<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure Active Directory IP ranges in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/310699#M96207</link>
    <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to use Minemeld to create an EDL that includes only the IP address ranges used by Azure AD.&lt;/P&gt;
&lt;P&gt;I've tried a few things, but can't seem to get it to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My current setup is as follows&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Miner = cloudIPsWithServiceTags&lt;/P&gt;
&lt;P&gt;Processor = based on&amp;nbsp;&lt;SPAN&gt;stdlib_aggregatorIPv4Generic but using the following config&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;infilters:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- &amp;nbsp; actions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - accept&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; conditions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - __method == 'withdraw'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; name: accept withdraws&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- &amp;nbsp; actions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - accept&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; conditions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - type == 'IPv4'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - azure_system_service == 'AzureAD'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; name: accept IPv4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;whitelist_prefixes:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- wl&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Output = feedHCGreen&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The current config kinda works. It returns 7 IP address ranges, instead of the 158 that are included in the JSON. I think what is happening is that it only returns the ones that are unique to the AzureActiveDirectory name space. All the others are duplicated elsewhere in the JSON. Any ideas for how to get it to output all the values that are shown under AzureActiveDirectory, not just the unique ones?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The JSON URL is &lt;A href="https://www.microsoft.com/en-us/download/confirmation.aspx?id=56519" target="_blank"&gt;https://www.microsoft.com/en-us/download/confirmation.aspx?id=56519&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The output I am currently getting is:&lt;/P&gt;
&lt;PRE&gt;104.40.168.0-104.40.168.63
13.71.201.64-13.71.201.127
13.74.104.0-13.74.104.63
13.87.16.0-13.87.16.63
20.190.128.0-20.190.191.255
40.126.0.0-40.126.63.255
51.140.208.0-51.140.208.63&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I've also tried to modify the miner by using the following, but neither seem to work. They return all the indicators.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;extractor: values[?id=='AzureActiveDirectory'].properties[].addressPrefixes[]&lt;BR /&gt;or&lt;BR /&gt;extractor: values[?id=='AzureActiveDirectory']&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Dan&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2020 03:32:55 GMT</pubDate>
    <dc:creator>dpurton</dc:creator>
    <dc:date>2020-02-12T03:32:55Z</dc:date>
    <item>
      <title>Azure Active Directory IP ranges</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/310699#M96207</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to use Minemeld to create an EDL that includes only the IP address ranges used by Azure AD.&lt;/P&gt;
&lt;P&gt;I've tried a few things, but can't seem to get it to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My current setup is as follows&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Miner = cloudIPsWithServiceTags&lt;/P&gt;
&lt;P&gt;Processor = based on&amp;nbsp;&lt;SPAN&gt;stdlib_aggregatorIPv4Generic but using the following config&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;infilters:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- &amp;nbsp; actions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - accept&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; conditions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - __method == 'withdraw'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; name: accept withdraws&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- &amp;nbsp; actions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - accept&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; conditions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - type == 'IPv4'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; - azure_system_service == 'AzureAD'&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; name: accept IPv4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;whitelist_prefixes:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- wl&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Output = feedHCGreen&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The current config kinda works. It returns 7 IP address ranges, instead of the 158 that are included in the JSON. I think what is happening is that it only returns the ones that are unique to the AzureActiveDirectory name space. All the others are duplicated elsewhere in the JSON. Any ideas for how to get it to output all the values that are shown under AzureActiveDirectory, not just the unique ones?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The JSON URL is &lt;A href="https://www.microsoft.com/en-us/download/confirmation.aspx?id=56519" target="_blank"&gt;https://www.microsoft.com/en-us/download/confirmation.aspx?id=56519&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The output I am currently getting is:&lt;/P&gt;
&lt;PRE&gt;104.40.168.0-104.40.168.63
13.71.201.64-13.71.201.127
13.74.104.0-13.74.104.63
13.87.16.0-13.87.16.63
20.190.128.0-20.190.191.255
40.126.0.0-40.126.63.255
51.140.208.0-51.140.208.63&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I've also tried to modify the miner by using the following, but neither seem to work. They return all the indicators.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;extractor: values[?id=='AzureActiveDirectory'].properties[].addressPrefixes[]&lt;BR /&gt;or&lt;BR /&gt;extractor: values[?id=='AzureActiveDirectory']&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Dan&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 03:32:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/310699#M96207</guid>
      <dc:creator>dpurton</dc:creator>
      <dc:date>2020-02-12T03:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Active Directory IP ranges</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/313344#M96208</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i'm in the same situation.&lt;/P&gt;
&lt;P&gt;i dont understand why i cannot get the IPs from the name "AzureCloud.westeurope".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my filters:&lt;/P&gt;
&lt;TABLE class="table table-condensed"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;NAME&lt;/TH&gt;
&lt;TH&gt;CONDITIONS&lt;/TH&gt;
&lt;TH&gt;ACTIONS&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;accept withdraws&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;__method == 'withdraw'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AzureActiveDirectory&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name == 'AzureActiveDirectory'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AzureAdvancedThreatProtection&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name == 'AzureAdvancedThreatProtection'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AppService&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name == 'AppService'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AppServiceManagement&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name_list == 'AppServiceManagement'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AppService.NorthEurope&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name == 'AppService.NorthEurope'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AzureCloud.northeurope&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name == 'AzureCloud.northeurope'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;AppService.WestEurope&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;share_level == 'green'&lt;/LI&gt;
&lt;LI&gt;type == 'IPv4'&lt;/LI&gt;
&lt;LI&gt;azure_name == 'AppService.WestEurope'&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;AzureCloud.westeurope&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;share_level == 'green'&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;type == 'IPv4'&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;azure_name == 'azurecloud.westeurope'&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;accept&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;drop all&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;drop&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logs shows TRACE/DROP for a range:&lt;/P&gt;
&lt;P&gt;{&lt;BR /&gt;"confidence": 100,&lt;BR /&gt;"azure_system_service_list": [&lt;BR /&gt;""&lt;BR /&gt;],&lt;BR /&gt;"azure_platform_list": [&lt;BR /&gt;"azure"&lt;BR /&gt;],&lt;BR /&gt;"azure_region": "",&lt;BR /&gt;"share_level": "green",&lt;BR /&gt;"azure_id": "AzureCloud",&lt;BR /&gt;"sources": [&lt;BR /&gt;"Azure-worldwide-miner-2"&lt;BR /&gt;],&lt;BR /&gt;"azure_name": "AzureCloud",&lt;BR /&gt;"azure_name_list": [&lt;BR /&gt;"azurecloud.westeurope",&lt;BR /&gt;"azurecloud"&lt;BR /&gt;],&lt;BR /&gt;"azure_id_list": [&lt;BR /&gt;"azurecloud.westeurope",&lt;BR /&gt;"azurecloud"&lt;BR /&gt;],&lt;BR /&gt;"azure_region_list": [&lt;BR /&gt;"",&lt;BR /&gt;"westeurope"&lt;BR /&gt;],&lt;BR /&gt;"azure_system_service": "",&lt;BR /&gt;"first_seen": 1582736638722,&lt;BR /&gt;"azure_platform": "Azure",&lt;BR /&gt;"type": "IPv4",&lt;BR /&gt;"last_seen": 1582736638722&lt;BR /&gt;}&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;pls advice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 16:59:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/313344#M96208</guid>
      <dc:creator>Farouk.Kahoul</dc:creator>
      <dc:date>2020-02-27T16:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Active Directory IP ranges</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/313947#M96209</link>
      <description>&lt;P&gt;&amp;nbsp;think the question is: "how to build a condition to ACCEPT the entry if at least one variable is on the list"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my filter is &lt;STRONG&gt;azure_name_list == 'AzureActiveDirectory'&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this one has been accepted:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;azure_name_list:[azureactivedirectory]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this one has been dropped:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;azure_name_list:[azureactivedirectory,azureactivedirectorydomainservices]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;because this IP entry is used for both ranges "azureactivedirectory" and "azureactivedirectorydomainservices".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i tried&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;conditions:&lt;BR /&gt;- share_level == "green"&lt;BR /&gt;- type == "IPv4"&lt;BR /&gt;- contains(azure_name_list, 'AzureActiveDirectory') == true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but syntax should not be good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there someone able to help me on the YAML syntax to build a condition where at least the variable is present on the list?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 17:16:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/313947#M96209</guid>
      <dc:creator>Farouk.Kahoul</dc:creator>
      <dc:date>2020-03-02T17:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Active Directory IP ranges</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/314282#M96210</link>
      <description>&lt;P&gt;So I got it working with the following setup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- Create a new prototype based on stdlib.feedHCWithValue &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;- change the config with the following&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="c-mrkdwn__pre" data-stringify-type="pre"&gt;infilters:&lt;BR /&gt;-   actions:&lt;BR /&gt;    - accept&lt;BR /&gt;    conditions:&lt;BR /&gt;    - __method == 'withdraw'&lt;BR /&gt;    name: accept withdraws&lt;BR /&gt;-   actions:&lt;BR /&gt;    - accept&lt;BR /&gt;    conditions:&lt;BR /&gt;    - contains(azure_system_service_list, 'azuread') == true&lt;BR /&gt;    name: accept azuread&lt;BR /&gt;-   actions:&lt;BR /&gt;    - drop&lt;BR /&gt;    name: drop all&lt;BR /&gt;store_value: true&lt;/PRE&gt;
&lt;P&gt;-&amp;nbsp;&lt;SPAN&gt;use the new prototype to create an output node and connect it &lt;/SPAN&gt;&lt;STRONG data-stringify-type="bold"&gt;directly&lt;/STRONG&gt;&lt;SPAN&gt; to the AzureCloudIPWithRanges Miner&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 22:41:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/314282#M96210</guid>
      <dc:creator>dpurton</dc:creator>
      <dc:date>2020-03-03T22:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Active Directory IP ranges</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/314339#M96211</link>
      <description>&lt;P&gt;Merci milles Dpurton !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;my experience:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- use combinations of filters as conditions: contains(xxxxxx_xxxx_list, 'lowercasename') == true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;note the lowercase !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also, if you want to filter on a field that contains a "." like name or id, it seems it doesn't work, you will have to use others fields like region+service for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this is my prototype based on stdlib.feedHCWithValue :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;infilters:&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- __method == 'withdraw'&lt;BR /&gt;name: accept withdraws&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- contains(azure_system_service_list, 'azureappservice') == true&lt;BR /&gt;name: accept AzureAppService&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- contains(azure_region_list, 'northeurope') == true&lt;BR /&gt;- contains(azure_system_service_list, '') == true&lt;BR /&gt;name: accept northeurope_system_service_empty&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- contains(azure_region_list, 'westeurope') == true&lt;BR /&gt;- contains(azure_system_service_list, '') == true&lt;BR /&gt;name: accept westeurope_system_service_empty&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- contains(azure_system_service_list, 'azuread') == true&lt;BR /&gt;name: accept azuread&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- contains(azure_system_service_list, 'azureadvancedthreatprotection') == true&lt;BR /&gt;name: accept AzureAdvancedThreatProtection&lt;BR /&gt;- actions:&lt;BR /&gt;- accept&lt;BR /&gt;conditions:&lt;BR /&gt;- contains(azure_system_service_list, 'azureappservicemanagement') == true&lt;BR /&gt;name: accept AzureAppServiceManagement&lt;BR /&gt;- actions:&lt;BR /&gt;- drop&lt;BR /&gt;name: drop all&lt;BR /&gt;store_value: true&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 11:22:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/azure-active-directory-ip-ranges/m-p/314339#M96211</guid>
      <dc:creator>Farouk.Kahoul</dc:creator>
      <dc:date>2020-03-04T11:22:56Z</dc:date>
    </item>
  </channel>
</rss>

