<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prisma Access Web Security blocking access to M365/teams/outlook in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/551743#M542</link>
    <description>&lt;P&gt;Thanks for the reply folks - much appreciated.&lt;/P&gt;
&lt;P&gt;In the end I did not enable split tunnel.&amp;nbsp; What I did was create an EDL to the "M365 worldwide URLS" at&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url" target="_blank"&gt;https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then under "web security" &amp;gt; "Global Decryption exclusions" &amp;gt; "bypass URL categories" I added in the External dynamic List.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 31 Jul 2023 10:28:49 GMT</pubDate>
    <dc:creator>CyberEng</dc:creator>
    <dc:date>2023-07-31T10:28:49Z</dc:date>
    <item>
      <title>Prisma Access Web Security blocking access to M365/teams/outlook</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/544061#M511</link>
      <description>&lt;P&gt;Hi, anytime we enable "web security" as recommended on the main dashboard of prisma access, MS Teams and outlook stop working.&amp;nbsp; Outlook throws up certificate errors and teams refuses to connect.&amp;nbsp; Upon investigation it looks as though the traffic is being decrypted and this is causing issues.&amp;nbsp; We have put in bypass decryptions for the "worldwide 365 URL" and "worldwide 365 IP" lists in our network security decryption policy.&amp;nbsp; However the logs clearly show this traffic is still being decrypted and breaking the application.&amp;nbsp; It appears that the "web security" feature / policy later is overriding anything set at the network security layer with regards to encryption.&lt;/P&gt;
&lt;P&gt;As soon as we disable "web security" the applications start working again.&amp;nbsp; How should we configure the web security feature to bypass decryption for all M365 URLS and IP's?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 21:57:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/544061#M511</guid>
      <dc:creator>CyberEng</dc:creator>
      <dc:date>2023-05-30T21:57:20Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access Web Security blocking access to M365/teams/outlook</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/547923#M528</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/prisma-access-discussions/split-tunnelling-for-m365/td-p/540192" target="_blank"&gt;https://live.paloaltonetworks.com/t5/prisma-access-discussions/split-tunnelling-for-m365/td-p/540192&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jul 2023 10:48:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/547923#M528</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-07-01T10:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access Web Security blocking access to M365/teams/outlook</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/551730#M538</link>
      <description>&lt;P&gt;I am currently experiencing the same issue. I noticed that installing the Root CA allows decryption to work correctly,&lt;/P&gt;
&lt;P&gt;but if I install Forward-Trust-CA, the same problem occurs.&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2023 08:19:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/551730#M538</guid>
      <dc:creator>JoeCheng</dc:creator>
      <dc:date>2023-07-31T08:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access Web Security blocking access to M365/teams/outlook</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/551743#M542</link>
      <description>&lt;P&gt;Thanks for the reply folks - much appreciated.&lt;/P&gt;
&lt;P&gt;In the end I did not enable split tunnel.&amp;nbsp; What I did was create an EDL to the "M365 worldwide URLS" at&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url" target="_blank"&gt;https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then under "web security" &amp;gt; "Global Decryption exclusions" &amp;gt; "bypass URL categories" I added in the External dynamic List.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2023 10:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-web-security-blocking-access-to-m365-teams-outlook/m-p/551743#M542</guid>
      <dc:creator>CyberEng</dc:creator>
      <dc:date>2023-07-31T10:28:49Z</dc:date>
    </item>
  </channel>
</rss>

