cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Who rated this post

L4 Transporter

Hello, you can create a Policy, allow apps ssl, web-browser, and microsoft update app ( Microsoft Update use port 80/443 ) and create a custom category URL, with allowed microsoft update subdomains, put in the URL category in the secure policy.

 

microsoft update subdomains/FQDN:

https://learn.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deplo...

 

Whit that only allow ssl/https and microsft update app to the destination for the Microsoft update services. You can doit the same for Sophos.

 

Of course it will allow access to the servers to the Internet, but only at the level of the destination in the URL custom category, and nothing else. Additional to protect add profile security policy. And then with another rule close all the rest of the servers access, a total deny of all the rest and above/free the policy of ms-update, web-browser, ssl only to the URLs in question (ms-update and sophos).

 

Cheers

High Sticker

View solution in original post

Who rated this post