<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow only MS Intune and Windows Update - block all internet access in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343718#M86029</link>
    <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am after permitting&amp;nbsp;only MS Intune and Windows Update - block all internet access.&lt;/P&gt;&lt;P&gt;I have followed the custom URL filtering as mentioned in the link below:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRfCAK&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRfCAK&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Created the custom url filter:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_0-1597318380297.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27352i2D1723900351D577/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_0-1597318380297.png" alt="kams19_0-1597318380297.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;then created a policy allowing - web-browsing, ssl and ms-update&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_1-1597318419497.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27353i9D596776087053E3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_1-1597318419497.png" alt="kams19_1-1597318419497.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;selected correct URL-category::&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_3-1597318525650.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27355i98F152030C93B03F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_3-1597318525650.png" alt="kams19_3-1597318525650.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Time to Test: destination IP is for&amp;nbsp;portal.manage.microsoft.com and it hits the correct policy&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_4-1597318560001.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27356i23EC9023EB602FFD/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_4-1597318560001.png" alt="kams19_4-1597318560001.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;but when I try with google.com IP address, that also hits the same policy&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_2-1597318485271.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27354i8E07A17ACF8D2C82/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_2-1597318485271.png" alt="kams19_2-1597318485271.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;From the above it seems that google.com will also be allowed?&lt;/P&gt;&lt;P&gt;I dont have an actual host to test the same, hence tested it from the Troubleshooting section of the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me it seems that the firewall is permitting any url being accessed over ssl, and ignoring the URL category.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main reason for using custom URL filter is that I want to use wildcard FQDN.&lt;/P&gt;&lt;P&gt;Can someone suggest why the URL filtering is not taking effect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Aug 2020 11:41:00 GMT</pubDate>
    <dc:creator>kams19</dc:creator>
    <dc:date>2020-08-13T11:41:00Z</dc:date>
    <item>
      <title>Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343718#M86029</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am after permitting&amp;nbsp;only MS Intune and Windows Update - block all internet access.&lt;/P&gt;&lt;P&gt;I have followed the custom URL filtering as mentioned in the link below:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRfCAK&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRfCAK&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Created the custom url filter:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_0-1597318380297.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27352i2D1723900351D577/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_0-1597318380297.png" alt="kams19_0-1597318380297.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;then created a policy allowing - web-browsing, ssl and ms-update&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_1-1597318419497.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27353i9D596776087053E3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_1-1597318419497.png" alt="kams19_1-1597318419497.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;selected correct URL-category::&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_3-1597318525650.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27355i98F152030C93B03F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_3-1597318525650.png" alt="kams19_3-1597318525650.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Time to Test: destination IP is for&amp;nbsp;portal.manage.microsoft.com and it hits the correct policy&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_4-1597318560001.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27356i23EC9023EB602FFD/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_4-1597318560001.png" alt="kams19_4-1597318560001.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;but when I try with google.com IP address, that also hits the same policy&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_2-1597318485271.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27354i8E07A17ACF8D2C82/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_2-1597318485271.png" alt="kams19_2-1597318485271.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;From the above it seems that google.com will also be allowed?&lt;/P&gt;&lt;P&gt;I dont have an actual host to test the same, hence tested it from the Troubleshooting section of the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me it seems that the firewall is permitting any url being accessed over ssl, and ignoring the URL category.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main reason for using custom URL filter is that I want to use wildcard FQDN.&lt;/P&gt;&lt;P&gt;Can someone suggest why the URL filtering is not taking effect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 11:41:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343718#M86029</guid>
      <dc:creator>kams19</dc:creator>
      <dc:date>2020-08-13T11:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343739#M86032</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152025"&gt;@kams19&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With that rule theoreticaĺly every IP will match. Because of that you also configured the custom URL category. So when a host tries to connect to google.com, the tcp handshake will succed, but in the TLS handshake, the firewaĺl will see the hostname and from that point on the connection will no longer match your windows update rule and it will be dropped (except if you have some more rules that could match for that connection). In the policy match test, if you choose also the URL category, then the result will show what you actually expected.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 14:28:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343739#M86032</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-13T14:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343743#M86035</link>
      <description>&lt;P&gt;HI &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;, Thanks for your reply, now I understand the logic behind this. I did select the URL category as you mentioned but I am getting this error now:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_0-1597329551231.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27360i89BD47D99FA4816E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_0-1597329551231.png" alt="kams19_0-1597329551231.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Any idea why this should happen?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 14:39:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343743#M86035</guid>
      <dc:creator>kams19</dc:creator>
      <dc:date>2020-08-13T14:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343755#M86042</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152025"&gt;@kams19&lt;/a&gt;&amp;nbsp;it looks like this is a bug. Only the paloalto url categories work and every custom url category leads to this error. I tested with PAN-OS 10.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 15:28:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343755#M86042</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-13T15:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343756#M86043</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For CLI, PA has mentioned the workaround as per&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLjeCAG" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLjeCAG&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But that is assuming multi vsys config. My case is single vsys and single virtual router. There is no option on GUI to select vsys and VR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe tomorrow I should have someone on site and I will ask them to connect their laptop to verify this.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 15:51:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343756#M86043</guid>
      <dc:creator>kams19</dc:creator>
      <dc:date>2020-08-13T15:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343758#M86044</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/152025"&gt;@kams19&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for bringing this to my attention. With this I tried again. So if you manually add "vsys1+" in front of the URL category name, the test works and no longer shows an error. I also tested on a firewall with a single vsys - so there is only vsys1.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 16:28:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343758#M86044</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-13T16:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343761#M86045</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont have ssh connection to the firewall at the moment, trying to get my local laptop firewall sorted.&lt;/P&gt;&lt;P&gt;I dont think there is a way this can be done from GUI?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 16:34:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343761#M86045</guid>
      <dc:creator>kams19</dc:creator>
      <dc:date>2020-08-13T16:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343763#M86046</link>
      <description>&lt;P&gt;What I meant was that you should add "vsys1+" in the GUI. At least in my case it was working in CLI and WebUI.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 16:50:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343763#M86046</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2020-08-13T16:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: Allow only MS Intune and Windows Update - block all internet access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343789#M86048</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ok got it working on the Troubleshooting section-&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kams19_0-1597339513573.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27362iB9D326BA02788143/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="kams19_0-1597339513573.png" alt="kams19_0-1597339513573.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;will see how the policy is applied in action tomorrow and update&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2020 17:31:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/allow-only-ms-intune-and-windows-update-block-all-internet/m-p/343789#M86048</guid>
      <dc:creator>kams19</dc:creator>
      <dc:date>2020-08-13T17:31:26Z</dc:date>
    </item>
  </channel>
</rss>

