<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access only to Office 365 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25961#M18935</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Three choices for you:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Use SSL Decryption&lt;/LI&gt;&lt;LI&gt;Create a custom URL category with microsoft/office365 URLs. &lt;/LI&gt;&lt;LI&gt;Ask Microsoft for a list of IP ranges to allow&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no other solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Nov 2014 19:24:25 GMT</pubDate>
    <dc:creator>cpainchaud</dc:creator>
    <dc:date>2014-11-15T19:24:25Z</dc:date>
    <item>
      <title>Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25958#M18932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have many client computers with no internet access (only intranet and email).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since we are migrating our email to Office 365, client computers need access to Office 365 (via Outlook and Web browser). Not only mail services, but also licensing, onedrive, ... - the full scope of MS Office 365 services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can we achieve that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 10:57:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25958#M18932</guid>
      <dc:creator>spopovic</dc:creator>
      <dc:date>2014-06-05T10:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25959#M18933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi..Spopovic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can create &lt;/P&gt;&lt;H2 class="subtitle" style="margin-bottom: 0.6em; font-size: 1.2em; color: #333333;"&gt;Policy objects.&lt;/H2&gt;&lt;P style="margin-bottom: 0.75em;"&gt;The firewall operates on abstract objects so that an end-point can be an object defined as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A host with a 32 bit subnet mask&lt;/LI&gt;&lt;LI&gt;A network&lt;/LI&gt;&lt;LI&gt;A named object&lt;/LI&gt;&lt;LI&gt;A member of a group&lt;/LI&gt;&lt;LI&gt;A user&lt;/LI&gt;&lt;LI&gt;A service or group of services&lt;/LI&gt;&lt;LI&gt;Applications&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 0.75em;"&gt;Rules can be very general, and very specific. More specific rules precede general rules.&lt;/P&gt;&lt;P style="margin-bottom: 0.75em;"&gt;&lt;/P&gt;&lt;H2 class="subtitle" style="margin-bottom: 0.6em; font-family: arial, helvetica, sans-serif; font-size: 1.2em;"&gt;How are applications identified?&lt;/H2&gt;&lt;P style="margin-bottom: 0.75em;"&gt;There are four technologies involved:&lt;/P&gt;&lt;OL style="margin-bottom: 0.75em; margin-left: 2em;"&gt;&lt;LI&gt;Protocol decoder&lt;/LI&gt;&lt;LI&gt;Protocol decryption&lt;/LI&gt;&lt;LI&gt;Application signature&lt;/LI&gt;&lt;LI&gt;Heuristics&lt;/LI&gt;&lt;/OL&gt;&lt;H2 class="subtitle" style="margin-bottom: 0.6em; font-size: 1.2em; color: #333333;"&gt;How do I manage so many applications?&lt;/H2&gt;&lt;P style="margin-bottom: 0.75em;"&gt;The Palo Alto firewall has a Graphical User Interface available through a standard web browser. One of the GUI screens provides the following search-able organizational categories:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Category - (like business, networking...)&lt;/LI&gt;&lt;LI&gt;Sub category - (like email, gaming...)&lt;/LI&gt;&lt;LI&gt;Technology - (like browser or peer-to-peer)&lt;/LI&gt;&lt;LI&gt;Characteristic - (like 'evasive' or 'tunnels other applications')&lt;/LI&gt;&lt;LI&gt;Risk level.&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 0.75em;"&gt;The risk level is a finger-in-the air enumeration which loosely categorizes how risky is the application. These risk levels are customizable, but there is little point in trying to do so since a new set of application signatures could upset your particular impression of risk, and trying to single-handedly manage all the risk levels raises some serious administrative overhead.&lt;/P&gt;&lt;P style="margin-bottom: 0.75em;"&gt;You can search applications by name, select by groups, manage the content of groups, and create a filter which dynamically generates a group.&lt;/P&gt;&lt;P style="margin-bottom: 0.75em;"&gt;Specific applications, statically defined groups, and dynamically generated groups can each be used in the policy.&lt;/P&gt;&lt;P style="margin-bottom: 0.75em;"&gt;The huge advantage of this approach is how it reduces the firewall administrator's overhead in maintaining policy. If your corporate security policy says, 'Deny Instant Messaging (IM)', then it's easy to create a dynamic rule called 'Instant messaging' and use that in a single deny rule. If a new IM technology is invented, then it will be included in the next application signature release, and the security policy requires no changes.&lt;/P&gt;&lt;P style="margin-bottom: 0.75em;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.75em;"&gt;or many more please visit : - &lt;A href="https://live.paloaltonetworks.com/docs/DOC-6900"&gt;How to Check if an Application Needs to have Explicitly Allowed Dependency Apps&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2014 04:10:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25959#M18933</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-06-06T04:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25960#M18934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also need to know how to allow Office365-related traffic ONLY.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Satish, I do understand how the firewall works, with all the objects and such.&lt;/P&gt;&lt;P&gt;The question is more specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Policy for a specific User Group that enables Office365 and related apps.&lt;/P&gt;&lt;P&gt;When enabling Office365, I need to also enable web-browsing.&lt;/P&gt;&lt;P&gt;When web-browsing is enabled, hosts that should only access Office365-related destinations are also able to access other web-sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can use URL Category blocking to deny access to all categories, and for that I would need to create a "whitelist" through Custom URL Category list allowing Office365-related URLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is a bad method - I don't know all the microsoft-related URLs, and can't expect microsoft to not change their service's URLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the recommended implementation method ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rodolfo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2014 21:08:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25960#M18934</guid>
      <dc:creator>Rodolfo_Cipher</dc:creator>
      <dc:date>2014-11-14T21:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25961#M18935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Three choices for you:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Use SSL Decryption&lt;/LI&gt;&lt;LI&gt;Create a custom URL category with microsoft/office365 URLs. &lt;/LI&gt;&lt;LI&gt;Ask Microsoft for a list of IP ranges to allow&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no other solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2014 19:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25961#M18935</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2014-11-15T19:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25962#M18936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was really hoping to resolve this at the application filter level, without having to resort to URL filters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand web-browsing has to be enabled in order to allow enough traffic to identify applications (i.e. office365, facebook, etc), however it would be awesome if there was a signature to match ´standard web browsing' - that is, traffic that hasn't been associated to a specific application after X amount of packets in a session (or ssession group).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way it'd be possible to filter this kind of traffic out, effectively allowing only the specific needed applications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RFE ? Feasable at all?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Nov 2014 08:13:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25962#M18936</guid>
      <dc:creator>Rodolfo_Cipher</dc:creator>
      <dc:date>2014-11-16T08:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25963#M18937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it works the way you describe but only but a few application like Facebook. For other you have to go this way unfortunately as of now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Nov 2014 09:21:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25963#M18937</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2014-11-16T09:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25964#M18938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have managed to do this by creating FQDN's for the Microsoft email servers and also a custom URL category.How we have achieved this is with 2 security rules. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First Security Rule: which allows users to the Microsoft email domains (FQDNs) on specific applications&lt;/P&gt;&lt;P&gt;&lt;IMG alt="d1.PNG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16908_d1.PNG" style="height: auto;" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second Security Rule: allows users to a specific custom url group (blacked out is the custom URL group we used for our customer) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="d2.PNG" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16909_d2.PNG" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;You should observe traffic of users who generate only this traffic to fully understand if you are missing a service, port, server (FQDN), and or URL. (This took one of co-workers a good amount of time to wrap a fence around it)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Nov 2014 14:38:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25964#M18938</guid>
      <dc:creator>lewis</dc:creator>
      <dc:date>2014-11-17T14:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25965#M18939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a very clean way to create the policy.&amp;nbsp; We didn't use the FQDN objects because of some internal issues.&amp;nbsp; We ended up allowing all of the MS subnets listed here:&amp;nbsp; &lt;A href="http://technet.microsoft.com/en-us/library/hh373144.aspx" title="http://technet.microsoft.com/en-us/library/hh373144.aspx"&gt;Office 365 URLs and IP address ranges&lt;/A&gt;.&amp;nbsp; The issue is that this list does change.&amp;nbsp; We experienced an issue with it recently.&amp;nbsp; Due to our size we also needed to use a source NAT pool to ensure MS didn't exceed TCP port limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question.&amp;nbsp; How did you confirm the entire list of FQDN entries required for your rule?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 22:26:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25965#M18939</guid>
      <dc:creator>r37775</dc:creator>
      <dc:date>2014-12-01T22:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Access only to Office 365</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25966#M18940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/people/r37775"&gt;r37775 &lt;/A&gt;Lets just say I have a very dedicated co-worker who put a good amount of time in to review the traffic logs. Knock on wood we have not had any calls indicating a user can not get to their mail.But in the event we did miss one or a new one is added by MS it should be a quick fix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Dec 2014 11:46:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-only-to-office-365/m-p/25966#M18940</guid>
      <dc:creator>lewis</dc:creator>
      <dc:date>2014-12-02T11:46:47Z</dc:date>
    </item>
  </channel>
</rss>

