You are on page 1of 2

Nine reasons for URL filtering:

https://live.paloaltonetworks.com/t5/learning-happy-hour-articles/nine-reasons-to-
use-url-filtering-episode-2-learning-happy-hour/ta-p/244596

BEST PRACTICES
https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-new-features/content-
inspection-features/url-filtering-security-categories.html

URL filtering CLI commands

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXrCAK

Block and Allow Palo Alto (Carrot stuff!!!)

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-
filtering-concepts/block-and-allow-lists.html

URL category Match Criteria

https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-
filtering-concepts/url-category-as-policy-match-criteria.html

Ignite Today's Threats

https://www.youtube.com/watch?v=snA-LpaVqX0

Bulletproof Hosting

https://en.wikipedia.org/wiki/Bulletproof_hosting

Test URLfiltering Palo Alto Networks

https://urlfiltering.paloaltonetworks.com/

URL Categories:

https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/url-filtering/url-
filtering-concepts/url-categories.html#id82487828-771d-4afb-8582-18eb799e20a7

IMPORTANT:

Change requests are not supported for risk categories or newly-registered-domains.

Precedence of Lists in URL Categories

Custom Blocking
Custom Alert and Allow
Predefined Block
Predefined Allow and Alert

CBAPBA

Nine Reasons:

Reason #1: Complements App-ID


Reason #2: Complements SSL Decryption
Reason #3: Block Known Bad Sites
Reason #4: PAN-DB Updated by WildFire
Reason #5: Restrict High-Risk Sites
Reason #6: Reduce Attack Surface
Reason #7: Customize, Extend, and Make Exceptional Exceptions
Reason #8: Prevent Credential Submissions
Reason #9: More SaaS Control

You might also like