<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is PA capable to scan for malware in Activesync/Outlook365 traffic? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545314#M111530</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have PA-850 appliances with Wildfire and AV licenses.&lt;/P&gt;
&lt;P&gt;Recently we enabled the decryption of email traffic and now we are dealing with the data protection officer, he is asking us to detail what exactly is being inspected.&lt;/P&gt;
&lt;P&gt;At first I thought all attachments and URL were inspected.&amp;nbsp; But then I found some information about link analysis only happening for SMTP traffic.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/email-link-analysis" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/email-link-analysis&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For file analysis, I could not find any mention about the application protocol supported.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/file-analysis" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/file-analysis&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We are using Microsoft native protocols (activesync, ms-exchange,office365,...) and mapi-over-http and rpc-over-http. SMTP is not allowed because security reasons.&lt;/P&gt;
&lt;P&gt;I assume that files transferred using HTTP are being scanned, but what about if a file is transferred using any other protocol? is Paloalto doing something?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jun 2023 15:35:16 GMT</pubDate>
    <dc:creator>JoseCortijo</dc:creator>
    <dc:date>2023-06-08T15:35:16Z</dc:date>
    <item>
      <title>Is PA capable to scan for malware in Activesync/Outlook365 traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545314#M111530</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have PA-850 appliances with Wildfire and AV licenses.&lt;/P&gt;
&lt;P&gt;Recently we enabled the decryption of email traffic and now we are dealing with the data protection officer, he is asking us to detail what exactly is being inspected.&lt;/P&gt;
&lt;P&gt;At first I thought all attachments and URL were inspected.&amp;nbsp; But then I found some information about link analysis only happening for SMTP traffic.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/email-link-analysis" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/email-link-analysis&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For file analysis, I could not find any mention about the application protocol supported.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/file-analysis" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/advanced-wildfire-overview/advanced-wildfire-concepts/file-analysis&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We are using Microsoft native protocols (activesync, ms-exchange,office365,...) and mapi-over-http and rpc-over-http. SMTP is not allowed because security reasons.&lt;/P&gt;
&lt;P&gt;I assume that files transferred using HTTP are being scanned, but what about if a file is transferred using any other protocol? is Paloalto doing something?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 15:35:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545314#M111530</guid>
      <dc:creator>JoseCortijo</dc:creator>
      <dc:date>2023-06-08T15:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Is PA capable to scan for malware in Activesync/Outlook365 traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545362#M111534</link>
      <description>&lt;P&gt;Let me caveat this by saving the PAN already must have a detection signature for it. Meaning it will not scan/send attachments to wildfire, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yes if the traffic is not encrypted. But also not guaranteed. For email traffic its best to utilize an actual email scanning appliance or service. I would go with an online scanner rather than an onsite appliance for several reasons.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 20:54:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545362#M111534</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-06-08T20:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: Is PA capable to scan for malware in Activesync/Outlook365 traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545462#M111543</link>
      <description>&lt;P&gt;Thanks for your reply. I performed tests accessing with outlook client and OWA, both decrypted flows. I can confirm that via HTTP the virus is detected and the connection reset. Via outlook, the virus travels safely until the destination mailbox &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; so it is consistent with the documentation, PaloAlto does not inspect Activesync or any other MS email protocol.&lt;/P&gt;
&lt;P&gt;thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 10:18:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/is-pa-capable-to-scan-for-malware-in-activesync-outlook365/m-p/545462#M111543</guid>
      <dc:creator>JoseCortijo</dc:creator>
      <dc:date>2023-06-09T10:18:38Z</dc:date>
    </item>
  </channel>
</rss>

