<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 1010 Windows update Wildcard policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4146770#M1073611</link>
    <description>&lt;P&gt;Are you managing with FMC or with the on-box FDM?&lt;/P&gt;
&lt;P&gt;For FMC there is an open source project that allows you to import the Microsoft )365 addresses as an object and then use that in an Access Control Policy rule.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/chrivand/Firepower_O365_Feed_Parser" target="_blank"&gt;https://github.com/chrivand/Firepower_O365_Feed_Parser&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 05 Sep 2020 11:57:01 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-09-05T11:57:01Z</dc:date>
    <item>
      <title>Firepower 1010 Windows update Wildcard policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4146245#M1073588</link>
      <description>&lt;P&gt;Dear support team,&lt;/P&gt;&lt;P&gt;I have a requirement to allow only windows update from specific IP address to the internet. The firewall we use FTD1010.&lt;/P&gt;&lt;P&gt;we used below link as reference for the URLs and ports to be allowed for windows update.&lt;/P&gt;&lt;P&gt;&lt;A href="https://answers.microsoft.com/en-us/windows/forum/all/need-windows-update-servers-ip-address-range-to/0b0d3618-f74c-411d-bb46-58bd605f7abe" target="_blank" rel="noopener"&gt;https://answers.microsoft.com/en-us/windows/forum/all/need-windows-update-servers-ip-address-range-to/0b0d3618-f74c-411d-bb46-58bd605f7abe&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately FTD doesnt allow to use wildcard with the FQDN. Kindly advice if there is any method to achieve the requirement.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2020 08:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4146245#M1073588</guid>
      <dc:creator>sirajuddeen t p</dc:creator>
      <dc:date>2020-09-04T08:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Windows update Wildcard policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4146770#M1073611</link>
      <description>&lt;P&gt;Are you managing with FMC or with the on-box FDM?&lt;/P&gt;
&lt;P&gt;For FMC there is an open source project that allows you to import the Microsoft )365 addresses as an object and then use that in an Access Control Policy rule.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/chrivand/Firepower_O365_Feed_Parser" target="_blank"&gt;https://github.com/chrivand/Firepower_O365_Feed_Parser&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 11:57:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4146770#M1073611</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-09-05T11:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Windows update Wildcard policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4147262#M1073672</link>
      <description>&lt;P&gt;Dear Marvin,&lt;/P&gt;&lt;P&gt;We are not using FMC. Small business purpose with on-box FDM.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 10:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4147262#M1073672</guid>
      <dc:creator>sirajuddeen t p</dc:creator>
      <dc:date>2020-09-07T10:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 Windows update Wildcard policy</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4153687#M1074011</link>
      <description>&lt;P&gt;I was able to achieve this by adding URL object in the FTD.&lt;/P&gt;&lt;P&gt;microsoft.com&lt;/P&gt;&lt;P&gt;windows.com&lt;/P&gt;&lt;P&gt;s-microsoft.com&lt;/P&gt;&lt;P&gt;windowsupdate.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then created a URL group and added to above URL objects.&lt;/P&gt;&lt;P&gt;Then created a policy to inside to outside to allow selected URL group only.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 13:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-windows-update-wildcard-policy/m-p/4153687#M1074011</guid>
      <dc:creator>sirajuddeen t p</dc:creator>
      <dc:date>2020-09-18T13:33:53Z</dc:date>
    </item>
  </channel>
</rss>

