URL Filtering Inline ML
Learn how our URL filtering solution uses inline machine
learning to detect and prevent new and unknown web threats.
URL Filtering inline ML enables the firewall
dataplane to apply machine learning on webpages to alert users when
phishing variants are detected while preventing malicious variants
of JavaScript exploits from entering your network. Inline ML dynamically
analyzes and detects malicious content by evaluating various web
page details using a series of ML models. Each inline ML model detects
malicious content by evaluating file details, including decoder
fields and patterns, to formulate a high probability classification
and verdict, which is then used as part of your larger web security
policy. URLs classified as malicious are forwarded to PAN-DB for
additional analysis and validation. You can specify URL exceptions
to exclude any false-positives that might be encountered. This allows
you to create more granular rules for your profiles to support your
specific security needs. To keep up with the latest changes in the
threat landscape, inline ML models are updated regularly and added
via content releases. An active Advanced URL Filtering or legacy
URL Filtering license is required to
configure URL Filtering
inline ML.
Inline ML-based protection can also be enabled to detect malicious
PE (portable executables), ELF and MS Office files, and PowerShell
and shell scripts in real-time as part of your Antivirus profile
configuration. For more information, refer to:
WildFire Inline ML
URL Filtering inline ML is not supported on the VM-50 or
VM50L virtual appliance.