URL Filtering General Settings
The following table describes the general URL filtering settings.
Enter a profile name (up to 31 characters). This name appears in the list of URL filtering profiles when defining security policies. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Enter a description for the profile (up to 255 characters).
Select this option if you want the profile to be available to:
Disable override (Panorama only)
Select this option to prevent administrators from overriding the settings of this URL Filtering profile in device groups that inherit the profile. This selection is cleared by default, which means administrators can override the settings for any device group that inherits the profile.
Objects > Security Profile Groups
Objects > Security Profile Groups The firewall supports the ability to create Security Profile groups , which specify sets of Security Profiles that can be ...
Objects > Custom Objects > URL Category
Objects > Custom Objects > URL Category Use the custom URL category page to create your custom list of URLs and use it in a ...
Decryption Profile General Settings
Decryption Profile General Settings The following table describes the general settings for decryption profiles. Decryption Profile — General Settings Description Name Enter a profile name ...
Objects > Security Profiles > Data Filtering
Objects > Security Profiles > Data Filtering Data filtering enables the firewall to detect sensitive information—such as credit card or social security numbers or internal ...
Objects > Security Profiles > File Blocking
Objects > Security Profiles > File Blocking You can attach a File Blocking profile to a Security policy rule ( Policies > Security ) to ...
Data Pattern Settings
Data Pattern Settings Select Objects Custom Objects Data Patterns to define the categories of sensitive information that you may want to filter. For information on ...
Objects > Application Groups
Objects > Application Groups To simplify the creation of security policies, applications requiring the same security settings can be combined by creating an application group. ...
Objects > Service Groups
Objects > Service Groups To simplify the creation of security policies, you can combine services that have the same security settings into service groups. To ...
Objects > External Dynamic Lists
Objects > External Dynamic Lists An external dynamic list is an address object based on an imported list of IP addresses, URLs, or domain names ...