Processes in Microsoft 365 for setting up Office apps, redeeming product keys, and activating licenses.
Yes, we were.
The web security team had reported that they were not able to implement the control using our Cisco IronPort proxy farms, which led to my initial inquiry to Microsoft. Microsoft weighed in that it should be achievable but no direction on the approach.
I did identify that Cisco does not use standard regex coding, which ultimately was the issue with the web team being unable to block. So, I created my allow and block rules using regex, then researched Cisco syntax, modified the allow / block rules accordingly and successfully implemented tenant restriction based upon domain. Key consideration when creating the block is understanding the yammer pattern for identifying domains is consistent.
Solution Approach:
This design decrypts all proxy traffic that is routed to Yammer.com, looks at the URL properties of the traffic and then enforces either an allow or a block rule based upon the Yammer domain.
Allow Rule Function: All traffic that matches the allow rule (approved domains) is subsequently encrypted and forwarded, enabling full yammer functionality.
Block Rule Function: All traffic that does not explicitly match the allow rule is then inspected against the block rule and prevented from being routed to yammer. Blocked domains are presented a “This Page Cannot Be Displayed”
Regex Rule Set:
Allow Rule:
www.yammer.com/approvedomain.com/
www.yammer.com/approvedomain.com/.*
www.yammer.com/approvedomain2.com/
www.yammer.com/approvedomain2.com/.*
Block Rule:
www.yammer.com/.*..*/
www.yammer.com/.*..*/.*