<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Decrypt Exchange traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64797#M38782</link>
    <description>&lt;P&gt;Hi Mikael&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, if you first restrict the service ports to a custom set of allowed ports (443 etc), this will restrict what kind of connections can be received.&lt;/P&gt;
&lt;P&gt;The server should be configured to reject non-encrypted connections on these ports.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Decrypting the flow and allowing the applications will enable you to control application behavior through AppID (abnormal/unexpected behavior should cause the session to be dropped), it will also enable Threat Protection for this inbound flow, making sure no malicious code or files are being transmitted at your server, you can even apply URL filtering or DLP profiles.&lt;/P&gt;
&lt;P&gt;If the flow is left encrypted the firewall cannot inspect for threats inside of the ssl tunnel and your server could be attacked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Fri, 18 Sep 2015 14:20:00 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2015-09-18T14:20:00Z</dc:date>
    <item>
      <title>Decrypt Exchange traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64776#M38767</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´m trying out decrypting traffic to and from our Exchange server. When decrypting incomming traffic the application change from SSL to what ever is in there. ie ms-exchange, outlook-web, rpc-over-http etc. Now for clients to be able to connect I need to allow all theese applications instead of only SSL. Would this potentially present more of a risk than to not decrypt the traffic at all?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please share youre thoughts on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;//Mikael&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 08:17:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64776#M38767</guid>
      <dc:creator>mgusta</dc:creator>
      <dc:date>2015-09-18T08:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt Exchange traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64780#M38770</link>
      <description>&lt;P&gt;Hi Mikael&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ideally you would create a security policy that not only allows the applications but also restricts the "tuples" eg. source and destination zones, ip's and ports&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you could select to set a service to restrict all traffic to only the ssl ports used by your exchange (usually 443 and possibly 993 for imap ssl) which will limit the "cleartext" applications to connect to their ssl ports only. performing ssl decryption will allow you to detect attacks and infected traffic which will help protect your exchange far better than only allowing pure ssl&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you'll want to manually create service objects instead of using "application default", as that would allow traffic on the default ports which you don't need in this scenario:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/382i5C38B7F3B4505F95/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="2015-09-18_11-50-19.png" title="2015-09-18_11-50-19.png" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 09:52:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64780#M38770</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-09-18T09:52:29Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt Exchange traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64782#M38771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I did set the zones and public IP of Exchange server. I did notice that using application default in our environment didn´t work since web-browing is only allowed on port 80 by default and we do a redirect to HTTPS. So for the test I used 'any' for service which I would restrict if I decide on implementing this. But you would say that decrypting this traffic and allowing those applications is better(=safer) than just letting it pass through as SSL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for you input on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;//Mikael&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 10:25:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64782#M38771</guid>
      <dc:creator>mgusta</dc:creator>
      <dc:date>2015-09-18T10:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Decrypt Exchange traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64797#M38782</link>
      <description>&lt;P&gt;Hi Mikael&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, if you first restrict the service ports to a custom set of allowed ports (443 etc), this will restrict what kind of connections can be received.&lt;/P&gt;
&lt;P&gt;The server should be configured to reject non-encrypted connections on these ports.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Decrypting the flow and allowing the applications will enable you to control application behavior through AppID (abnormal/unexpected behavior should cause the session to be dropped), it will also enable Threat Protection for this inbound flow, making sure no malicious code or files are being transmitted at your server, you can even apply URL filtering or DLP profiles.&lt;/P&gt;
&lt;P&gt;If the flow is left encrypted the firewall cannot inspect for threats inside of the ssl tunnel and your server could be attacked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 14:20:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/decrypt-exchange-traffic/m-p/64797#M38782</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-09-18T14:20:00Z</dc:date>
    </item>
  </channel>
</rss>

