<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Have you grepped the access in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886305#M6616</link>
    <description>&lt;P&gt;Have you grepped the access log then clicked Sync Now in WSUS to see what's going on?&lt;/P&gt;
&lt;P&gt;SSH to the WSA and&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;wsav1&amp;gt; grep to the WSA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;wsav1&amp;gt; &lt;STRONG&gt;grep&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; .&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; .&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; .&lt;BR /&gt;&lt;/STRONG&gt;39. "webcat_logs" Type: "Web Categorization Logs" Retrieval: FTP Poll&lt;BR /&gt;40. "webrootlogs" Type: "Webroot Logs" Retrieval: FTP Poll&lt;BR /&gt;41. "welcomeack_logs" Type: "Welcome Page Acknowledgement Logs" Retrieval: FTP&lt;BR /&gt;Poll&lt;BR /&gt;Enter the number of the log you wish to grep.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;[]&amp;gt; &lt;STRONG&gt;1 &amp;lt;enter&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Enter the regular expression to grep.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;[]&amp;gt; &lt;STRONG&gt;&amp;lt;ip address of wsus box&amp;gt;&lt;/STRONG&gt; &lt;STRONG&gt;&lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want this search to be case insensitive? [Y]&amp;gt; &lt;STRONG&gt;&lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want to search for non-matching lines? [N]&amp;gt; &lt;STRONG&gt;&lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want to tail the logs? [N]&amp;gt; &lt;STRONG&gt;Y &lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want to paginate the output? [N]&amp;gt; &lt;STRONG&gt;&amp;lt;enter&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Press Ctrl-C to stop.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That may tell you what's going on.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know that at one point, I had&amp;nbsp;to add one&amp;nbsp;Microsoft's intermediate certificates to the WSA as the logs showed untrusted root cert issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also ended up marking all of the Windows Store and Windows update sites to not be decrypted... (put them in a custom category, and set them as passthrough in the decryption policy.)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Feb 2016 15:44:53 GMT</pubDate>
    <dc:creator>Ken Stieers</dc:creator>
    <dc:date>2016-02-22T15:44:53Z</dc:date>
    <item>
      <title>WSA Ironport allow exe downloads from specific URL's (WSUS Server)</title>
      <link>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886304#M6615</link>
      <description>&lt;P&gt;Good Morning guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a task to allow the WSUS Server the ability to download .exe files from the windowsupdate sites etc...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far i have&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Created a new Access Policy&lt;/P&gt;
&lt;P&gt;2) Specified the relevant account to from the Identity (still using authentication)&lt;/P&gt;
&lt;P&gt;3) Removed Object Blocking from the Access Policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Everything else uses the global setting such as malware and user agents, at this stage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However as stated i need to find away of only allowing .exe downloads from a url list therefore blocking .exe's from elsewhere for this account. Is this possible? and if so any pointers as im now struggling.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 14:05:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886304#M6615</guid>
      <dc:creator>scott.walker1</dc:creator>
      <dc:date>2016-02-22T14:05:17Z</dc:date>
    </item>
    <item>
      <title>Have you grepped the access</title>
      <link>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886305#M6616</link>
      <description>&lt;P&gt;Have you grepped the access log then clicked Sync Now in WSUS to see what's going on?&lt;/P&gt;
&lt;P&gt;SSH to the WSA and&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;wsav1&amp;gt; grep to the WSA&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;wsav1&amp;gt; &lt;STRONG&gt;grep&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; .&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; .&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; .&lt;BR /&gt;&lt;/STRONG&gt;39. "webcat_logs" Type: "Web Categorization Logs" Retrieval: FTP Poll&lt;BR /&gt;40. "webrootlogs" Type: "Webroot Logs" Retrieval: FTP Poll&lt;BR /&gt;41. "welcomeack_logs" Type: "Welcome Page Acknowledgement Logs" Retrieval: FTP&lt;BR /&gt;Poll&lt;BR /&gt;Enter the number of the log you wish to grep.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;[]&amp;gt; &lt;STRONG&gt;1 &amp;lt;enter&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Enter the regular expression to grep.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;[]&amp;gt; &lt;STRONG&gt;&amp;lt;ip address of wsus box&amp;gt;&lt;/STRONG&gt; &lt;STRONG&gt;&lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want this search to be case insensitive? [Y]&amp;gt; &lt;STRONG&gt;&lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want to search for non-matching lines? [N]&amp;gt; &lt;STRONG&gt;&lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want to tail the logs? [N]&amp;gt; &lt;STRONG&gt;Y &lt;FONT face="Courier New"&gt;&amp;lt;enter&amp;gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Do you want to paginate the output? [N]&amp;gt; &lt;STRONG&gt;&amp;lt;enter&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;Press Ctrl-C to stop.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That may tell you what's going on.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know that at one point, I had&amp;nbsp;to add one&amp;nbsp;Microsoft's intermediate certificates to the WSA as the logs showed untrusted root cert issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We also ended up marking all of the Windows Store and Windows update sites to not be decrypted... (put them in a custom category, and set them as passthrough in the decryption policy.)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 15:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886305#M6616</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2016-02-22T15:44:53Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886306#M6617</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes we have done a grep and a also the reporting from GUI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They are being blocked due to Object blocking and file types. i.e. we block .exe in the global policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can create a new access policy to allow the user account or machine to download different object types, however I need to only allow .exe downloads from&amp;nbsp; a defined domain. so Microsoft url can download .exe whilst blocking .exe downloads from other locations.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Feb 2016 15:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886306#M6617</guid>
      <dc:creator>scott.walker1</dc:creator>
      <dc:date>2016-02-22T15:53:25Z</dc:date>
    </item>
    <item>
      <title>The other workaround is to</title>
      <link>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886307#M6618</link>
      <description>&lt;P&gt;The other workaround is to create a custom URL category for Microsoft .exe download while still blocking other .exe object in that policy.&lt;/P&gt;
&lt;P&gt;1. create custom URL category and put the microsoft download URL in the 'sites' box and under Regular Expressions box put expression such as \.exe&lt;/P&gt;
&lt;P&gt;2. Include that custom URL category to your access policy&lt;/P&gt;
&lt;P&gt;3. Set that custom URL category to "Allow" (do not set it to "Monitor" since it will be scanned with the object scanning that you have set to block all .exe extension file)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 00:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/wsa-ironport-allow-exe-downloads-from-specific-url-s-wsus-server/m-p/2886307#M6618</guid>
      <dc:creator>Handy Putra</dc:creator>
      <dc:date>2016-02-24T00:54:13Z</dc:date>
    </item>
  </channel>
</rss>

