<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to add Wildcard Domains as a destination for Firewall policy PA1420 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251969#M126269</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;In my experience, you will find a lot of websites still use port 80. While I understand its not 'encrypted' it still has its usefulness. I think you might find a lot of tickets from users asking why a site is blocked etc. Just my thoughts.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Thu, 09 Apr 2026 14:21:46 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2026-04-09T14:21:46Z</dc:date>
    <item>
      <title>How to add Wildcard Domains as a destination for Firewall policy PA1420</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251932#M126264</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have blocked the Port 80 in my network so any clients try to access the internet over the port 80 should not be allowed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But the thing is that some of the micorsoft IPs and Domains runs over the port 80.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I want to add a new firewall rule to my palo alto 1420 to allowlist Miscrosoft IPs and domains over the port 80 and 443, I have also attached a screenshot to this threat showcasing the list of IPs and domain name, now some domains contains wildcards which can't be added at the detination field and also can be added as Address Objects.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So do you think what is the solution to this so that I can add all those domains as destination so when traffic from my Staff VLAN is generated to those domains over the port 80 and/or 443 are allowed.&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;
&lt;P&gt;Best Regares,&lt;/P&gt;
&lt;P&gt;Shah&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 08:40:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251932#M126264</guid>
      <dc:creator>S.Alizada</dc:creator>
      <dc:date>2026-04-09T08:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to add Wildcard Domains as a destination for Firewall policy PA1420</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251939#M126267</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/374392237"&gt;@S.Alizada&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="9"&gt;You can't put *.microsoft.com in an Address Object, but you can add them to custom URL categories:&lt;/P&gt;
&lt;UL data-path-to-node="10"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="10,0,0"&gt;Create a Custom URL Category (Objects &amp;gt; Custom Objects &amp;gt; URL Category).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="10,1,0"&gt;In this field, you CAN use wildcards.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="10,2,0"&gt;In your Security Policy, keep the Destination as "Any" (or use the EDLs), but go to the Category tab and add your new Custom URL Category. The firewall will then allow the traffic based on the host header/SNI matching that wildcard.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I mentioned EDL and I believe it&amp;nbsp;is the intended solution for your exact problem:&lt;/P&gt;
&lt;P data-path-to-node="8"&gt;Palo Alto provides&amp;nbsp;&lt;STRONG data-index-in-node="74" data-path-to-node="8"&gt;EDL Hosting Service&lt;/STRONG&gt; specifically to solve the Microsoft 365 headache. It automatically pulls the latest IPs and URLs from Microsoft and formats them into a link your firewall can read.&lt;/P&gt;
&lt;UL data-path-to-node="9"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="9,0,0"&gt;You can find the list of URLs here: &lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/resources/edl-hosting-service" rel="noopener" target="_blank"&gt;Palo Alto EDL Hosting Service&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/configure-the-firewall-to-access-an-external-dynamic-list-from-the-edl-hosting-service/create-an-external-dynamic-list-using-the-edl-hosting-service" target="_blank" rel="noopener"&gt;Create an External Dynamic List Using the EDL Hosting Service&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="btm-pagination top-pagination"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;That last link also mentions to&amp;nbsp;&lt;SPAN&gt;Leverage&amp;nbsp;&lt;/SPAN&gt;&lt;A class="xref" title="" href="https://docs.paloaltonetworks.com/content/techdocs/en_US/pan-os/11-1/pan-os-admin/app-id.html#idfaccd69a-ea36-474c-a663-14550f075d6d" data-type="" data-format="dita" data-scope="local" target="_blank"&gt;App-ID&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;alongside EDLs in a policy rule for additional strict enforcement of SaaS application traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Instead of just opening "Port 80," use App-ID. Add applications like office365-base, ms-update, and outlook-web to the rule. This is much more secure because it ensures the traffic is actually a Microsoft service, regardless of what port or IP it’s using.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 09:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251939#M126267</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-04-09T09:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to add Wildcard Domains as a destination for Firewall policy PA1420</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251969#M126269</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;In my experience, you will find a lot of websites still use port 80. While I understand its not 'encrypted' it still has its usefulness. I think you might find a lot of tickets from users asking why a site is blocked etc. Just my thoughts.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 14:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251969#M126269</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2026-04-09T14:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to add Wildcard Domains as a destination for Firewall policy PA1420</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251976#M126273</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/374392237"&gt;@S.Alizada&lt;/a&gt;&amp;nbsp; Also like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; has mentioned basic "Internet" connectivity services for systems like Microsoft and Apple use port 80 status checks.&amp;nbsp; If you're blocking 80/tcp (http), you're creating a future headache for yourself:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_0-1775754778011.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71165i5671A09058BD08B9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_0-1775754778011.png" alt="Brandon_Wertz_0-1775754778011.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_1-1775754814145.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71166i05989E42AB52135B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_1-1775754814145.png" alt="Brandon_Wertz_1-1775754814145.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2026 17:14:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-add-wildcard-domains-as-a-destination-for-firewall-policy/m-p/1251976#M126273</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2026-04-09T17:14:14Z</dc:date>
    </item>
  </channel>
</rss>

