The Microsoft vendor is providing cloud services to the masses. Microsoft is providing documentation for the needed open ports and destination addresses for the different online services they offer. But we, as an end users of McAfee Firewall, are unable to configure the McAfee Firewall due to the 102 wildcards “ * “ listed in the Microsoft article for FQDNs: “ https://docs.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-world... “ because the McAfee Firewall does not support wildcard FQDN “ * “.
Without a way to Wildcard the FQDNs we are required to input each and every IP range contained in the article for the different SAAS products we have signed up for. This is increasing or bloating the Firewall policies way more than it needs to be for both the IPv4 and IPv6 addresses. In some areas of the article there are no IPs and just a wild carded FQDN. Putting in the IPs is also prone to failure when those IPs are change or expanded.
I wish McAfee Firewall had an option to choose within the policy an “Address type” of “Office 365 Outlook” or “Office 365 Teams” where all of the different cloud services connections were configured for access, instead of the selections of “Single IP address” or “Fully qualified domain name” or other item where we are limited. But I think to update this item would too difficult to keep up with.
Having the FQDN wildcard would help in creating the rules for SAAS products and limit the traffic, especially when the vendor only document wild carded access. This is not a full proof way to prevent users from connection to other organizations resources for data exfiltration.
As more and more SAAS move to the cloud, the flexibility of endpoint products will need to become even more flexible when dealing with the different products.
Additional Related PERs:
Solved! Go to Solution.
Hi @Nick5,
Excellent post! Great points there. Please do not forget to "like" the ideas you have listed and we shall have this highlighted internally to understand what would be the path we take to achieve this as a part of our ENSFW!
Please DM me if you wish to progress on the same!
Hi @Nick5,
Excellent post! Great points there. Please do not forget to "like" the ideas you have listed and we shall have this highlighted internally to understand what would be the path we take to achieve this as a part of our ENSFW!
Please DM me if you wish to progress on the same!
Any updates from McAfee side about wildcards in FW rules ?
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: