- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-25-2019 09:39 AM
It appears as though all of the sudden ms-upate traffic is being picked up as either session-end reason threat or n/a and updates are failing on my MS servers. Regardless of the server they all seem to be hitting the unidentified default rule at the bottom.
07-25-2019 12:39 PM
under objects/decryption/decryption profile/ then in that decryption profile - for the profile itself,
Under SSL Decryption/SSL Forward proxy:
under server certificate verification -check the box that says block sessions with untrusted issuers
Under the No Decryption tab:
check the box for block sessions with untrusted issuers.
Note that this will break traffic if issuers are untrusted or expired, so be careful on what you apply this Decryption policy to if you have never had this applied and are running production traffic through this.
07-25-2019 11:50 AM
your not getting a decrypt-cert-validation end reason are you?
07-25-2019 12:00 PM
No I'm not. If I move to another security policy higher up it works (obviously) but I wan't to find out why this is occuring all of a sudden.
07-25-2019 12:03 PM
do you have a decryption profile that would identify that traffic and if so, do you have the "block untrusted issuers" check mark box populated - even if no decrypt?
Just curious, as it looks like MS may have a cert or destination that is not on the PA's, but I have yet to deterimine exactly the issue
07-25-2019 12:08 PM
I do have a decryption profile but not applied to all. I can insert on the server IPs and see what is going on. Where would I locate the "block untrusted issuers" check box
07-25-2019 12:39 PM
under objects/decryption/decryption profile/ then in that decryption profile - for the profile itself,
Under SSL Decryption/SSL Forward proxy:
under server certificate verification -check the box that says block sessions with untrusted issuers
Under the No Decryption tab:
check the box for block sessions with untrusted issuers.
Note that this will break traffic if issuers are untrusted or expired, so be careful on what you apply this Decryption policy to if you have never had this applied and are running production traffic through this.
08-02-2019 04:47 AM
Thanks all for your help and suggestions.I ended up creating a custom app and subsequent security policy to allow MS updates to run. I did open a case with TAC.
08-02-2019 11:00 AM
I'd be curious to hear what they recommend.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!