<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210417#M61466</link>
    <description>&lt;P&gt;I would recommend creating a custom url category which you add directly to the security policy rule (not via security profile).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Apr 2018 19:32:34 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-04-16T19:32:34Z</dc:date>
    <item>
      <title>Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210387#M61456</link>
      <description>&lt;P&gt;I have created a rule which requires access to Adobe-creative clolud. This application is dependent on SSL and web browsing. Setting this rule to allow aslo grants access to websites like Amazon.com or general internet access.&lt;/P&gt;&lt;P&gt;Is there a way to make it work just for the particular app? or I am missing something in creating the policy?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="talk.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14759i0DDF3C12BC25A5C1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="talk.JPG" alt="talk.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 17:30:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210387#M61456</guid>
      <dc:creator>Sanasheikh</dc:creator>
      <dc:date>2018-04-16T17:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210411#M61462</link>
      <description>&lt;P&gt;Hi Sanasheikh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can further lock down http/https access based on URL category.&amp;nbsp; Pretty sure you can use custom URL categories without URL Filtering license if you did not have one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 18:07:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210411#M61462</guid>
      <dc:creator>Ben-W</dc:creator>
      <dc:date>2018-04-16T18:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210412#M61463</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78612"&gt;@Sanasheikh&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In some cases it also works without adding the dependencies. You then probably get a commit warning, but it will not allow general webaccess.&lt;/P&gt;&lt;P&gt;Or as &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5754"&gt;@Ben-W&lt;/a&gt;&amp;nbsp;already pointed out, you can use a custom url category to restrict the access to only Adobe domains. The list with quite a few entries from adobe you can find here:&amp;nbsp;&lt;A href="https://helpx.adobe.com/in/enterprise/kb/network-endpoints.html" target="_blank"&gt;https://helpx.adobe.com/in/enterprise/kb/network-endpoints.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(And yes, using a custom URL category does not require a URL Filtering license)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 18:46:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210412#M61463</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-04-16T18:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210416#M61465</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5754"&gt;@Ben-W&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;I will create a URL category for adobe and hopefully that should fix it. But I am still confused why adding ssl and web-browsing for a specific app allows unwanted internet access. With the current set up I can almost browse anything like amazon.com etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do have a URL Filtering License for our firewall. Should I create a allow/block list and add to this adobe cc policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:28:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210416#M61465</guid>
      <dc:creator>Sanasheikh</dc:creator>
      <dc:date>2018-04-16T19:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210417#M61466</link>
      <description>&lt;P&gt;I would recommend creating a custom url category which you add directly to the security policy rule (not via security profile).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:32:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210417#M61466</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-04-16T19:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210418#M61467</link>
      <description>&lt;P&gt;Sure, I will do that. So Even though other appliations are not listed, Palo Alto opens up unwanted access if URL Category is not specified.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:34:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210418#M61467</guid>
      <dc:creator>Sanasheikh</dc:creator>
      <dc:date>2018-04-16T19:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210422#M61470</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78612"&gt;@Sanasheikh&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you are allowing a dependent application within a security rule then it's allowed just as any other application. So if I had a rule that allowed [ ssl web-browsing google-base ] other traffic would still match this rule until/if it was able to be identified as a more specific application.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Others have already pointed out ways around this so I won't rehash it, but you'll essentially want to pick one method or another to address this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:55:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210422#M61470</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-16T19:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210428#M61476</link>
      <description>&lt;P&gt;The "problem" is that not every application can be recocnized within a few packets. In some cases you first need to allow these dependencies, to allow enough traffic that the firewall will be able to see the adobe cc application. And again in other cases decryption is required to gain this visibility, because without that for example the firewall only sees web-browsing or ssl.&lt;/P&gt;&lt;P&gt;You actually don't have to allow the dependencies, but as I wrote, in some cases paloalto can only guarantee full functionality of the various apps when you allow these dependencies. As you see this can also have negative/unwanted sideeffects which you can restrict with this solution with the custom url category.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 20:20:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/210428#M61476</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-04-16T20:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing SSL and Web-browsing on dependent applications open unwanted Internet Access.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/211569#M61719</link>
      <description>&lt;P&gt;So adding URL filtering or URL category is the solution. Thank you so much for your help everyone. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 17:42:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allowing-ssl-and-web-browsing-on-dependent-applications-open/m-p/211569#M61719</guid>
      <dc:creator>Sanasheikh</dc:creator>
      <dc:date>2018-04-24T17:42:33Z</dc:date>
    </item>
  </channel>
</rss>

