Need to create firewall policy that allows only Microsoft teams and rest all need to block

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
Palo Alto Networks Approved
Palo Alto Networks Approved
Community Expert Verified
Community Expert Verified

Need to create firewall policy that allows only Microsoft teams and rest all need to block

L0 Member

Hi Friends,

 

I would like to create Palo Alto configuration for specific range of IP address, not based on users.

My requirement is as follow.

1. Only Microsoft teams traffic (incoming and outgoing includes calls) should be allowed.

2. Want to block all other traffic includes web browsing, file sharing, social media, media streaming.

 

Anyone can suggest or support to create this type of configuration.

 

Thanks and Regards.

Adarsh

 

 

5 REPLIES 5

Cyber Elite
Cyber Elite

@adarshp2005,

Teams doesn't have a dedicated container app-id, instead it uses ms-teams, ms-teams-audio-video, ms-teams-downloading, ms-teams-editing, ms-teams-live-event, ms-teams-posting, ms-teams-sharing, and ms-teams-uploading. You can try building out an allow entry with those app-ids setup and deny all other traffic, but I'm not sure how well it'll actually function like that. 

Also keep in mind that much of Teams relies on other ms-office365 app-ids and certain functions certainly won't actually function correctly unless you include access to other ms-office365 applications. 

Hello,

In addition to what BPry already stated, you can use URL and/or destination IP filtering to limit the traffic to Microsoft.

 

https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-endpoints?view=o365-worldwid...

 

Cheers!

L0 Member

Hi,

 

For any specific application you want to allow only ( applications depend on SSL and Web-browsing), you can create two policies.

 

- One policy to allow SSL and Web-browsing for that application to work. configure the URL Category in this policy to use custom category contains only the URLs needed for that application

- Another policy to allow that application

 

In some cases, you have to add one more policy to allow destination IPs for that application to work

 

I did that for multiple applications such as Anydesk, Skype, Zoom, etc..

I did it also for MS Teams but still facing some issues

 

 

L0 Member

I still have this issue to allow gifs in Teams through the PAN.  I worked with Palo Alto Support and we ended up allowing Shareware and freeware and also online storage and backup for the HR URL Category group. I don't like this solution. What I need to do is just allow *.media0.giphy.com  through *media100.giphy.com - Is there a way to wildcard the number after Media?

Community Team Member

Hi @Daniel_Erlenbu ,

 

That specific usage of wildcard is not supported. You can only use wildcard characters as token placeholders which isn't the case in your query.  

 

Please read the section on how to use asterisk or caret wildcards in the following document:

https://docs.paloaltonetworks.com/advanced-url-filtering/administration/configuring-url-filtering/ur...

 

Kind regards,

-Kim.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 11345 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!