<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active directory OU as selection for users security policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/432675#M95780</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193027"&gt;@ChrisKarakostas&lt;/a&gt;&amp;nbsp;for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my knowledge it is not possible. In the security policy, you can use only AD Groups or Users.&lt;/P&gt;&lt;P&gt;Here is the link for Documentation:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-users-to-groups.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-users-to-groups.html&lt;/A&gt;&amp;nbsp;You can configure the Base-DN in LDAP profile for entire AD Domain, however when you configure Group Mapping Setting only Group Objects and User Objects are available and this is what you will end up using as source user in a security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are setting this up for the first time from scratch, below are a few KBs for reference:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGOCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGOCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: After you complete the LDAP profile and Group Mapping Setting with user/group include list, you will have to commit it first before you can select user/group as a source in the security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you get stuck with the setup do not hesitate to post your problem here, I will do my best to help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Sep 2021 22:10:19 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2021-09-08T22:10:19Z</dc:date>
    <item>
      <title>Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/432627#M95774</link>
      <description>&lt;P&gt;Hello all&lt;/P&gt;&lt;P&gt;I am new in Palo Alto devices and PanOS, so here is my questions.&lt;/P&gt;&lt;P&gt;Is there a way to select an active directory OU as a source user in a security policy?&lt;/P&gt;&lt;P&gt;(Or something else to manage it)&lt;/P&gt;&lt;P&gt;Working with Forcepoint they apply policies to a whole OU (and also users and groups)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advanced&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 15:43:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/432627#M95774</guid>
      <dc:creator>ChrisKarakostas</dc:creator>
      <dc:date>2021-09-08T15:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/432675#M95780</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193027"&gt;@ChrisKarakostas&lt;/a&gt;&amp;nbsp;for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my knowledge it is not possible. In the security policy, you can use only AD Groups or Users.&lt;/P&gt;&lt;P&gt;Here is the link for Documentation:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-users-to-groups.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-users-to-groups.html&lt;/A&gt;&amp;nbsp;You can configure the Base-DN in LDAP profile for entire AD Domain, however when you configure Group Mapping Setting only Group Objects and User Objects are available and this is what you will end up using as source user in a security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are setting this up for the first time from scratch, below are a few KBs for reference:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGOCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGOCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: After you complete the LDAP profile and Group Mapping Setting with user/group include list, you will have to commit it first before you can select user/group as a source in the security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you get stuck with the setup do not hesitate to post your problem here, I will do my best to help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 22:10:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/432675#M95780</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-08T22:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433254#M95845</link>
      <description>&lt;P&gt;Ok , it is clear for the user-group selection.&lt;/P&gt;&lt;P&gt;Now let me ask for another subject.&lt;/P&gt;&lt;P&gt;I'm trying to create a security rule to permit only microsoft365 appications, and nothing else for a specific group of users.&lt;/P&gt;&lt;P&gt;I choose the relevant app-id with their depentencies , application-default in services,action allow, but that policy permits also every web browsing traffic.&lt;/P&gt;&lt;P&gt;No other policies ,except the default implicit ones&lt;/P&gt;&lt;P&gt;Where am i wrong&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 07:52:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433254#M95845</guid>
      <dc:creator>ChrisKarakostas</dc:creator>
      <dc:date>2021-09-11T07:52:45Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433256#M95846</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193027"&gt;@ChrisKarakostas&lt;/a&gt;&amp;nbsp;for the update.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My best guess is following, if you have added the application: ms-office-365, then one of the dependency is: web-browsing. By adding this dependency, you have also enabled web browsing traffic:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PavelK_0-1631350055923.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/36339i2AE0816DCA849190/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PavelK_0-1631350055923.png" alt="PavelK_0-1631350055923.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 08:50:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433256#M95846</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-11T08:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433259#M95848</link>
      <description>&lt;P&gt;I added it.&lt;/P&gt;&lt;P&gt;But my problem is that i DON'T want further internet browsing except microsoft365&lt;/P&gt;&lt;P&gt;With my policy , internet browsing if permitted at all&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 09:16:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433259#M95848</guid>
      <dc:creator>ChrisKarakostas</dc:creator>
      <dc:date>2021-09-11T09:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433260#M95849</link>
      <description>&lt;P&gt;Thank you for quick reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193027"&gt;@ChrisKarakostas&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see. There might be other way around it, but probably the easiest one might be to configure your firewall to fetch IP addresses from EDL Hosting Service and configure this EDL as a destination in the policy you just created. Below links are covering more details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/edl-hosting-service-helps-to-safely-enable-microsoft-365/ba-p/410972" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/blogs/edl-hosting-service-helps-to-safely-enable-microsoft-365/ba-p/410972&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/resources/edl-hosting-service.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/resources/edl-hosting-service.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual process to configure it should be straight forward:&lt;/P&gt;&lt;P&gt;1. Import relevant certificates and configure EDL itself:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/configure-the-firewall-to-access-an-external-dynamic-list-from-the-edl-hosting-service/create-an-external-dynamic-list-using-the-edl-hosting-service.html#id846c30d3-765e-4e50-8466-90431d2c64b6" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/configure-the-firewall-to-access-an-external-dynamic-list-from-the-edl-hosting-service/create-an-external-dynamic-list-using-the-edl-hosting-service.html#id846c30d3-765e-4e50-8466-90431d2c64b6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Add EDL to security policy as a destination and remove destination any.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 10:10:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433260#M95849</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-11T10:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433268#M95850</link>
      <description>&lt;P&gt;It works.&lt;/P&gt;&lt;P&gt;Thanks again PavelK&lt;/P&gt;</description>
      <pubDate>Sat, 11 Sep 2021 17:16:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433268#M95850</guid>
      <dc:creator>ChrisKarakostas</dc:creator>
      <dc:date>2021-09-11T17:16:08Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433406#M95863</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193027"&gt;@ChrisKarakostas&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the Goup Mapping, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp; already provided excelent answer, to which I wanted to add:&lt;/P&gt;&lt;P&gt;You can check the "Custom Group" feature, which allowes you to create LDAP filter, based on which firewall will create user group that can be referenced in a rule - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ1CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClJ1CAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 08:19:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433406#M95863</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-09-13T08:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Active directory OU as selection for users security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433458#M95869</link>
      <description>&lt;P&gt;That's very helpfull&lt;/P&gt;&lt;P&gt;Thanks &lt;SPAN class="UserName lia-user-name lia-user-rank-Cyber-Elite"&gt;&lt;SPAN class="lia-link-navigation lia-page-link lia-link-disabled lia-user-name-link"&gt;&lt;SPAN class="login-bold"&gt;Astardzhiev&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 12:29:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-ou-as-selection-for-users-security-policy/m-p/433458#M95869</guid>
      <dc:creator>ChrisKarakostas</dc:creator>
      <dc:date>2021-09-13T12:29:08Z</dc:date>
    </item>
  </channel>
</rss>

