URL Filtering Inline ML
Focus
Focus

URL Filtering Inline ML

Table of Contents
End-of-Life (EoL)

URL Filtering Inline ML

Learn how our URL filtering solution uses inline machine learning to detect and prevent new and unknown web threats.
URL Filtering inline ML enables the firewall dataplane to apply machine learning on webpages to alert users when phishing variants are detected while preventing malicious variants of JavaScript exploits from entering your network. Inline ML dynamically analyzes and detects malicious content by evaluating various web page details using a series of ML models. Each inline ML model detects malicious content by evaluating file details, including decoder fields and patterns, to formulate a high probability classification and verdict, which is then used as part of your larger web security policy. URLs classified as malicious are forwarded to PAN-DB for additional analysis and validation. You can specify URL exceptions to exclude any false-positives that might be encountered. This allows you to create more granular rules for your profiles to support your specific security needs. To keep up with the latest changes in the threat landscape, inline ML models are updated regularly and added via content releases. An active Advanced URL Filtering or legacy URL Filtering license is required to configure URL Filtering inline ML.
Inline ML-based protection can also be enabled to detect malicious PE (portable executables), ELF and MS Office files, and PowerShell and shell scripts in real-time as part of your Antivirus profile configuration. For more information, refer to: WildFire Inline ML
URL Filtering inline ML is not supported on the VM-50 or VM50L virtual appliance.