<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Students, using HTTPS now on Proxies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51361#M37776</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could go for either an SSL decrypt - which would lead to a lot of messay (and very obvious) certificate errors on the client unless yous omehoe force distribute the self signed certificate out of the PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could create an Application Filter, add the sub-category Encrypted tunnel to it and add the application fitler to your "deny" rule. This stops most of the commonly identified tunnels - especially if you set it "any" in the service section of the deny rule (which you should do anyway).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Dec 2010 04:08:50 GMT</pubDate>
    <dc:creator>dagibbs</dc:creator>
    <dc:date>2010-12-06T04:08:50Z</dc:date>
    <item>
      <title>Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51358#M37773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have banned the http-proxy in school to stop them downloading and accessing sites they shouldn't, however they have now found using https based proxies bypasses this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is my next possible solution in my ever on going war with students. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice / help much appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 07:59:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51358#M37773</guid>
      <dc:creator>djbisbey</dc:creator>
      <dc:date>2010-11-30T07:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51359#M37774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Darren&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you could give SSL decrypt a try ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that will enable you to intercept encrypted traffic and analyse it as any other traffic.&lt;/P&gt;&lt;P&gt;Drawback might be that you either need to get a certificate on your paloalto and have the students import your cert as trusted or have a not-so-nice certificate error appear in their browsers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 08:26:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51359#M37774</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2010-11-30T08:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51360#M37775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also in a school enviroment and we setup a proxy application filter and block all the fall into the filter.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Nov 2010 20:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51360#M37775</guid>
      <dc:creator>Klein_it</dc:creator>
      <dc:date>2010-11-30T20:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51361#M37776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could go for either an SSL decrypt - which would lead to a lot of messay (and very obvious) certificate errors on the client unless yous omehoe force distribute the self signed certificate out of the PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could create an Application Filter, add the sub-category Encrypted tunnel to it and add the application fitler to your "deny" rule. This stops most of the commonly identified tunnels - especially if you set it "any" in the service section of the deny rule (which you should do anyway).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 04:08:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51361#M37776</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2010-12-06T04:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51362#M37777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Problem is...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in doing that they cannot go to legit SSL sites, essentially if I block SSL they cannot use https-proxy but if I do that they cannot use their webmail or SSL encrypted sites...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interesting one this.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might be just beyond the powers of this wonderful product. I wonder if I have found something it cannot actually do, I'd be amazed if that was the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 08:25:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51362#M37777</guid>
      <dc:creator>djbisbey</dc:creator>
      <dc:date>2010-12-06T08:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51363#M37778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What proxies are the students using? In many cases your PA firewall has applications defined to identify well known proxy services (e.g. ultrasurf).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the students discover a proxy service that is not part of the PA application ecology please open a ticket and let us know so that we can improve the product.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 14:38:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51363#M37778</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2010-12-06T14:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51364#M37779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;darren.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not true. SSL != Encrypted tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look through your traffic logs while this is happening. You should see packets which list "protocol" as SSL - but Application as something else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PA is smart enough to stop the unallowed applications while allowing "normal" web browsing-based SSL (I.E. banking sites, shopping sites etc).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http-proxy is not required for legitimate SSL sites, as far as I know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So - create an aplication filter called "tunnelling" or soemthing similar, add the sub-category "encrypted tunnel" to it, and then apply this application filter to a security policy with a DENY rule while leaving (or adding) SSL into your "allow" rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Dec 2010 21:07:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51364#M37779</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2010-12-06T21:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51365#M37780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could also block the destination IPs since odds are they are only used for SSL tunnels, but talk about a cat and mouse game.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 02:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51365#M37780</guid>
      <dc:creator>bjdraw</dc:creator>
      <dc:date>2010-12-07T02:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51366#M37781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I think I need to clarify a little...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The students have found that using sites like &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://proximize.me"&gt;https://proximize.me&lt;/A&gt;&lt;SPAN&gt; they can go to sites that are normally banned either by URL or APP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly the BrightCloud URL filter is less than perfect so the students do find proxy sites&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jiveTT-hover-user jive-username-link" href="https://live.paloaltonetworks.com/people/dagibbs" id="jive-44053,475,334,330,469,334"&gt;dagibbs&lt;/A&gt; stated that if I look at the logs I will Protocol as SSL this is not correct. &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been to this proximize site and browsed around the internet, OK all be it slowly..but it still bypass all application and url filtering not good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I see is the protocol TCP (if I am not mistaken the protocol is either TCP or UDP) and application ssl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So essentially the PA see's their traffic as SSL nothing more than that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the PA.jpg below, this is me browsing through the proxy, as you can see web-browsing and SSL are the only ones present, I think the web-browsing is my other browser window open which is normal internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So even if I selected 'encrypted-tunnel' it wouldn't make any difference what so ever as the PA is only seeing SSL traffic, its not seeing anything else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Presently the only way to stop this type of browsing is to block SSL which of course has other implications...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 10:02:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51366#M37781</guid>
      <dc:creator>djbisbey</dc:creator>
      <dc:date>2010-12-07T10:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51367#M37782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Resolved!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL Decrypt...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LOVE this PA what a unit...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 14:02:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51367#M37782</guid>
      <dc:creator>djbisbey</dc:creator>
      <dc:date>2010-12-07T14:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51368#M37783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the URL categorisation for this site in brightcloud it comes up in the "proxy Avoid and Anonymizers" category - so the simplest solution would be to apply a URL filter profile which blockas this category in its entirety (deny) and apply that profil to your outbound interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because it's an atempted SSL connection, the users will get no nice "Access denied" banner because the PA can't do that for HTTPS connections - but it should block them anyway owing to the database categorisation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course, if you don't have a valid web filter license you mgiht be in trouble. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I'm not sure if you can still create custom URL filter cetagories without the "general" web filter license, but you could try that also - create a custom URL filter category, add your proxy site to it, set it in a URL filter profile for "deny" with everything else allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could, as suggested, so SSL decrypt and stop them that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Dec 2010 21:19:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51368#M37783</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2010-12-07T21:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51369#M37784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dagibbs, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot award myself the Answer points, so I will give them to you for your help. &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2010 08:11:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51369#M37784</guid>
      <dc:creator>djbisbey</dc:creator>
      <dc:date>2010-12-08T08:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51370#M37785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Liking your style &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2010 08:50:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51370#M37785</guid>
      <dc:creator>James</dc:creator>
      <dc:date>2010-12-08T08:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51371#M37786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share how you set up the SSL Decryption with another school district tech having the same issue? I'm not having any luck. Thanks! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jan 2011 13:49:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51371#M37786</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-01-06T13:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51372#M37787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a bug with application filtering, it doesn't seem to work on OS 3.1.5 or 3.1.6, not sure about previous version.&amp;nbsp; I logged a ticket with PaloAlto but looks like the bug is not important so it won't be fixed until release 4. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jan 2011 21:34:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51372#M37787</guid>
      <dc:creator>tontabli</dc:creator>
      <dc:date>2011-01-08T21:34:33Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51373#M37788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi tontabill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure if you work with your local sales team on the issue prioritisation they will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jan 2011 02:43:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51373#M37788</guid>
      <dc:creator>James</dc:creator>
      <dc:date>2011-01-09T02:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51374#M37789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;KRboerts, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is a PM waiting for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Jan 2011 09:20:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51374#M37789</guid>
      <dc:creator>djbisbey</dc:creator>
      <dc:date>2011-01-13T09:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51375#M37790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just got into the PA this past year. Would you mind sharing how you set up the SSL Decryption with our school?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Mar 2013 14:32:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51375#M37790</guid>
      <dc:creator>MemphisBrothers</dc:creator>
      <dc:date>2013-03-07T14:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51376#M37791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try going here:&amp;nbsp; &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2008"&gt;https://live.paloaltonetworks.com/docs/DOC-2008&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Mar 2013 23:59:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/51376#M37791</guid>
      <dc:creator>HITSSEC</dc:creator>
      <dc:date>2013-03-07T23:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: Students, using HTTPS now on Proxies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/341562#M85670</link>
      <description>&lt;P&gt;For the safety of data transportation, experts advise students to use the HTTPS protocol, because any information entered using SSL is encrypted, so in case of interception, the attacker receives a random set of characters and can download your dissertation.&lt;BR /&gt;&lt;A href="https://customwritingz.net/" target="_self"&gt;https://customwritingz.net&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 08:57:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/students-using-https-now-on-proxies/m-p/341562#M85670</guid>
      <dc:creator>ThomasConlin</dc:creator>
      <dc:date>2020-07-31T08:57:57Z</dc:date>
    </item>
  </channel>
</rss>

