Advanced DNS Security License (for enhanced feature support)
or DNS Security License
Advanced Threat Prevention or Threat Prevention License
DNS Security creates threat signatures for domains
that have been analyzed by the DNS Security service. For these known
domains, the signatures are referenced when a DNS query is received.
In some cases, it might be possible that the signature has incorrectly
categorized a domain as a threat, due to certain features or qualities
present in the domain. In such circumstances, you can add signature
exceptions to bypass these false-positives. If there are known safe
domains that are categorized as malicious, such as internal domains,
you can add a list of domains that will bypass any DNS analysis.
If your organization uses third party threat feeds as part of a
comprehensive threat intelligence solution, you can also reference
those in the form of external dynamic lists (EDLs) in your DNS Security
profile.
Use the credentials associated with your Palo Alto Networks support account and
log in to the Strata Cloud Manager on the hub.
Add domain overrides in cases where false-positives occur.
Select ManageConfigurationNGFW and Prisma AccessSecurity ServicesDNS Security and select a DNS Security profile to modify.
Add Override or Delete to
modify the domain list entries as necessary. Each additional entry requires
the domain and a description.
Click OK to save your modified
DNS Security profile.
Reference an external dynamic list (EDL) as part of your
DNS Security profile to import third party threat feeds.
Create an domain-based external dynamic list (ManageConfigurationNGFW and Prisma AccessObjectsExternal Dynamic Lists). For more information about EDLs, see External Dynamic List.
Select ManageConfigurationNGFW and Prisma AccessSecurity ServicesDNS Security.
In the External Dynamic Lists panel, select a
domain list EDL and provide the Policy Action and
Packet Capture settings. In Apply
to Profiles, select the DNS Security profile for which
you want the EDL domain list to apply to.
Save your changes when you have finished making
your updates.
Create Domain Exceptions and Allow | Block Lists (NGFW (Managed by PAN-OS or Panorama))
PAN-OS 10.0 and later releases provide
an additional option to explicitly add allowable domains through
the Anti-Spyware security profile. You can add domain/FQDN entries
for approved domain sources if they trigger a false-positive response
from DNS Security.