Advanced URL Filtering
Create a Custom URL Category
Table of Contents
Create a Custom URL Category
Create custom URL categories for URL overrides or to target sites matching multiple
PAN-DB categories.
| Where can I use this? | What do I need? |
|---|---|
|
This feature has no prerequisites.
|
You can create a custom URL category to define exceptions to
current URL category enforcement or target sites that match multiple URL
categories.
- Define Exceptions to URL Category Enforcement (URL List)Specify one or more URLs to enforce independently of their predefined URL categories. For example, you can block the social-networking category but allow access to LinkedIn. To enforce the exception, you can configure Site Access for the custom category in a URL Filtering profile and apply the profile to Security policy rules; or use the custom category directly as match criteria in Security policy rules.
- Define a Custom URL Category Based on Multiple PAN-DB Categories (Category Match)Specify two or more categories to target websites or pages matching all specified categories. For example, suppose PAN-DB classifies a developer blog that your engineers use for research as personal-sites-and-blogs, computer-and-internet-info, and high-risk. To allow access and monitor matching traffic, create a custom URL category based on the three categories and set Site Access to alert in a URL Filtering profile.You can also use Category Match to block sensitive content, such as that categorized as both adult and questionable, while allowing either individual category.To create an effective Category Match, first identify how PAN-DB categorizes your target sites or content. Review your URL Filtering logs if you're targeting sites with either the alert or block action, or you can use Test A Site. In Strata Cloud Manager, you can use the Check URL Category feature while configuring a URL Access Management profile.
PAN-DB evaluates URLs against custom URL categories before external dynamic lists
and predefined URL categories. Accordingly, the firewall enforces the Security
policy rules for a URL in a custom URL list over the policy rules associated
with the individual URL categories it exists in.
If multiple Security policy rules include the same custom URL category, then the
firewall enforces the Security policy rule with the strictest URL Filtering
profile action for the matching traffic.
Create a Custom URL Category (Strata Cloud Manager)
If you’re using Panorama to manage Prisma Access:
Toggle over to the PAN-OS & Panorama tab and follow the guidance
there.
If you’re using Strata Cloud Manager, continue here.
- Select ConfigurationNGFW and Prisma AccessSecurity ServicesURL Access Management.Under Custom URL Categories, click Add Category.Enter a descriptive Name for the category.For Type, select either Category Match or URL List:
- Category Match—Select two or more existing URL categories to create a distinct policy target.
- URL List—Enter specific URLs to override category-based policy enforcement. Ensure entries follow the Guidelines for URL Category Exceptions.
Add (+) Items for the selected Type.Save the custom URL category.Configure Access Control settings for the custom URL category.- Select ConfigurationNGFW and Prisma AccessSecurity ServicesURL Access Management.Select a URL Access Management Profile to modify, or click Add Profile.Under Access Control, select the custom URL category you created, and then set Site Access.(Optional) Set User Credential Submission.Save the profile.Apply the URL Access Management profile to a Security policy rule.A URL Access Management profile is only active when it’s included in a profile group that a Security policy rule references.Follow the steps to activate a URL Access Management profile (and any Security profile).Commit your configuration.Select Push ConfigPush.
Block Sensitive Content through Category Match
This task demonstrates how to use a custom URL category of Category Match type to block child sexual abuse material (CSAM), also referred to as child pornography.PAN-DB ingests a dynamically updated list of URLs that host CSAM from the Internet Watch Foundation (IWF). PAN-DB classifies these URLs as both adult and questionable. The best-practice URL Access Management profile blocks both categories. We recommend blocking both categories in all URL Access Management profiles; however, blocking either category is sufficient to block CSAM.To allow access to adult or questionable URLs while blocking CSAM, you can use a custom URL category of Category Match type. You can adapt the following configuration for any content that spans multiple categories. The key is to identify the category combinations that classify your target content.- Create a custom URL category.
- Enter a descriptive Name, such as Block-CSAM.
- For Type, select Category Match.
- Add (+) entries for adult and questionable.
- Click Save.
Configure Site Access for the custom category and its individual categories in your URL Access Management profiles.Apply these changes to all URL Access Management profiles attached to Security policy rules that allow internet access.- For Block-CSAM, set Site Access to Block.
- For adult or questionable, set Site Access to either Alert or Allow.Alert is stricter than Allow because it generates URL filtering logs.
- Click Save.
Select Push ConfigPush.Test the custom category and its exceptions.- Visit the CSAM test URL: urlfiltering.paloaltonetworks.com/test-adult/questionable. If your configuration works, a block page displays.
- Visit the test URL for the allowed category. If your configuration works, the test page loads and confirms you have reached the test page for that category.
Create a Custom URL Category (PAN-OS & Panorama)
- Select ObjectsCustom ObjectsURL Category.Add or modify a custom URL category, and give the category a descriptive Name.For Type, select either Category Match or URL List:
-
URL List—Add sites to enforce differently than their assigned URL categories. Ensure entries follow the Guidelines for URL Category Exceptions.By default, the firewall automatically appends a trailing slash (/) to domain entries ( example.com) that do not end in a trailing slash or asterisk (*). The trailing slash prevents the firewall from assuming an implicit asterisk to the right of the domain. In non-wildcard domain entries, the trailing slash limits matches to the given domain and its subdirectories. For example, example.com ( example.com/ after processing) matches itself and example.com/search.In wildcard domain entries (entries using asterisks or carets), the trailing slash limits matches to URLs that conform to the specified pattern. For example, to match the entry *.example.com, a URL must strictly begin with one or more subdomains and end with the root domain, example.com; news.example.com is a match, but example.com is not because it lacks a subdomain.We recommend manually adding trailing slashes to clarify the intended matching behavior of an entry for anyone who inspects your URL list. The trailing slash is invisible if added by the firewall. Guidelines for URL Category Exceptions discusses the trailing slash and matching behavior in further detail.To disable this feature, go to DeviceSetupContent-IDURL Filtering. Then, deselect Append Ending Token. If you disable this feature, you may block or allow access to more URLs than intended.
To save the custom URL category, click OK.Select ObjectsSecurity ProfilesURL Filtering, and then Add or modify a URL Filtering profile.You can also use custom URL categories as match criteria in a Security policy rule.Your new custom category displays under Custom URL Categories.
Configure the Site Access and User Credential Submissions settings for the custom URL category. (To restrict corporate credential submissions on specific sites, see Prevent Credential Phishing.)Attach the URL Filtering profile to Security policy rules that allow internet access.The settings in the URL Filtering profile apply to traffic matching the Security policy rule.- Select PoliciesSecurity, and then select a rule to modify.In the Actions tab, select Profiles for Profile Type.For URL Filtering, select the profile you configured earlier.To save the rule, click OK.Commit your changes.
Block Sensitive Content through Category Match
This task demonstrates how to use a custom URL category of Category Match type to block child sexual abuse material (CSAM), also referred to as child pornography.PAN-DB ingests a dynamically updated list of URLs that host CSAM from the Internet Watch Foundation (IWF). PAN-DB classifies these URLs as both adult and questionable. The default URL Filtering profile blocks both categories. We recommend blocking both categories in all URL Filtering profiles; however, blocking either category is sufficient to block CSAM.To allow access to adult or questionable URLs while blocking CSAM, you can use a custom URL category of Category Match type. You can adapt the following configuration for any content that spans multiple categories. The key is to identify the category combinations that classify your target content.- Create a custom URL category.
- Enter a descriptive Name, such as Block-CSAM.
- For Type, select Category Match.
- For Categories, click Add, and then select adult and questionable.
- Click OK.
Update Site Access for the custom category and its individual categories in your URL Filtering profiles.Apply these changes to all URL Filtering profiles attached to Security policy rules that allow internet access.- For Block-CSAM, set Site Access to block.
- For adult or questionable, set Site Access to either alert or allow.The alert action is stricter; it generates URL filtering logs.
- Click OK.
Commit your changes.Test the custom category and its exceptions.- Visit the CSAM test URL: urlfiltering.paloaltonetworks.com/test-adult/questionable. If your configuration works, a block page displays.
- Visit the test URL for the allowed category. If your configuration works, the test page loads and confirms you have reached the test page for that category.