//Chura CCIE, NSE7, CCSE+
Regards, Paulo Raponi
config firewall address edit " update.microsoft.com" set associated-interface " WAN" set type fqdn set fqdn " update.microsoft.com" next edit " download.windowsupdate.com" set associated-interface " WAN" set type fqdn set fqdn " download.windowsupdate.com" next edit " windowsupdate.microsoft.com" set associated-interface " WAN" set type fqdn set fqdn " windowsupdate.microsoft.com" next edit " msftncsi" set type fqdn set fqdn " www.msftncsi.com" next edit " download.microsoft.com" set type fqdn set fqdn " download.microsoft.com" next edit " wustat.windows.com" set type fqdn set fqdn " wustat.windows.com" next edit " ntservicepack.microsoft.com" set type fqdn set fqdn " ntservicepack.microsoft.com" next end config firewall addrgrp edit " Windows Updates" set member " download.windowsupdate.com" " update.microsoft.com" " windowsupdate.microsoft.com" " download.microsoft.com" " ntservicepack.microsoft.com" " wustat.windows.com" " msftncsi" next end config firewall policy edit 1 set srcintf " internal_net" set dstintf " WAN" set srcaddr " all" set dstaddr " Windows Updates" set action accept set schedule " always" set service " ANY" set nat enable next endHowever, Microsoft have moved most of their services to other content providers, so the above may not work (as well as it once did). Application control sensor seems to work better (IMHO).
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
//Chura CCIE, NSE7, CCSE+
I' ve tried using App Control on Port HTTP+HTTPS and marked all windows update there, but it didn' t work :(Been using all&all updates via App control with no problems (so far). (see attached pic). Fixed NKL' s link: http://technet.microsoft.com/en-us/library/dd939870%28WS.10%29.aspx
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
//Chura CCIE, NSE7, CCSE+
Create an application control sensor that blocks all applications. Under the override section put the windows update signature and list it as allow.
Apply this to a policy that allows your servers to go out to the internet for windows update.
Note, this is only useful with this type of deployment if Windows Update is the ONLY application they need access for.
Mike Pruett
I used to have
This used to work for me, but as of June 30'th there are now a number of IP addresses that are classified as Collaboration or Microsoft.Portal rather than Windows.Update and thus being blocked.
FTG-60D 5.2.5 (and have since upgraded to 5.2.7 with the same results)
Mind you, my rules for only allowing windows updates had been working for months, and my first reports of it not working began July 1st.
Not sure if that is helpful..
User | Count |
---|---|
2571 | |
1364 | |
796 | |
651 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.