<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure AD Application Proxy - Updatable objects in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124745#M75140</link>
    <description>&lt;P&gt;We are experiencing problems trying to use Azure AD updatable objects to allow an Azure AD Application Proxy host to&amp;nbsp;&lt;EM&gt;phone home&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;Two issues:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is there a reference document somewhere that explains what the various updatable objects actually reference. Each comment is currently simply a copy &amp;amp; paste to the same statement 'This is a Microsoft object, blah blah&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=56519'" target="_blank" rel="noopener"&gt;https://www.microsoft.com/en-us/download/details.aspx?id=56519'&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;We constantly have to supplement the updatable objects with additional IPs. I presume CheckPoint have contacts at Microsoft that they can address this with?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two examples:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We use 802.1X for both wireless and wired (port based) authentication where we want users to utilise Azure AD as a MFA method of registering their devices to the network. We subsequently created a rule that allows access to 'Azure Active Directory Domain Public Services' and 'Azure Active Directory Public Services' but many requests flow to destinations not covered by these.&lt;/LI&gt;&lt;LI&gt;We drop requests to unknown or uncategorised sites and want to allow 'Azure AD Connect' and 'Azure AD Application Proxy' hosts to connect back to Microsoft. There are again never ending hosts that we have to continually manually add to allowed network group objects.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My impression is that the current implementation is really half baked and whilst it ticks some boxes isn't reliable. Herewith some of the IPs we've had to add:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="updatable_object_azure_ad.png" style="width: 325px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12763i1571D2A8975F2546/image-size/large?v=v2&amp;amp;px=999" role="button" title="updatable_object_azure_ad.png" alt="updatable_object_azure_ad.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;David Herselman&lt;/P&gt;</description>
    <pubDate>Fri, 23 Jul 2021 09:15:08 GMT</pubDate>
    <dc:creator>David_Herselman</dc:creator>
    <dc:date>2021-07-23T09:15:08Z</dc:date>
    <item>
      <title>Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124745#M75140</link>
      <description>&lt;P&gt;We are experiencing problems trying to use Azure AD updatable objects to allow an Azure AD Application Proxy host to&amp;nbsp;&lt;EM&gt;phone home&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;Two issues:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is there a reference document somewhere that explains what the various updatable objects actually reference. Each comment is currently simply a copy &amp;amp; paste to the same statement 'This is a Microsoft object, blah blah&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=56519'" target="_blank" rel="noopener"&gt;https://www.microsoft.com/en-us/download/details.aspx?id=56519'&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;We constantly have to supplement the updatable objects with additional IPs. I presume CheckPoint have contacts at Microsoft that they can address this with?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Two examples:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We use 802.1X for both wireless and wired (port based) authentication where we want users to utilise Azure AD as a MFA method of registering their devices to the network. We subsequently created a rule that allows access to 'Azure Active Directory Domain Public Services' and 'Azure Active Directory Public Services' but many requests flow to destinations not covered by these.&lt;/LI&gt;&lt;LI&gt;We drop requests to unknown or uncategorised sites and want to allow 'Azure AD Connect' and 'Azure AD Application Proxy' hosts to connect back to Microsoft. There are again never ending hosts that we have to continually manually add to allowed network group objects.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My impression is that the current implementation is really half baked and whilst it ticks some boxes isn't reliable. Herewith some of the IPs we've had to add:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="updatable_object_azure_ad.png" style="width: 325px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12763i1571D2A8975F2546/image-size/large?v=v2&amp;amp;px=999" role="button" title="updatable_object_azure_ad.png" alt="updatable_object_azure_ad.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;David Herselman&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jul 2021 09:15:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124745#M75140</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2021-07-23T09:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124786#M75141</link>
      <description>&lt;P&gt;All Updatable Objects are backed by a feed provided by the relevant vendor (MSFT in this case).&lt;BR /&gt;You use the Domains Tool to see what is covered in a given Updatable Object.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk161632&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk161632&amp;amp;partition=Advanced&amp;amp;product=Quantum&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 00:08:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124786#M75141</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-24T00:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124796#M75142</link>
      <description>&lt;P&gt;Unfortunately doesn't help:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@fwcp1:0]# domains_tool -uo "Azure Active Directory Domain Public Services"

Domain tool looking for domains for 'Azure Active Directory Domain Public Services' and its children objects:

The updatable object Azure Active Directory Domain Public Services does not hold any domains
[Expert@fwcp1:0]# domains_tool -uo "Azure Active Directory Public Services"

Domain tool looking for domains for 'Azure Active Directory Public Services' and its children objects:

The updatable object Azure Active Directory Public Services does not hold any domains&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 07:04:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124796#M75142</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2021-07-24T07:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124798#M75143</link>
      <description>&lt;P&gt;Digging into this a bit more, it looks like you can find the IPs in $CPDIR/database/ONLINE_SERVICES/1.0/&amp;lt;version&amp;gt;/azure.C on the gateway.&lt;BR /&gt;In any case, Microsoft is ultimately responsible for updating the feed.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 07:21:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124798#M75143</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-24T07:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124799#M75144</link>
      <description>&lt;P&gt;Undocumented switches and incomplete address lists. Does CheckPoint not have contact at Microsoft they could address this with?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="updatable_object_search.png" style="width: 718px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12769i084448FD9560B0F2/image-size/large?v=v2&amp;amp;px=999" role="button" title="updatable_object_search.png" alt="updatable_object_search.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My original question also hasn't been answered so I presume the answer is 'No, CheckPoint do not provide a clue anywhere at to what subnets are chosen from Microsoft's lists to create the updatable objects'.&lt;/P&gt;&lt;P&gt;ie: You can try figure out yourself what someone in R&amp;amp;D cooked together?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My impression is that functionality of this nature is of great interest, but unusable in it's current state = half baked...&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 07:24:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124799#M75144</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2021-07-24T07:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124809#M75145</link>
      <description>&lt;P&gt;Like I said, Microsoft provide these lists, which are categorized.&lt;BR /&gt;There are, in fact, multiple lists.&lt;BR /&gt;For Azure US, it’s something like the following:&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=56519" target="_blank"&gt;https://www.microsoft.com/en-us/download/details.aspx?id=56519&lt;/A&gt;&lt;BR /&gt;See also:&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide" target="_blank"&gt;https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&lt;/A&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/22913"&gt;@Micky_Michaeli&lt;/a&gt;&amp;nbsp;do we have a backchannel with Microsoft for matters like this?&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jul 2021 16:35:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/124809#M75145</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-24T16:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/129549#M75146</link>
      <description>&lt;P&gt;FYI, I just went through a similar exercise with a customer trying to troubleshoot an issue with Azure-related services and Updatable Objects.&lt;BR /&gt;We were able to confirm that the ranges specified in the &lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=56519" target="_self"&gt;JSON file available from Microsoft&lt;/A&gt; correspond to what shows when using the relevant object in the rulebase and you execute dynamic_objects -uo_show.&lt;BR /&gt;The trick in our case was figuring out which Updatable Objects to include based on the services they were trying to access.&lt;BR /&gt;Between the JSON file and looking at&amp;nbsp;$CPDIR/database/downloads/ONLINE_SERVICES/1.0/&amp;lt;ver&amp;gt;/azure.C, I could see what objects needed to be included for this specific customer.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 22:54:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/129549#M75146</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-15T22:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/129906#M75147</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I had several meetings in the past with Microsoft people regarding multiple requests raised from our customers.&lt;/P&gt;
&lt;P&gt;Unfortunately, almost all our requests were answered as "currently it's not in our roadmap".&lt;/P&gt;
&lt;P&gt;As you wrote below, there are multiple objects for multiple services and the content can be viewed on the GW by running two commands, "dynamic_objects -uo_show" for getting the loaded IPs ranges and "domains_tool -uo &amp;lt;updatable objects name&amp;gt;" for getting the loaded domains.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Sep 2021 06:31:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/129906#M75147</guid>
      <dc:creator>Micky_Michaeli</dc:creator>
      <dc:date>2021-09-22T06:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/130090#M75148</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we have a similar issue.&lt;/P&gt;&lt;P&gt;We have a rule allowing http/https to "Office 365 Worldwide Services".&amp;nbsp;&lt;/P&gt;&lt;P&gt;This rule also allows connection to IP&amp;nbsp;104.46.60.117 (kyocera.biz). This IP shouldn't be included in the O365 Services.&lt;/P&gt;&lt;P&gt;When I run a dynamic_objects -uo_show the range&amp;nbsp;379 : 104.46.24.0 104.46.127.255 is only included in the object&amp;nbsp;CP_Azure_Azure. This object shouldn't be included in the object "Office 365 Worldwide Services".&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 14:53:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/130090#M75148</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2021-09-23T14:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/130120#M75149</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21737"&gt;@Jan_Kleinhans&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;The object&amp;nbsp;&lt;SPAN&gt;"Office 365 Worldwide Services" contains IP addresses and domains as part of its content.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;104.46.60.117 is not part of the IP addresses ranges of this object, this is correct, but it should be part of the domains associated to this object, that's why it's matched on it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I tried to see the resolving responses of domains of kyocera.biz, all of them returned domains of cloudapp.net as their canonical name.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;One of the domains of&amp;nbsp;"Office 365 Worldwide Services" is *.cloudapp.net, that's why it's possible to have the same IPs for domains of cloudapp.net and&amp;nbsp;kyocera.biz and that's why it's matched on this object.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;few examples:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nslookup rfs-us.kyocera.biz&lt;BR /&gt;rfs-us.kyocera.biz canonical name = kfs-us02-devicerest.cloudapp.net.&lt;BR /&gt;Name: kfs-us02-devicerest.cloudapp.net&lt;BR /&gt;Address: 23.101.190.57&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nslookup rfs.kyocera.biz&lt;BR /&gt;rfs.kyocera.biz canonical name = kfs-as02-devicerest.cloudapp.net.&lt;BR /&gt;Name: kfs-as02-devicerest.cloudapp.net&lt;BR /&gt;Address: 104.46.227.64&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nslookup fs-us.kyocera.biz&lt;BR /&gt;fs-us.kyocera.biz canonical name = kfs-us02-userweb.cloudapp.net.&lt;BR /&gt;Name: kfs-us02-userweb.cloudapp.net&lt;BR /&gt;Address: 23.102.187.77&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Micky&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 21:59:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/130120#M75149</guid>
      <dc:creator>Micky_Michaeli</dc:creator>
      <dc:date>2021-09-23T21:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD Application Proxy - Updatable objects</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/130310#M75150</link>
      <description>&lt;P&gt;Hello Micky,&lt;/P&gt;&lt;P&gt;thanks for clarification. So the usage of "Microsoft O365 Worldwide Services" is a pain as it includes *.cloudapp.net which seems to be a bunch of websites which have nothing to do with O365.&amp;nbsp; That is MS fault and not yours as I can see.&lt;BR /&gt;We will open a call with MS. Maybe they can remove *.cloudapp.net from the list.&lt;BR /&gt;Perhaps you could split the O365 services in categories as described here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-network-connectivity-principles?view=o365-worldwide#new-office-365-endpoint-categories" target="_blank"&gt;https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-network-connectivity-principles?view=o365-worldwide#new-office-365-endpoint-categories&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 08:08:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-AD-Application-Proxy-Updatable-objects/m-p/130310#M75150</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2021-09-27T08:08:06Z</dc:date>
    </item>
  </channel>
</rss>

