<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173235#M54560</link>
    <description>&lt;P&gt;Not relevant in this topic, but if you ONLY want to allow windows updates and deny everything else towards the internet, you have to add crl.microsoft.com and &lt;A href="http://www.microsoft.com" target="_blank"&gt;www.microsoft.com&lt;/A&gt; as microsoft hosts two CRLs there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&amp;gt; do not add *.microsoft.com to your custom url category as this will also allow the "customer experience" microsoft analysis service/spyware to send out data...&lt;/P&gt;</description>
    <pubDate>Fri, 25 Aug 2017 14:42:09 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2017-08-25T14:42:09Z</dc:date>
    <item>
      <title>Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/172897#M54503</link>
      <description>&lt;P&gt;&lt;BR /&gt;Me again and file blocking per PA best practice (PE, multi-level, etc..) and allowing ms-update on application default. &amp;nbsp;However the WSUS server is not able to download any updates and its classifying a PE file as a threat. &amp;nbsp;The file in question is&amp;nbsp;am_delta_patch_1.249.1313.0_52b04aae0eb450654fc89884b43d10b7ed5 and threat-id is 52060 but nothing matches in the Threat Vault. &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Do I need a specific rule allowing windows updates that specifically allows PE files? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa-threat-pe.JPG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10902i77A273EDFDAF36D8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="pa-threat-pe.JPG" alt="pa-threat-pe.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 19:07:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/172897#M54503</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-23T19:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/172916#M54508</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;On the WSUS server you'll need to allow PE downloads, Once you have a policy allowing the WSUS server to actually download the PE files you should be good to go.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 19:57:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/172916#M54508</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-23T19:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/172917#M54509</link>
      <description>&lt;P&gt;What the easiest way to do that for all users, ms websites and whatever relevant file types? &amp;nbsp;I read an old article about PA and MS-updates but I don't want to block web browsing. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Block-Web-Browsing-while-Allowing-Microsoft-Updates/ta-p/58399&amp;nbsp;" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Block-Web-Browsing-while-Allowing-Microsoft-Updates/ta-p/58399&amp;nbsp;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2017 20:38:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/172917#M54509</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-23T20:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173095#M54534</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Is your WSUS server in the same zone as your clients?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 14:24:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173095#M54534</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-24T14:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173108#M54541</link>
      <description>&lt;P&gt;Yes.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 14:42:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173108#M54541</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-24T14:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173109#M54542</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You really shouldn't have to worry about it then as the traffic wouldn't pass through your firewall so your File-Blocking profiles wouldn't effect anything. Allowing the WSUS server to go out and grab the updates should be the only step you need to take at that point.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 14:47:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173109#M54542</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-24T14:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173119#M54544</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You really shouldn't have to worry about it then as the traffic wouldn't pass through your firewall so your File-Blocking profiles wouldn't effect anything. Allowing the WSUS server to go out and grab the updates should be the only step you need to take at that point.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It would if the machines weren't part of the domain (we have both domain and non-domain windows) and thus not getting updates from WSUS. &amp;nbsp; Therefore I need to make sure its allowed through. &amp;nbsp;To get it working until I (or PA support) can figure it out I just allowed PE files but that brings me to my next point which would fix this issue anyways. &amp;nbsp;Albeit not in any way shape or form that I would prefer it to be done. &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another issue today with downloading large files from the internet and having any profile applied to the matching policy causes them to slow to a crawl or stop completely. &amp;nbsp;The only way I can make it so the files complete is by having 0 profiles applied to the rule. &amp;nbsp;PA don't know why its doing it and don't know when they can get a resolution to me because they are 'busy with other cases.' &amp;nbsp;Still haven't heard back from imaps case which I opened on 8/21 (status says researching) although you guys helped me fix that one. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 16:14:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173119#M54544</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-24T16:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173128#M54545</link>
      <description>&lt;OL&gt;&lt;LI&gt;Create a custom url category with the following entries: *.update.microsoft.com, *.windowsupdates.microsoft.com, *.windowsupdate.com, windowsupdates.microsoft.com&lt;/LI&gt;&lt;LI&gt;Create a new security policy rule and attach the custom url category from step 1 directly to this policy in the url category column&lt;/LI&gt;&lt;LI&gt;Attach the security profiles you want to this rule but other than your normal internet access rule, allow pe files here&lt;/LI&gt;&lt;LI&gt;(If you decrypt tls traffic) create decryption exclusion rule where you use the same custom url category from step 1&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 24 Aug 2017 17:21:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173128#M54545</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-24T17:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173129#M54546</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34542"&gt;@drewdown&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Out of curiosity what PAN-OS version are you running? 8.0.4?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 17:28:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173129#M54546</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-08-24T17:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173137#M54548</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp; Thanks. &amp;nbsp;Couple questions though, &amp;nbsp;I created the URL category already and allowed all of those, do I need to block everything else? &amp;nbsp;Do I need to allow the app-ids or just leave it any/any?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;8.0.2&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 18:38:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173137#M54548</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-24T18:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173146#M54550</link>
      <description>&lt;P&gt;In my rule I use web-browsing, ssl and ms-update. What exatly do you mean with "block everything else"?&lt;/P&gt;&lt;P&gt;If you added the custom category into the security policy as described, traffic will only match that rule for these URL's and nothing else.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 18:55:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173146#M54550</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-24T18:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173155#M54551</link>
      <description>&lt;P&gt;I was confusing URL filter with URL category. &amp;nbsp; Do you do any file blocking with this specific rule?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will give it a try. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 20:25:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173155#M54551</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2017-08-24T20:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173169#M54554</link>
      <description>&lt;P&gt;No, in this case I have set the fileblocking to log all&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2017 22:37:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173169#M54554</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-24T22:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173235#M54560</link>
      <description>&lt;P&gt;Not relevant in this topic, but if you ONLY want to allow windows updates and deny everything else towards the internet, you have to add crl.microsoft.com and &lt;A href="http://www.microsoft.com" target="_blank"&gt;www.microsoft.com&lt;/A&gt; as microsoft hosts two CRLs there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&amp;gt; do not add *.microsoft.com to your custom url category as this will also allow the "customer experience" microsoft analysis service/spyware to send out data...&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2017 14:42:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/173235#M54560</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-08-25T14:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing ms-update on app-default, File blocking PE and therefore no windows updates</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/534860#M110045</link>
      <description>&lt;P&gt;I have a specific rule for the wsus server to only connect to Microsoft for Windows updates (Just like the one recommend here).&amp;nbsp; &amp;nbsp;The issue I have encounter so far is that it only downloads the definitions but won't download the actual update when I approve the KB.&amp;nbsp; Is there a specific URL where it downloads the update. I added all the URLs Microsoft recommends to the allowlist.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 14:58:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ms-update-on-app-default-file-blocking-pe-and-therefore/m-p/534860#M110045</guid>
      <dc:creator>HEscobar</dc:creator>
      <dc:date>2023-03-17T14:58:03Z</dc:date>
    </item>
  </channel>
</rss>

