<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic External Email Server Filtering in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/246654#M70222</link>
    <description>&lt;P&gt;We have a ListServ server which needs to accept email from a user hosted in Office 365.&amp;nbsp; I would like to limit the security rule allowing the inbound traffic to only accept SMTP connections from the O365 mail servers.&amp;nbsp; I know the list of those servers can be dynamic, so I was wondering if this is even possible, or if there is a more effective method for filtering this traffic on the network perimeter?&lt;/P&gt;</description>
    <pubDate>Fri, 18 Jan 2019 19:07:05 GMT</pubDate>
    <dc:creator>CastawayKid</dc:creator>
    <dc:date>2019-01-18T19:07:05Z</dc:date>
    <item>
      <title>External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/246654#M70222</link>
      <description>&lt;P&gt;We have a ListServ server which needs to accept email from a user hosted in Office 365.&amp;nbsp; I would like to limit the security rule allowing the inbound traffic to only accept SMTP connections from the O365 mail servers.&amp;nbsp; I know the list of those servers can be dynamic, so I was wondering if this is even possible, or if there is a more effective method for filtering this traffic on the network perimeter?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 19:07:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/246654#M70222</guid>
      <dc:creator>CastawayKid</dc:creator>
      <dc:date>2019-01-18T19:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/246685#M70227</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77499"&gt;@CastawayKid&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you're up to utilizing MineMeld, they actually have Office 365 prototypes built out already to accomplish this so you don't have to duplicate the work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 21:42:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/246685#M70227</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-01-18T21:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247433#M70398</link>
      <description>&lt;P&gt;It looks like the MineMeld product is a bit overkill for what I'm needing.&amp;nbsp; I was just hoping to point to an EDL and be done with it.&amp;nbsp; I don't have VMWare or an Azure cloud account.&amp;nbsp; My virtualization environment is a Microsoft Hyper-V cluster.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 20:42:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247433#M70398</guid>
      <dc:creator>CastawayKid</dc:creator>
      <dc:date>2019-01-24T20:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247441#M70400</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Unfortunatly there is no easy answer on this. They did provide some assitance. Check out this link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service" target="_blank"&gt;https://docs.microsoft.com/en-us/office365/enterprise/office-365-ip-web-service&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 20:46:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247441#M70400</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-01-24T20:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247453#M70405</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77499"&gt;@CastawayKid&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I don't know of any publically available EDLs to accomplish this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also just as a note, MineMeld takes maybe an hour tops to configure it to the point where you can get what you are looking for, as it's a built in prototype. You can run MineMeld on a minimal Ubuntu Server install easily on your Hyper-V cluster; VMWare or Azure is completely not a requirement.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 21:07:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247453#M70405</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-01-24T21:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247455#M70407</link>
      <description>&lt;P&gt;Ok, when I have time I can try looking into how to get that setup.&amp;nbsp; I'll readily admit almost all my Linux experience has been limited to working on specific vendor products using specific builds for their products.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Until then, I've attempted to modify my inbound security rule using URL Categories.&amp;nbsp; I then made a custom URL list including domains such as *.outlook.com.&amp;nbsp; Does this have potential to work as well, or am I misunderstanding the use of the URL Category feature within a security policy rule?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 21:16:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247455#M70407</guid>
      <dc:creator>CastawayKid</dc:creator>
      <dc:date>2019-01-24T21:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247458#M70410</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77499"&gt;@CastawayKid&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm actually not certain that you'll always get the URL in a custom URL category to actually accomplish this.&amp;nbsp;You'll get assigned categories due to StartTLS connections if enabled, but I don't recall really being able to see the URL in the logs for SMTP connections.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 21:42:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247458#M70410</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-01-24T21:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: External Email Server Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247658#M70467</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77499"&gt;@CastawayKid&lt;/a&gt;&lt;/P&gt;&lt;P&gt;If the smtp connection is encrypted (SMTPs) then yes you will see an URL, but this normally the CN of the used certificate in such connections. The problem in your case is this cannot be used for incoming connections as you then only have the name of your own mailserver in the URL-logs and not the source.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jan 2019 15:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-email-server-filtering/m-p/247658#M70467</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-01-26T15:59:19Z</dc:date>
    </item>
  </channel>
</rss>

