<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Explicit allow to Microsoft Update services in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550943#M112260</link>
    <description>&lt;P&gt;Ok, I marked this as Accept, but it actually didn't work.&amp;nbsp; I created a Custom URL Configuration with:&lt;/P&gt;
&lt;P&gt;*.windowsupdate.microsoft.com\&lt;BR /&gt;*.update.microsoft.com\&lt;BR /&gt;*.windowsupdate.com\&lt;BR /&gt;*.download.windowsupdate.com\&lt;BR /&gt;download.windowsupdate.com\&lt;BR /&gt;download.microsoft.com\&lt;BR /&gt;wustat.windows.com\&lt;BR /&gt;ntservicepack.microsoft.com\&lt;BR /&gt;go.microsoft.com\&lt;BR /&gt;dl.delivery.mp.microsoft.com\&lt;BR /&gt;windowsupdate.microsoft.com\&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then I created a policy allowing the target sources access to that Custom URL Category (with app's ssl, web-browsing, ms-update and ocsp).&amp;nbsp; It appeared to work, but then when I inspected the logs more closely, I saw someone hitting bs.yandex.ru via that new policy.&amp;nbsp; Clearly that is not correct so I reverted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jul 2023 17:53:05 GMT</pubDate>
    <dc:creator>bhelman</dc:creator>
    <dc:date>2023-07-25T17:53:05Z</dc:date>
    <item>
      <title>Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550386#M112202</link>
      <description>&lt;P&gt;I've read through a dozen questions and the scores of answers to those questions, and I'm finding a mix of outdated information, bad information or just unrelated options...&amp;nbsp; I suspect this is going to send down a rabbit hole, so I'll try to compartmentalize based on my testing.&amp;nbsp; I never progressed far enough to get close to a resolution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, the end-goal -- I have some systems that we want to have extremely limited Internet access: Chrome updates, Microsoft updates, a single specific website (not pertinent to this conversation).&amp;nbsp; I haven't looked at Chrome updates yet.&amp;nbsp; But I've spent a considerable amount of time looking at Microsoft.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue likes in the fact that MS needs several domains open, some with wildcards, to access MS Updates.&amp;nbsp; That removes a simple FQDN object (in the destination field) as an option.&amp;nbsp; I tried suggestions for Custom URL Category objects.&amp;nbsp; I tried this (for testing):&lt;/P&gt;
&lt;P&gt;Custom URL Object Test-FQDN-01&lt;/P&gt;
&lt;P&gt;*.microsoft.com/&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.microsoft.com/" target="_blank"&gt;www.microsoft.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then put that in a policy that BLOCKS my computer from being able to ping that custom url object (ie placing the custom url object in the Service/URL Category tab config).&amp;nbsp; Commit and ... pings still work (allowed by the next policy).&amp;nbsp; I never see it hit this test policy, so something isn't matching.&amp;nbsp; BTW, &lt;A href="http://www.microsoft.com" target="_blank"&gt;www.microsoft.com&lt;/A&gt;&amp;nbsp;resolves to an akamai address (that never changed during my testing).&amp;nbsp; I then tried to add that akamai FQDN to the custom url object and ... still able to ping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did play around with creating a dedicated profile .. allowing the microsoft urls and blocking everything else.&amp;nbsp; That works, but then I lose the ability to use this same definition to track systems going to ms update.&amp;nbsp; It's also odd to have both an allow and a deny in the same policy (ie explicitly allow access to ms update while explicitly denying access to all other websites).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another thing that crossed my mind - a simple rule that allows any internal to any external with application ms-update.&amp;nbsp; EXCEPT ms-update requires ssl, so because the policies are "ands" in the application field, I've just opened up any https website.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This shouldn't be so difficult.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 14:40:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550386#M112202</guid>
      <dc:creator>bhelman</dc:creator>
      <dc:date>2023-07-21T14:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550449#M112213</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/4479"&gt;@bhelman&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;URL categories will&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;never&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;work for limiting ICMP requests. That simply isn't how ICMP functions and there would be no way for your firewall to know that you're attempting to send ICMP requests to "microsoft.com" because your machine will just send the request to the resolved IP address. The only way to accomplish&amp;nbsp;&lt;EM&gt;that specific task&amp;nbsp;&lt;/EM&gt;would be FQDN objects and hoping that the firewall and the client actually keep the resolved address in check.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That addressed, the following list will&amp;nbsp;&lt;EM&gt;function&amp;nbsp;&lt;/EM&gt;for getting Microsoft updates as a custom URL category. It may not be complete, likely isn't complete, and can change at any time.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;              &amp;lt;entry name="Microsoft Updates"&amp;gt;
                &amp;lt;list&amp;gt;
                  &amp;lt;member&amp;gt;windowsupdate.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.windowsupdate.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;update.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.update.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.windowsupdate.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.download.windowsupdate.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;download.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.download.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;wustat.windows.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;ntservicepack.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;stats.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;amupdatedl.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.events.data.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;*.data.microsoft.com/&amp;lt;/member&amp;gt;
                  &amp;lt;member&amp;gt;smartscreen-prod.microsoft.com/&amp;lt;/member&amp;gt;
                &amp;lt;/list&amp;gt;
                &amp;lt;description&amp;gt;Used to account for Microsoft Update Traffic&amp;lt;/description&amp;gt;
                &amp;lt;type&amp;gt;URL List&amp;lt;/type&amp;gt;
              &amp;lt;/entry&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can then setup a policy that uses that category and allows app-ids [ ms-update ssl ocsp web-browsing ] with the category applied. This would allow updates to function, but it should prevent normal browsing access.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 20:10:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550449#M112213</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-07-21T20:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550452#M112215</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp; I'll take a look at this Monday.&amp;nbsp; I think I had tried this, but my testing methodology was obviously faulty.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 20:15:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550452#M112215</guid>
      <dc:creator>bhelman</dc:creator>
      <dc:date>2023-07-21T20:15:14Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550943#M112260</link>
      <description>&lt;P&gt;Ok, I marked this as Accept, but it actually didn't work.&amp;nbsp; I created a Custom URL Configuration with:&lt;/P&gt;
&lt;P&gt;*.windowsupdate.microsoft.com\&lt;BR /&gt;*.update.microsoft.com\&lt;BR /&gt;*.windowsupdate.com\&lt;BR /&gt;*.download.windowsupdate.com\&lt;BR /&gt;download.windowsupdate.com\&lt;BR /&gt;download.microsoft.com\&lt;BR /&gt;wustat.windows.com\&lt;BR /&gt;ntservicepack.microsoft.com\&lt;BR /&gt;go.microsoft.com\&lt;BR /&gt;dl.delivery.mp.microsoft.com\&lt;BR /&gt;windowsupdate.microsoft.com\&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then I created a policy allowing the target sources access to that Custom URL Category (with app's ssl, web-browsing, ms-update and ocsp).&amp;nbsp; It appeared to work, but then when I inspected the logs more closely, I saw someone hitting bs.yandex.ru via that new policy.&amp;nbsp; Clearly that is not correct so I reverted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 17:53:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550943#M112260</guid>
      <dc:creator>bhelman</dc:creator>
      <dc:date>2023-07-25T17:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550949#M112263</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/4479"&gt;@bhelman&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'd be interested in seeing the detailed log information that you were seeing in this instance. The firewall will need to allow enough traffic to read the URL, but as soon as it's identified the connection should be reset if the policy is setup properly.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 19:16:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/550949#M112263</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-07-25T19:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1000120#M122751</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;and thank you for posting this, it was very helpful! I just found this list of Microsoft domains on Microsoft Learn -&amp;gt;&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus#211-configure-your-firewall-to-allow-your-first-wsus-server-to-connect-to-microsoft-domains-on-the-internet" target="_self"&gt;Configure your firewall to allow your first WSUS server to connect to Microsoft domains on the internet&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This is what I put in the URL Category:&lt;BR /&gt;*.delivery.mp.microsoft.com/&lt;BR /&gt;*.download.windowsupdate.com/&lt;BR /&gt;*.update.microsoft.com/&lt;BR /&gt;*.windowsupdate.com/&lt;BR /&gt;*.windowsupdate.microsoft.com/&lt;BR /&gt;download.microsoft.com/&lt;BR /&gt;download.windowsupdate.com/&lt;BR /&gt;go.microsoft.com/&lt;BR /&gt;ntservicepack.microsoft.com/&lt;BR /&gt;windowsupdate.microsoft.com/&lt;BR /&gt;wustat.windows.com/&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jan 2025 19:46:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1000120#M122751</guid>
      <dc:creator>V.Benfanti</dc:creator>
      <dc:date>2025-01-05T19:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1219904#M123224</link>
      <description>&lt;P&gt;That list looks familiar, but allowing it via url category in a rule with ssl, web, msupdate, soap, does still not solve the issue. I've got ssl forward proxy, I have my local certificate on fw and client, yet the first thing windows does it try to verify some certificate against&amp;nbsp;&lt;A href="http://www.microsoft.com" target="_blank"&gt;www.microsoft.com&lt;/A&gt;. Which isn't allowed as it gives way to much more than just windows updates &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; So if anybody has actual working solution for allowing windows updates in a truly restricted network (not using sccm, wsus or other proxying software of course) I'd be happy to hear how you made it work without comprising the isolation.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2025 09:31:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1219904#M123224</guid>
      <dc:creator>JohanSGS</dc:creator>
      <dc:date>2025-02-10T09:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1250615#M126170</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Sorry to dig up an old post, but did you ever got this working? I'm in the exact same position ..&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 09:26:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1250615#M126170</guid>
      <dc:creator>BrunoPyck</dc:creator>
      <dc:date>2026-03-20T09:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Explicit allow to Microsoft Update services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1250622#M126171</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/320308"&gt;@BrunoPyck&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as I know the solution by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;should work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="5"&gt;Taking the yandex.ru example... I understand why seeing yandex.ru hit that policy is alarming! But you didn't do anything wrong; you actually ran into a very common "gotcha" in how Palo Alto Networks handles URL identification.&lt;/P&gt;
&lt;P data-path-to-node="5"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="6"&gt;When a security policy is restricted to a Custom URL Category, the firewall has a "chicken and egg" problem. It can’t see the URL (like windowsupdate.com) until the SSL/TLS handshake happens.&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;To identify the URL, the firewall must allow the first 3–4 packets of any HTTPS session to pass through so it can read the Server Name Indication (SNI) or the Certificate. During those first few packets, the firewall "optimistically" matches the traffic to your Microsoft rule. If the site turns out to be yandex.ru, the firewall eventually realizes it doesn't match, but by then, the session has already been logged against that policy.&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;The access to yandex.ru will ultimately be blocked.&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;The "leak" the user saw isn't a permanent opening; it's a temporary mismatch that happens while the firewall is "waiting" to see the URL.&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;That's my understanding... are you seeing different behavior ?&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 11:19:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/explicit-allow-to-microsoft-update-services/m-p/1250622#M126171</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-03-20T11:19:46Z</dc:date>
    </item>
  </channel>
</rss>

