<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block All Internet Web-Browsing But Allow MS_UPDATES in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521875#M1229</link>
    <description>&lt;P&gt;Worked great! Much appreciated.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Nov 2022 13:18:19 GMT</pubDate>
    <dc:creator>MTaylor22</dc:creator>
    <dc:date>2022-11-21T13:18:19Z</dc:date>
    <item>
      <title>Block All Internet Web-Browsing But Allow MS_UPDATES</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521614#M1226</link>
      <description>&lt;P&gt;For our isolated network I need to block all devices from using the internet but I need to access services like ms updates, sophos etc that require SSL for a couple servers. When applying policies with the required application these require SSL/web-browsing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are having trouble finding a work around.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The IP's are dynamic so nailing down the exact IP's seem futile. We tried to apply the url's or wildcard addresses for these services in a URL group in the policy, but this still allows internet to these servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestions are appreciated.&lt;/P&gt;
&lt;P&gt;Using Panorama 10.1.6 with firewall PA-440 and other sites with PA-410&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 00:57:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521614#M1226</guid>
      <dc:creator>MTaylor22</dc:creator>
      <dc:date>2022-11-18T00:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: Block All Internet Web-Browsing But Allow MS_UPDATES</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521626#M1227</link>
      <description>&lt;P&gt;Hello, you can create a Policy, allow apps ssl, web-browser, and microsoft update app ( Microsoft Update use port 80/443 ) and create a custom category URL, with allowed microsoft update subdomains, put in the URL category in the secure policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;microsoft update subdomains/FQDN:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus#:~:text=Your%20first%20WSUS%20server%20must%20have%20outbound%20access%20to%20ports%2080%20and%20443%20on%20the%20following%20domains%3A" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus#:~:text=Your%20first%20WSUS%20server%20must%20have%20outbound%20access%20to%20ports%2080%20and%20443%20on%20the%20following%20domains%3A&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whit that only allow ssl/https and microsft update app to the destination for the Microsoft update services. You can doit the same for Sophos.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Of course it will allow access to the servers to the Internet, but only at the level of the destination in the URL custom category, and nothing else. Additional to protect add profile security policy. And then with another rule close all the rest of the servers access, a total deny of all the rest and above/free the policy of ms-update, web-browser, ssl only to the URLs in question (ms-update and sophos).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 04:16:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521626#M1227</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-11-18T04:16:34Z</dc:date>
    </item>
    <item>
      <title>Re: Block All Internet Web-Browsing But Allow MS_UPDATES</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521685#M1228</link>
      <description>&lt;P&gt;Thank you for the quick reply. I will be working on this today and let you know how it goes. Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 13:14:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521685#M1228</guid>
      <dc:creator>MTaylor22</dc:creator>
      <dc:date>2022-11-18T13:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Block All Internet Web-Browsing But Allow MS_UPDATES</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521875#M1229</link>
      <description>&lt;P&gt;Worked great! Much appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 13:18:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/block-all-internet-web-browsing-but-allow-ms-updates/m-p/521875#M1229</guid>
      <dc:creator>MTaylor22</dc:creator>
      <dc:date>2022-11-21T13:18:19Z</dc:date>
    </item>
  </channel>
</rss>

