Multi-Category URL Filtering

PAN-DB classifies URLs with multiple categories, so that you can granularly control web access and how users interact with online content.
PAN-DB, the Palo Alto Networks URL database, now assigns multiple categories to URLs that classify a site’s content, purpose, and safety. Every URL now has up to four categories, including a risk category that indicates how likely it is that the site will expose you to threats. More granular URL categorizations means that you can move beyond a basic "block-or-allow" approach to web access. Instead, you can control how your users interact with online content that, while necessary for business, is more likely to be used as part of a cyberattack.
For instance, you might consider certain URL categories risky to your organization, but are hesitant to block them outright as they also provide valuable resources or services (like cloud storage services or blogs). Now, you can allow users to visit sites that fall into these types of URL categories, while also protecting your network by decrypting and inspecting traffic and enforcing read-only access to the content.
With multi-category URL Filtering, PAN-DB might classify a developer blog that your engineers use for research as:
  • personal-sites-and-blogs
  • computer-and-internet-info
  • high-risk
The blog might be high-risk because a malware-infected blog is hosted on the same domain. You’d like your users to be able to access the blog, but want to protect against potential threats. Now, you could design your security policy to allow personal-sites-and-blogs and computer-and-internet-info, and then very strictly limit the options available to users when accessing high-risk content (for example, block obfuscated Javascript, enable credential theft prevention, and restrict dangerous file downloads).
If you’re already enforcing security policy based on URL categories, you will automatically start to benefit from multi-category URL Filtering after upgrading to PAN-OS 9.0.
Here’s what’s most important to know about multi-category URL Filtering, with some tips to get started:
  • Multi-category URL Filtering requires a PAN-DB URL Filtering subscription. To confirm that the PAN-DB URL Filtering subscription license is active on the firewall, select DeviceLicenses).
    With an active license, the firewall connects to PAN-DB by default.
  • You can Test A Site to see the categories that PAN-DB applies to URLs, and to learn about all the available URL categories.
  • URL Filtering profiles now display your Custom URL Categories, External Dynamic URL Lists, and Pre-defined Categories (the PAN-DB categories) together, so that you can choose from these categories when defining policy for website access and usage.
    profile-categories-custom-EDLs-predefined.png
    If you had configured URL Filtering overrides before upgrading to PAN-OS, your override block and allow lists are now converted to Custom URL Categories, and are displayed in this dropdown, too.
    More about this change: Release versions earlier than PAN-OS 9.0 allowed you to configure URL Filtering Overrides to create exceptions to URL category enforcement. In PAN-OS 9.0, the URL Filtering profile Overrides tab, where you would configure these block and allow lists, no longer exists. Any URL Filtering overrides that you configured before upgrading to PAN-OS 9.0 are now converted to custom URL Categories. If you had URL Filtering overrides configured before upgrading to PAN-OS 9.0, there are two issues that might impact you after upgrade. Review Upgrade/Downgrade Considerations to learn more, and for workarounds.
  • You can define a custom URL category based on multiple PAN-DB URL categories. A new type of custom URL Category, Category Match, means that you can target enforcement for a website or page that matches a set of categories. The website or page must match all of the categories that you list. Here’s how to create custom URL categories.
  • For websites or pages that hold more than one URL category, URL Filtering logs display the URL category with which the firewall based policy enforcement (the Category). URL Filtering logs also display all the URL categories for the site (the URL Category List).
    To view URL Filtering logs, select MonitorLogsURL Filtering and select any entry to learn more about the activity that triggered the log record.
    log-url-filtering-multi-category.png
  • Where applicable, samples in AutoFocus show complete PAN-DB categorization details for each URL a sample connects to during WildFire analysis.
    To view the sample coverage details, select a sample hash in AutoFocus and then click the Coverage tab.
  • To get started:

Related Documentation