Configure URL Filtering
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
End-of-Life (EoL)
Configure URL Filtering
Learn how to create a URL Filtering profile based on
the web security and web access needs of your business and end users.
After you determine
URL filtering policy requirements, you should have a basic
understanding of the types of websites and website categories your
users are accessing. Use this information to create custom URL Filtering
profiles and attach them to the Security policy rules that allow
web access. In addition to managing web access with a URL Filtering profile,
if you configure User-ID™, you can manage the sites to which users
can submit corporate credentials.
- Create a URL Filtering profile.If you didn’t already, configure a best practice URL Filtering profile to ensure protection against URLs hosting malware or exploitive content.Select ObjectsSecurity ProfilesURL Filtering and Add or modify a URL Filtering profile.
- Define site access
for each URL category.Select Categories and set the Site Access for each URL category:
- allow traffic destined for that URL category; allowed traffic is not logged.
- Select alert to have visibility into sites that users are accessing. Traffic matching that category is allowed but a URL filtering log is generated to record when a user accesses a site in that category.
- Select block to deny access to traffic that matches that category and to enable logging of the blocked traffic.
- Select continue to display a page to users with a warning and require them to click Continue to proceed to a site in that category.
- To only allow access if users provide a configured password, select override. For more details, see Allow Password Access to Certain Sites.
- Configure the URL Filtering profile to detect corporate
credential submissions to websites that are in allowed URL categories.To ensure the best performance and a low false positive rate, the firewall automatically skips checking the credential submissions for any App-ID™ associated with sites that have never been observed hosting malware or phishing content—even if you enable checks in the corresponding category. The list of sites for which the firewall skips credential checking is automatically updated through Applications and Threats content updates.
- Select User Credential Detection.
- Select one of the methods
to check for corporate credential submissions to web pages
from the User Credential Detection drop-down:
- Use IP User Mapping—Checks for valid corporate username submissions and verifies that the username matches the user logged in to the source IP address of the session. To use this method, the firewall matches the submitted username against its IP address-to-username mapping table. To use this method, you can use any of the user mapping methods described in Map IP Addresses to Users.
- Use Domain Credential Filter—Checks for valid corporate usernames and password submissions and verifies that the username maps to the IP address of the logged-in user. See Configure User Mapping Using the Windows User-ID Agent for instructions on how to set up User-ID to enable this method.
- Use Group Mapping—Checks for valid username submissions based on the user-to-group mapping table populated when you configure the firewall to map users to groups.With group mapping, you can apply credential detection to any part of the directory or to a specific group, such as groups like IT that have access to your most sensitive applications.
This method is prone to false positives in environments that do not have uniquely structured usernames, so you should only use this method to protect your high-value user accounts. - Set the Valid Username Detected Log Severity that the firewall uses to log detection of corporate credential submissions (default is medium).
- Configure the URL Filtering profile to detect phishing and malicious JavaScript in real-time using URL Filtering Inline ML.
- Allow or block users from submitting corporate credentials
to sites based on URL category to prevent
credential phishing.To ensure the best performance and a low false positive rate, the firewall automatically skips checking the credential submissions for any App-ID associated with sites that have never been observed hosting malware or phishing content—even if you enable checks in the corresponding category. The list of sites for which the firewall skips credential checking is automatically updated through Applications and Threats content updates.
- For each URL category to which you allow Site
Access, select how you want to treat User
Credential Submissions:
- alert—Allow users to submit credentials to the website but generate a URL filtering alert log each time a user submits credentials to sites in this URL category.
- allow (default)—Allow users to submit credentials to the website.
- block—Displays the Anti Phishing Block Page to block users from submitting credentials to the website.
- continue—Present the Anti Phishing Continue Page to require users to click Continue to access the site.
- Configure the URL Filtering profile to detect corporate credential submissions to websites that are in allowed URL categories.
- For each URL category to which you allow Site
Access, select how you want to treat User
Credential Submissions:
- Define URL
category exception lists to specify websites that should
always be blocked or allowed, regardless of URL category.For example, to reduce URL filtering logs, you may want to add your corporate websites to the allow list so that no logs are generated for those sites or, if there is a website that is being overly used and is not work-related, you can add that site to the block list.The policy actions configured for custom URL categories have priority enforcement over matching URLs in external dynamic lists.Traffic to websites in the block list is always blocked regardless of the action for the associated category and traffic to URLs in the allow list is always allowed.For more information on the proper format and wildcard usage, see URL Category Exception Lists.
- Enable Safe Search Enforcement.
- Log only Container
Pages for URL filtering events.
- Select URL Filtering Settings. Enable Log container page only (default) so that the firewall logs only the main page that matches the category, not subsequent pages or categories that loaded within the container page.
- To enable logging for all pages and categories, disable the Log container page only option.
- Enable HTTP
Header Logging for one or more of the supported HTTP header
fields.Select URL Filtering Settings and select one or more of the following fields to log:
- User-Agent
- Referer
- X-Forwarded-For
- Save the URL Filtering profile and commit your changes.
- Click OK.
- Click Commit.
- Test your URL filtering policy configuration.
- Access a website in the desired URL category
and observe the firewall’s behavior.Use Palo Alto Networks URL Filtering Test Pages (urlfiltering.paloaltonetworks.com/test-<url-category>) if you want to avoid directly accessing a site. Palo Alto Networks has test URLs for benign and malicious URL categories. For example, to test your block policy for malware, visit https://urlfiltering.paloaltonetworks.com/test-malware.
- Review the Traffic and URL filtering logs (MonitorLogs) to confirm that the correct policy rule is logged.
- Access a website in the desired URL category
and observe the firewall’s behavior.
- Enable Hold client request for category lookup to
block client requests while the firewall performs URL category lookups.
- Select DeviceSetupContent-ID.
- Select Hold client request for category lookup.
- Commit your changes.
Enable this feature as a URL Filtering best practice. - Set the amount of time, in seconds, before a URL category
lookup times out.
- Select DeviceSetupContent-IDgear icon.
- Enter a number in Category lookup timeout (sec).
- Click OK.
- Commit your changes.