<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is the Best Practice to block iCloud relay? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1240162#M125361</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194402"&gt;@phampx&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;If this is for managed devices you can simply set allowCloudPrivateRelay and it will ensure that it is disabled on the device itself which is the most effective way to manage things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you block mask.icloud.com or mask-h2.icloud.com on devices that you don't manage, this will cause noticeable impact to your Apple endpoints. There's no way around this block triggering a delay for these endpoints; Apple has made changes so that blocking these requests doesn't cause as big of an impact as it did initially when this feature launched, but people will still notice 'slowness' since it will always attempt to utilize Private Relay first and then need to fallback to normal communication.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Oct 2025 14:24:37 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-10-16T14:24:37Z</dc:date>
    <item>
      <title>What is the Best Practice to block iCloud relay?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1239867#M125327</link>
      <description>&lt;P&gt;What is the best practice method to block iCloud relay without impacting iOS users too much? Apple says to NXDOMAIN the following below.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;mask.icloud.com
mask-h2.icloud.com&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://developer.apple.com/icloud/prepare-your-network-for-icloud-private-relay/" target="_blank" rel="noopener"&gt;Prepare your network or web server for iCloud Private Relay - iCloud - Apple Developer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For the PA though,... should we... create a policy to block, deny or use a URL custom block object rule?&lt;BR /&gt;&lt;BR /&gt;These are some other domains/FQDN I have found:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;configuration.Is.&lt;A tabindex="-1" title="http://apple.com" href="http://apple.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link apple.com"&gt;apple.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A tabindex="-1" title="http://gateway.icloud.com" href="http://gateway.icloud.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link gateway.icloud.com"&gt;gateway.icloud.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A tabindex="-1" title="http://gsp85-sslIs.apole.com" href="http://gsp85-sslis.apole.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link gsp85-sslIs.apole.com"&gt;gsp85-ssl.Is.apple.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;iphone-Id.apple.com&lt;/LI&gt;
&lt;LI&gt;&lt;A tabindex="-1" title="http://mask-api.icloud.com" href="http://mask-api.icloud.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link mask-api.icloud.com"&gt;mask-api.icloud.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;mask-t.apple-dns.net&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;mask.icloud.com&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;mask-h2.icloud.com&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 15:10:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1239867#M125327</guid>
      <dc:creator>phampx</dc:creator>
      <dc:date>2025-10-10T15:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: What is the Best Practice to block iCloud relay?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1239897#M125332</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194402"&gt;@phampx&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend leveraging dns sinkholing at the Palo instead of nxdomain at the DNS level. You can accomplish this via an EDL (Domain List) tied to an AS profile that is referenced in a security policy. DNS sinkholing via the Palo achieves the same effect, but with visibility and logging, which you don't get at the DNS level. Also,&amp;nbsp;DNS sinkholing over URL Filtering/ FQDN-based blocking is efficient in that the fw stops the request at DNS lookup so it doesn’t need to build a full session compared to URL Filtering/fqdn object.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;You can easily create an EDL using a simple .txt file hosted in a location accessible to the firewall (internal web server/S3 or Cloud storage/GitHub raw link,etc) and enter the private relay domains you have.&amp;nbsp;&lt;/LI&gt;
&lt;LI data-start="1194" data-end="1308"&gt;Add the EDL (Type: Domain List) under Objects -&amp;gt; External Dynamic Lists and set it to refresh as you desire (hourly is the fastest).&lt;/LI&gt;
&lt;LI data-start="1312" data-end="1406"&gt;Reference it in an Anti-Spyware profile -&amp;gt; DNS Policies tab, and set Action = Sinkhole.&lt;/LI&gt;
&lt;LI data-start="1410" data-end="1531"&gt;Attach that profile to the security rule handling outbound DNS traffic, preferably before your general internet security policy or any policy that has url filtering attached. **&amp;nbsp;iCloud Private Relay domains are typically categorized by PAN-DB under "Proxy Avoidance and Anonymizers" and might be blocked if you have that enabled.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="192" data-end="271"&gt;**Side Note (if you choose to block via Security Policy instead of Sinkhole)...&lt;/P&gt;
&lt;P data-start="765" data-end="931"&gt;Blocking via FQDN objects in a security policy would be simpler and have the same effect as URL Filtering in this case since you're not needing wildcards and only targeting domains like "mask.icloud.com" and "mask-h2.icloud.com", rather than something like mask.icloud.com/private-relay/api/init. Full URL path-based blocking would require url filtering w/ SSL decryption to inspect the HTTP path inside the TLS session.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Oct 2025 20:43:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1239897#M125332</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-10-12T20:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: What is the Best Practice to block iCloud relay?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1240162#M125361</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194402"&gt;@phampx&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;If this is for managed devices you can simply set allowCloudPrivateRelay and it will ensure that it is disabled on the device itself which is the most effective way to manage things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you block mask.icloud.com or mask-h2.icloud.com on devices that you don't manage, this will cause noticeable impact to your Apple endpoints. There's no way around this block triggering a delay for these endpoints; Apple has made changes so that blocking these requests doesn't cause as big of an impact as it did initially when this feature launched, but people will still notice 'slowness' since it will always attempt to utilize Private Relay first and then need to fallback to normal communication.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2025 14:24:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1240162#M125361</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-10-16T14:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: What is the Best Practice to block iCloud relay?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1240517#M125396</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194402"&gt;@phampx&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;What is the best practice method to block iCloud relay without impacting iOS users too much? Apple says to NXDOMAIN the following below.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;mask.icloud.com
mask-h2.icloud.com&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;A href="https://developer.apple.com/icloud/prepare-your-network-for-icloud-private-relay/" target="_blank" rel="noopener"&gt;Prepare your network or web server for iCloud Private Relay - iCloud - Apple Developer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For the PA though,... should we... create a policy to block, deny or use a URL custom block object rule?&lt;BR /&gt;&lt;BR /&gt;These are some other domains/FQDN I have found:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;configuration.Is.&lt;A tabindex="-1" title="http://apple.com" href="http://apple.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link apple.com"&gt;apple.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A tabindex="-1" title="http://gateway.icloud.com" href="http://gateway.icloud.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link gateway.icloud.com"&gt;gateway.icloud.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A tabindex="-1" title="http://gsp85-sslIs.apole.com" href="http://gsp85-sslis.apole.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link gsp85-sslIs.apole.com"&gt;gsp85-ssl.Is.apple.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;iphone-Id.apple.com&lt;/LI&gt;
&lt;LI&gt;&lt;A tabindex="-1" title="http://mask-api.icloud.com" href="http://mask-api.icloud.com/" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link mask-api.icloud.com"&gt;mask-api.icloud.com&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;mask-t.apple-dns.net&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;mask.icloud.com&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;mask-h2.icloud.com&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194402"&gt;@phampx&lt;/a&gt;&amp;nbsp;-- This is actually a threat in an "Anti-Spyware" profile, as a "low" alert.&amp;nbsp; If you can block low, that should be all you need to do.&amp;nbsp; if you can't block it (Low threats in spyware) you can also follow what Apple says:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_0-1761139309007.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69661iACE4BD80A208C222/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_0-1761139309007.png" alt="Brandon_Wertz_0-1761139309007.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_1-1761139354508.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/69662iDA017E0105ECAB29/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_1-1761139354508.png" alt="Brandon_Wertz_1-1761139354508.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://developer.apple.com/icloud/prepare-your-network-for-icloud-private-relay/" target="_blank"&gt;https://developer.apple.com/icloud/prepare-your-network-for-icloud-private-relay/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Oct 2025 13:23:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-is-the-best-practice-to-block-icloud-relay/m-p/1240517#M125396</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2025-10-22T13:23:07Z</dc:date>
    </item>
  </channel>
</rss>

