Skip to main content

LevelBlue Completes Acquisition of Cybereason.  Learn More

LevelBlue Completes Acquisition of Cybereason.  Learn More

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Loading...
Loading...

HOWTO: Configuring Proxy Access for the Entra Connector

Expand / Collapse


This article applies to:

  • MailMarshal 11.2 and above
  • Entra Connector

Question:

  • How do I configure a proxy for the Entra Connector?

Procedure:

The Entra Connector uses the MailMarshal RPC Proxy service to connect to Entra ID.  This service does not use the proxy settings configured in the MailMarshal Console.

To configure a proxy for the Entra Connector, use the https_proxy system environment variable.

You can provide a server name or IP address, port number, and optional authentication details.

The format is: setx https_proxy [protocol][<uid:pwd@>]<proxyserver>:<proxyport> /M 

  1. On the Array Manager server, open an elevated command prompt.
  2. Enter a setx command similar to the following examples:
    • setx https_proxy myproxyserver:8081 /M
    • setx https_proxy https://myv2proxy.local:80 /M
    • setx https_proxy mydomain\mmentrauser:supersecretpassword@10.10.10.10:8080 /M
  3. The expected response is: SUCCESS: Specified value was saved.
  4. Restart the MailMarshal RPC Proxy service. This will also restart the MailMarshal Array Manager service.
  5. Test the Entra connector. Any issues display as a red "toast" pop-up message in the console, and also in the MMRPCProxy log file.

Notes:

Other applications on the server that make automated web requests might respect the https_proxy variable. You can use the no_proxy variable to exclude sites from proxying.

If you are using a proxy that inspects HTTPS content (for example WebMarshal), you must exclude the following sites from inspection:

  • https://login.microsoftonline.com
  • https://graph.microsoft.com
This exclusion is to avoid issues with certificate validation. 
You only need to exclude the specific requests made by the Entra connector. For example:
  • Exclude the MailMarshal Array Manager IP address
  • If authenticating as a user, exclude the specific user configured


To contact Trustwave about this article or to request support:


Rate this Article:
     

Related Articles



Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.