<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft WNS App ID in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237662#M6278</link>
    <description>&lt;P&gt;That fixed it for us&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/700108745"&gt;@I.Stevkovski&lt;/a&gt;! Thank you!&lt;/P&gt;</description>
    <pubDate>Wed, 10 Sep 2025 16:19:43 GMT</pubDate>
    <dc:creator>treeef</dc:creator>
    <dc:date>2025-09-10T16:19:43Z</dc:date>
    <item>
      <title>Microsoft WNS App ID</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1234220#M6101</link>
      <description>&lt;P&gt;I work with a network scenario where we have two firewall towards the internet and the desktop PCs are behind PaloAlto as perimeter and Cisco as internal firewall, so we can compare the same traffic whether it is identified properly or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems that PaloAlto has some problem identifying traffic from Windows Push Notification Service. Not all the sessions are properly identified, many of them are simply noted as unknown-tcp. Cisco doesn't seem to have a problem, i t is logged as Microsoft WNS, but Palo Alto does. Briefly I turned off SSL Decryption and maybe more sessions have been identified this way, but is it that much difficult to have App Signature for such a widespread application? Is it OK to allow unknown-tcp traffic to pass through? Why is it risk level 1?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone else has encountered such problem? And please share your experiance.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jul 2025 06:26:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1234220#M6101</guid>
      <dc:creator>I.Stevkovski</dc:creator>
      <dc:date>2025-07-17T06:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft WNS App ID</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237581#M6273</link>
      <description>&lt;P&gt;Same exact issue here. No resolution on this end, unfortunately. I'm grabbing IPs from&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows/apps/develop/notifications/push-notifications/firewall-allowlist-config" target="_blank"&gt;https://learn.microsoft.com/en-us/windows/apps/develop/notifications/push-notifications/firewall-allowlist-config&lt;/A&gt;&amp;nbsp;and adding to a an unknown-tcp allow rule. It's only a temporary hack, though. The IPs can change, Microsoft says.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2025 20:21:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237581#M6273</guid>
      <dc:creator>treeef</dc:creator>
      <dc:date>2025-09-09T20:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft WNS App ID</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237608#M6274</link>
      <description>&lt;P&gt;Permanently added hostname *.wns.windows.com in the SSL Decryption Exclusion and now all the sessions are properly identified. The firewall has problem with identifying it if decrypted, not with encrypted.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 06:06:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237608#M6274</guid>
      <dc:creator>I.Stevkovski</dc:creator>
      <dc:date>2025-09-10T06:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft WNS App ID</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237662#M6278</link>
      <description>&lt;P&gt;That fixed it for us&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/700108745"&gt;@I.Stevkovski&lt;/a&gt;! Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 16:19:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/microsoft-wns-app-id/m-p/1237662#M6278</guid>
      <dc:creator>treeef</dc:creator>
      <dc:date>2025-09-10T16:19:43Z</dc:date>
    </item>
  </channel>
</rss>

