645#M3101</link>
    <description>&lt;P&gt;Also the traffic I am allowing from an app perspective I see going to MS IPs using Windows-Defender-atp-endpoint but see session end as tcp-rst-from-server.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 May 2024 14:34:06 GMT</pubDate>
    <dc:creator>S_Williams901</dc:creator>
    <dc:date>2024-05-02T14:34:06Z</dc:date>
    <item>
      <title>Service/URL category</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585563#M3093</link>
      <description>&lt;P&gt;Microsoft Defender has a lot of endpoints it seems. I started a custom URL list with all the URLs needed for defender, created a policy in a global device template and said "Allow any source, any destination, using SSL, Web-Browsing, and windows defender atp app, using application default. I put the URL list I created in URL category area and didn't select a URL filter profile.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems I have users hit things outside the URL list I created. I contacted TAC and they said its because the way the policy flow is for traffic. Basically left to right in the tabs on the policy. So what is the point or URL category exactly if it wont restrict your traffic to just the URL list I created?&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 18:18:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585563#M3093</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2024-05-01T18:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Service/URL category</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585612#M3096</link>
      <description>&lt;P&gt;are users successfully accessing things or are you seeing logs for things you didn't expect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the way a rule like this works, is to allow the TCP handshake for everything that matches your first tuples: source, destination, port (you need to create a session first, before you get to the URL bit).&lt;/P&gt;
&lt;P&gt;When the HTTP GET comes around (or the SNI can be intercepted), there is another rulebase lookup for this session&lt;/P&gt;
&lt;P&gt;if the URL matches your criteria, it will hit, if it doesn't it will go further down the list to find a new match.&lt;/P&gt;
&lt;P&gt;If a match is found, that new rule will take over (and your log will reflect that after the session is finished)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;now in some cases there could be 'anomalies' that could result in weird logs:&lt;/P&gt;
&lt;P&gt;if for example the http get goes out (for a url you did not intend to hit this rule) but the server stops responding, the session will eventually die and no new rule will be used to continue the session, so the log is written on the rule that allowed the initial handshake.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There could be logical explanation why you're seeing these logs&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 08:30:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585612#M3096</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-05-02T08:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: Service/URL category</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585642#M3099</link>
      <description>&lt;P&gt;I see lots of tcp-rst-from-client, but sometimes I see a tcp-fin from a non-microsoft IP, but maybe they are redirects.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 14:04:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585642#M3099</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2024-05-02T14:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Service/URL category</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585645#M3101</link>
      <description>&lt;P&gt;Also the traffic I am allowing from an app perspective I see going to MS IPs using Windows-Defender-atp-endpoint but see session end as tcp-rst-from-server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 14:34:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/service-url-category/m-p/585645#M3101</guid>
      <dc:creator>S_Williams901</dc:creator>
      <dc:date>2024-05-02T14:34:06Z</dc:date>
    </item>
  </channel>
</rss>

