<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic File blocking allow MS 365 Office installs and Windows updates in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/460103#M102034</link>
    <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;If at all possible, please could I ask for some input on the best way I try allow M365 office installs (from their CDN) and Windows updates to our endpoints even though we are not using SSL decryption at the moment?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a policy rule to allow outbound web traffic, matching:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;any dest&lt;/LI&gt;&lt;LI&gt;service http/https.&lt;/LI&gt;&lt;LI&gt;security profile applied to it that includes the basic file blocking profile (that will stop DLL, cab and Win PE files - all used in Windows updates or Office installs).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Above that, in my Palo ignorance, I've introduced another rule that I was hoping would match Windows update traffic and Office 365 installs. This is set to allow:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;any dest&lt;/LI&gt;&lt;LI&gt;match the apps ms-update, ssl and web-browsing&lt;/LI&gt;&lt;LI&gt;application default service&lt;/LI&gt;&lt;LI&gt;Modified file blocking profile to allow but alert on cab, dll and Win PE files for above app-ids&lt;/LI&gt;&lt;LI&gt;URL category including the URLs at the bottom of the post&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My question is more about Office at the moment as we need to deploy it&lt;/STRONG&gt; - any time we try to deploy an Office app the traffic matches the standard 'Outbound web traffic' rule and normal file blocking denies it. Even though it is categorised as in the Office update URL list (file URL starts with officecdn....) and matches the ms-update or web-browsing app-ids, that are in my allow rule.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;Hope that made sense and sorry if I've made some mistakes, I am new to Palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Custom URL categories:&lt;/P&gt;&lt;P&gt;-Win update&lt;/P&gt;&lt;P&gt;windowsupdates.microsoft.com&lt;/P&gt;&lt;P&gt;*.windowsupdate.com&lt;/P&gt;&lt;P&gt;*.windowsupdates.microsoft.com&lt;/P&gt;&lt;P&gt;*.update.microsoft.com&lt;/P&gt;&lt;P&gt;-Office update&lt;/P&gt;&lt;P&gt;officecdn.microsoft.com&lt;/P&gt;&lt;P&gt;*.officecnd.microsoft.com&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jan 2022 09:44:53 GMT</pubDate>
    <dc:creator>RaoulG</dc:creator>
    <dc:date>2022-01-21T09:44:53Z</dc:date>
    <item>
      <title>File blocking allow MS 365 Office installs and Windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/460103#M102034</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;If at all possible, please could I ask for some input on the best way I try allow M365 office installs (from their CDN) and Windows updates to our endpoints even though we are not using SSL decryption at the moment?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We currently have a policy rule to allow outbound web traffic, matching:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;any dest&lt;/LI&gt;&lt;LI&gt;service http/https.&lt;/LI&gt;&lt;LI&gt;security profile applied to it that includes the basic file blocking profile (that will stop DLL, cab and Win PE files - all used in Windows updates or Office installs).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Above that, in my Palo ignorance, I've introduced another rule that I was hoping would match Windows update traffic and Office 365 installs. This is set to allow:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;any dest&lt;/LI&gt;&lt;LI&gt;match the apps ms-update, ssl and web-browsing&lt;/LI&gt;&lt;LI&gt;application default service&lt;/LI&gt;&lt;LI&gt;Modified file blocking profile to allow but alert on cab, dll and Win PE files for above app-ids&lt;/LI&gt;&lt;LI&gt;URL category including the URLs at the bottom of the post&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My question is more about Office at the moment as we need to deploy it&lt;/STRONG&gt; - any time we try to deploy an Office app the traffic matches the standard 'Outbound web traffic' rule and normal file blocking denies it. Even though it is categorised as in the Office update URL list (file URL starts with officecdn....) and matches the ms-update or web-browsing app-ids, that are in my allow rule.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;Hope that made sense and sorry if I've made some mistakes, I am new to Palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Custom URL categories:&lt;/P&gt;&lt;P&gt;-Win update&lt;/P&gt;&lt;P&gt;windowsupdates.microsoft.com&lt;/P&gt;&lt;P&gt;*.windowsupdate.com&lt;/P&gt;&lt;P&gt;*.windowsupdates.microsoft.com&lt;/P&gt;&lt;P&gt;*.update.microsoft.com&lt;/P&gt;&lt;P&gt;-Office update&lt;/P&gt;&lt;P&gt;officecdn.microsoft.com&lt;/P&gt;&lt;P&gt;*.officecnd.microsoft.com&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 09:44:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/460103#M102034</guid>
      <dc:creator>RaoulG</dc:creator>
      <dc:date>2022-01-21T09:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: File blocking allow MS 365 Office installs and Windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/460274#M102053</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Make sure you have log at session end enabled on all policies. Then look at the unified logs to see what traffic the PAN is seeing for the office stuff. The problem with Microsoft updates is that they use Akamai so this could be why its not hitting the correct policies.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 19:35:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/460274#M102053</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-01-21T19:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: File blocking allow MS 365 Office installs and Windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/464654#M102520</link>
      <description>&lt;P&gt;Hi, wondering if you resolved this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try creating a custom URL category with the below URLs:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*.update.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*.windowsupdates.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*.windowsupdate.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;windowsupdates.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And create an allow security policy using this custom URL category. Place it right above the current policy being matched.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope that helps.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 22:22:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/464654#M102520</guid>
      <dc:creator>Gustavo_Aristi</dc:creator>
      <dc:date>2022-02-09T22:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: File blocking allow MS 365 Office installs and Windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/475589#M103477</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;How is your testing coming along?&lt;/P&gt;&lt;P&gt;We are also having challenges with O365 installations as well as MS updates from different client and server OS's.&lt;/P&gt;&lt;P&gt;Our custom URL category includes all of the windowsupdate Urls as well as the akamai Urls from this link:&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/enterprise/managing-office-365-endpoints.md" target="_blank"&gt;https://github.com/MicrosoftDocs/microsoft-365-docs/blob/public/microsoft-365/enterprise/managing-office-365-endpoints.md&lt;/A&gt;&lt;/P&gt;&lt;P&gt;*.akadns.net&lt;BR /&gt;*.akam.net&lt;BR /&gt;*.akamai.com&lt;BR /&gt;*.akamai.net&lt;BR /&gt;*.akamaiedge.net&lt;BR /&gt;*.akamaihd.net&lt;BR /&gt;*.akamaized.net&lt;BR /&gt;*.edgekey.net&lt;BR /&gt;*.edgesuite.net&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still testing and we had a rule that allowed PE and DLL files when the clients hit our custom URL category.&lt;/P&gt;&lt;P&gt;But ran into an issue with a Server 2016 OS which was hitting hwcdn.net which is another CDN network.&lt;/P&gt;&lt;P&gt;I dont think we have a final configuration yet-that is as tight as possible but we are getting close.&lt;/P&gt;&lt;P&gt;Also testing using the ms-update application in one rule and the custom category in another.&lt;/P&gt;&lt;P&gt;Interested to know if you have found a tight ruleset that allows this yet.&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;OD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2022 17:08:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-allow-ms-365-office-installs-and-windows-updates/m-p/475589#M103477</guid>
      <dc:creator>LiveCommunityMemberOD</dc:creator>
      <dc:date>2022-03-24T17:08:22Z</dc:date>
    </item>
  </channel>
</rss>

