<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restrict Microsoft365 tenant in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/576342#M115683</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To restrict access to specified Microsoft 365 tenant (allow company M365 tenant only), I have tired to follow below link for configuration.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000sayjCAA" target="_blank" rel="noopener"&gt;Using HTTP Header Insertion For Sanctioned Access To Office365 ... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it's didn't work. Users still available to logon with personal M365 account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since URL including below only, is it the root cause ?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;login.microsoftonline.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;login.windows.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;login.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;login.live.com&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I also tried to use External Dynamic Lists "&lt;A href="https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url&amp;quot;," target="_blank" rel="noopener"&gt;https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url&lt;/A&gt;", but user then couldn't be access / browsing all Microsoft webpage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;External Dynamic List is provided by PaloAlto&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/resources/edl-hosting-service" target="_blank" rel="nofollow noopener noreferrer"&gt;EDL Hosting Service (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Secondly, refer to Decryption log, I found error &lt;U&gt;Received fatal alert CertificateUnknown from client. CA Issuer URL (truncated):&lt;A href="http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%2" target="_blank" rel="noopener"&gt;http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%2&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Furthermore, &lt;U&gt;URL filtering license expired&lt;/U&gt; is showed in URL filtering, is it impact to configuration?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I know what's the best practice to achieve it ?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2024 03:50:35 GMT</pubDate>
    <dc:creator>Teddyleung</dc:creator>
    <dc:date>2024-02-07T03:50:35Z</dc:date>
    <item>
      <title>Restrict Microsoft365 tenant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/576342#M115683</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To restrict access to specified Microsoft 365 tenant (allow company M365 tenant only), I have tired to follow below link for configuration.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000sayjCAA" target="_blank" rel="noopener"&gt;Using HTTP Header Insertion For Sanctioned Access To Office365 ... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But it's didn't work. Users still available to logon with personal M365 account.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since URL including below only, is it the root cause ?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;login.microsoftonline.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;login.windows.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;login.microsoft.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;login.live.com&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I also tried to use External Dynamic Lists "&lt;A href="https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url&amp;quot;," target="_blank" rel="noopener"&gt;https://saasedl.paloaltonetworks.com/feeds/m365/worldwide/any/all/url&lt;/A&gt;", but user then couldn't be access / browsing all Microsoft webpage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;External Dynamic List is provided by PaloAlto&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/resources/edl-hosting-service" target="_blank" rel="nofollow noopener noreferrer"&gt;EDL Hosting Service (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Secondly, refer to Decryption log, I found error &lt;U&gt;Received fatal alert CertificateUnknown from client. CA Issuer URL (truncated):&lt;A href="http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%2" target="_blank" rel="noopener"&gt;http://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%2&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Furthermore, &lt;U&gt;URL filtering license expired&lt;/U&gt; is showed in URL filtering, is it impact to configuration?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I know what's the best practice to achieve it ?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 03:50:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/576342#M115683</guid>
      <dc:creator>Teddyleung</dc:creator>
      <dc:date>2024-02-07T03:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Microsoft365 tenant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/576694#M115741</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm facing a similar issue and havent had a chance to look into it. I'll post when I find something.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 21:18:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/576694#M115741</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-02-08T21:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Microsoft365 tenant</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/1251024#M126200</link>
      <description>&lt;P&gt;Hello All . Been wrestling with this for a week .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My starting point is&amp;nbsp; to only allow connections to the entra joined domain&amp;nbsp; for e,g,&amp;nbsp; fred.onmicrosoft.com&amp;nbsp; &amp;nbsp;.&lt;/P&gt;
&lt;P&gt;The rational is DLP - if I go to my browser and attempt to logon to another enterprise - dave.onmicrosoft.com it is blocked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is not consumer BTW - home tenants are blocked with&amp;nbsp; the tenant restrictions I am about to describe...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For background , Entra&amp;nbsp; has V1 &amp;amp; V2 implementations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The palo method is :&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create a URL filter with the correct microsoft login domain .&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Decrypt them&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;For V1 use header insertion -&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;restrict-access-context : tenant value&amp;nbsp; (login.microsoftoneline.com/login.microsoft.com/login windows.net )&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;restrict-access-to-tenant : tenantvalue (same as above&lt;/LI&gt;
&lt;LI&gt;sec-restrict-tenant-access: restrict msa&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;V2 is just&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;sec-restrict-tenant-access-policy : tenant value&amp;nbsp; (same microsoft logins as above)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then create a rule with a security profile with header &amp;amp; URl filter - restrict it to a test user !&lt;/P&gt;
&lt;P&gt;Basically you&amp;nbsp; decrypt microsoft logins an insert a header....&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Test the logins from login.microsoftonline.com&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to setup tenant restrictions on Entra with block inwards and outwards .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea is you pass the header to Entra and it decides whether you connect .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem is it doesnt work !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can login to eberything...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only way I have managed to get this to psuedo work is to use SaaS endpoint for M365&amp;nbsp; &amp;nbsp;on a rule&amp;nbsp; with no header insertion .&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Only problem is - it stops the entra joined user &lt;A href="mailto:greg@fred.onmicrosoft.com" target="_blank"&gt;greg@fred.onmicrosoft.com&amp;nbsp;&lt;/A&gt;&amp;nbsp; logging into &lt;A href="mailto:dav@microsoftonline.com" target="_blank"&gt;dave@onmicrosoft.com&amp;nbsp;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I doesnt stop &lt;A href="mailto:dave@onmicrosoft.com" target="_blank"&gt;dave@onmicrosoft.com &lt;/A&gt;from logging into &lt;A href="mailto:dave@onmicrosoft.com" target="_blank"&gt;dave@onmicrosoft.com&lt;/A&gt;&amp;nbsp;which sort of deefats the object.&lt;/P&gt;
&lt;P&gt;Did anyone get it working ????&lt;/P&gt;
&lt;P&gt;I am also going to start a new thread for this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 16:21:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/restrict-microsoft365-tenant/m-p/1251024#M126200</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2026-03-26T16:21:27Z</dc:date>
    </item>
  </channel>
</rss>

