Start reading up on how these tools work, blocking TOR and Tailscale is not uncommon. There can be challenges depending on how it’s deployed, as I called out. But I think you aren’t understanding how thing like Zscaler, Netskope, Palo, et cetera work.
Lol… if the traffic is going through the Wireguard VPN tunnel before it goes through the company VPN servers then nothing is going to be blocked. Not Outlook, not Teams, nothing.
This is where I think you’re still getting confused. If the company has Zscaler, then they likely don’t have any VPN, and if they do it’s probably for internal access, not SaaS apps. Also, VPN won’t use servers unless it’s a home VPN, so those wouldn’t come into play.
The reason SaaS apps would be blocked is because most companies will restrict access into those apps to be from Zscaler only. That way someone can’t just pop on a random browser and authenticate. So in your scenario, they can reach Teams, Outlook, et cetera, but they will not be able to authenticate or get to their company’s tenant. They can log into a personal O365 account, as they aren’t blocked from getting to webpage, but they won’t be able to auth or access any enterprise resources.
I have no clue what crazy firewall config you’re dreaming up but it’s not applicable to 90% employers out there. The majority aren’t even monitoring DNS locations… moreover all the global companies with employees traveling every week are not manually allowing certain ports or DNS servers for them depending on where they travel. You can have the fanciest NetSec tools in the world, but in most cases they aren’t being used in the ways you think.
Again, you’re misunderstanding these tools. These are firewalls, and manually allowing ports and protocols is something you see on small home networks, that’s very uncommon for enterprises. These tools blend that traditional firewall functionality with newer capabilities, and handling a mostly remote workforce is something that these tools do with very little effort. That’s why Zscaler saw so much growth in 2020… because you could quickly allow users from all over the world, levera deeper security policies at L7, and decommission VPN.
What you’re calling impossible and fancy is default functionality for these tools, which is why they are so popular.
As someone that works with companies to rollout and mature these technologies, I 100% agree that they don’t use all the capabilities, but what you’re describing it pretty out of the box stuff, and common for most medium sized businesses and up. In many cases the config is so commonplace that it’s automated with checkboxes for them. Zscaler and others have boxes for blocking TOR, Bittorrent, et cetera. It takes zero manual configuration at this point.