Created on 04-12-2011 07:09 AM Edited on 11-16-2023 10:52 PM By Anthony_E
Description
This article explains how to use SSL exemption for Microsoft Windows Update sites.
Scope
FortiOS (supported versions).
Solution
But if there is a requirement to block Windows updates, the SSL-exempts need to be removed. Once removed, the actions set up in the Application Control profile will be applied (Block, Reset, etc). If the SSL exemptions are not removed, the Application control will not take any action, but will correctly detect the type of application.
The common problem that is seen and reported is that the Application Control with Block action correctly detects the application app="MS.Windows.Update", yet the logs say action="pass".
Note:
This applies to all applications that are intended to be blocked through Application Control. One site/domain that is exempt from SSL inspection (considered to be trusted), will bypass the Application Control profile configured with actions 'block' or 'reset'.
Note 2:
In flow-based inspection mode, destinations that are 'Exempt from SSL Inspection' within the SSL Inspection profile are also exempt from subsequent UTM inspection (described in this KB article).
In proxy-based inspection mode, destinations that are 'Exempt from SSL Inspection' within the SSL Inspection profile are exempt from SSL deep inspection, but subsequent UTM inspection applies.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.