Domains used by the Predefined SaaS Application Types
List of domains you use for header insertion rules when using predefined HTTP header insertion rules.
SaaS applications use HTTPS so, to insert custom headers into this traffic, custom headers must be decrypted. If you use the forward-proxy decryption available on the firewall to decrypt custom headers, you must identify the specific HTTPS traffic you want to decrypt by identifying the domains associated with the traffic. The following table identifies the relevant domains for each of the SaaS applications for which Palo Alto Networks® has provided predefined rules.
Microsoft Office 365
Use HTTP Headers to Manage SaaS Application Access
Use Palo Alto Networks® firewall URL profiles to insert custom headers into HTTP requests so that you can control access to differing versions of web ...
Create HTTP Header Insertion Entries using Predefined Types
You can create HTTP Header Insertion rules based on types that are predefined by Palo Alto Networks® for popular SaaS applications. ...
Understand SaaS Custom Headers
Understand the custom HTTP headers you will use before you create HTTP Header Insertion Rules for your Palo Alto Networks® firewall. ...
HTTP Header Insertion
HTTP Header Insertion To enable the firewall to manage web application access by inserting HTTP headers and their values into HTTP requests, select Objects Security ...
Create Custom HTTP Header Insertion Entries
Create custom HTTP Header Insertion rules for your Palo Alto Networks® firewall. ...
Application Whitelist Example
Application Whitelist Example Keep in mind that you do not need to capture every application that might be in use on your network in your ...
Generate the SaaS Application Usage Report
Generate the SaaS Application Usage Report The SaaS Application Usage PDF report is a two-part report that allows you to easily explore SaaS application activity ...
Monitor > PDF Reports > SaaS Application Usage
Monitor > PDF Reports > SaaS Application Usage Use this page to generate a SaaS application usage report that summarizes the security risks associated with ...
Step 2: Create the Application Whitelist Rules
Step 2: Create the Application Whitelist Rules After you Identify Whitelist Applications you are ready to create the next part of the best practice internet ...