<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Symantec WebFilter to PAN-DB URL Filtering Migration Guide in Featured Articles</title>
    <link>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/ta-p/247332</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;H1&gt;Table of Contents&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680733"&gt;Introduction.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680734"&gt;Category Mappings For Moving From Symantec WebFilter to PAN-DB.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680735"&gt;Roll Out URL Category Enforcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680736"&gt;Best Practice URL Filtering Profile.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc520305318"&gt;Use URL Categories To Define SSL Decryption Policies.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680738"&gt;URL Filtering Use Cases.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680739"&gt;Useful Resources.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680733"&gt;&lt;/A&gt;&lt;SPAN&gt;Introduction&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This document is designed to assist you in migrating your environment from using Symantec Web Filter categories on ProxySG to using URL filtering capabilities in the Palo Alto Networks next-generation firewall enabled by PAN-DB, Palo Alto Networks cloud-based URL categorization service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first part of this document contains category mappings to assist you in selecting which PAN-DB URL categories to use. In most cases, there is a one-to-one mapping between the URL categorization commonly used in Symantec Web Filter and the categorization provided by Palo Alto Networks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The second part of the document contains examples on how to migrate from Symantec Web Filter categories to PAN-DB categories and how to use them in the security policies of the next-generation firewall. During the migration, it is a recommended best practice to configure a URL Filtering profile with all categories set to “alert” in parallel with your web filtering solution. This allows you to run reports in PAN-OS and Proxy-SG to verify policies and category mappings before switching the URL filtering functions over completely to PAN-DB URL categorization on our next generation firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The third part of this document contains usage examples and recommended security best practices when using PAN-DB&amp;nbsp;for URL categorization in the next-generation firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680734"&gt;&lt;/A&gt;Category Mappings for Moving From Symantec WebFilter to PAN-DB&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To start the migration, the first thing we recommend is to review the categories that are blocked by policy with the Symantec WebFilter and map them to the corresponding PAN-DB URL categories.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Symantec WebFilter Database is organized into 85 URL categories. You can find&amp;nbsp;a complete list and definitions of the categories at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="https://sitereview.bluecoat.com/category-descriptions" href="https://sitereview.bluecoat.com/category-descriptions" target="_blank" rel="noopener"&gt;https://sitereview.bluecoat.com/category-descriptions&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-DB is organized into more than 65 URL categories. You can find&amp;nbsp;a complete list and definitions of the categories at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="Complete List of PAN-DB URL Filtering Categories" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5hCAC" target="_blank" rel="noopener"&gt;Complete List of PAN-DB URL Filtering Categories&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Symantec WebFilter offers a service called “Site Review.” The purpose of “Site Review” is to allow Symantec customers to check the current database categorization of WebFilter URLs and report sites that they believe are incorrectly categorized. You can find the "Site Review" at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="https://sitereview.bluecoat.com/" href="https://sitereview.bluecoat.com/" target="_blank" rel="noopener"&gt;https://sitereview.bluecoat.com/&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-DB URL filter also offers a service called “Test a Site.” The purpose of “Test a Site” is to allow Palo Alto Networks customers to check the current database categorization of PAN-DB URLs and report sites that they believe are incorrectly categorized. You can find "Test a Site" at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="https://urlfiltering.paloaltonetworks.com/" href="https://urlfiltering.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;https://urlfiltering.paloaltonetworks.com/&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The table below will help you with the category mapping exercise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Symantec&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Palo Alto Networks&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Differences&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Recommendations&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Abortion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Abortion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Adult/Mature Content&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Alcohol&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Alcohol and Tobacco&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Alternative Spirituality/Belief&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Religion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Art/Culture&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment and Arts&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Auctions&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Auctions&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Audio/Video Clips&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media or Music&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Brokerage/Trading&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Stock Advice and Tools or Financial Services&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Business/Economy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Business and Economy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Charitable Organizations&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Chat (IM)/SMS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Child Pornography&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Computer/Information Security&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info or Hacking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Content Servers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Content Delivery Networks&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Controlled Substances&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Abused Drugs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Dynamic DNS Host&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Dynamic-DNS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “dynamic-dns” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;E-Card/Invitations&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shareware-and-Freeware&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Education&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Educational Institutions&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Email&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Web-based Email&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment and Arts&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Extreme&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Extremism&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “extremism” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;File Storage/Sharing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Online Storage and Backup&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Financial Services&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Financial Services&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;For Kids&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;This Symantec category is not a stand-alone category&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Gambling&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Gambling&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Games&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Games&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Government/Legal&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Government&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Hacking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Hacking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Health&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Health and Medicine&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Humor/Jokes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment and Arts or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Informational&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;N/A&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;This Symantec category is not a stand-alone category&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Recommended action:&lt;/P&gt;
&lt;P&gt;– Use “Test a Site” to find corresponding PAN-DB category for matching websites&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;– Or Create a Custom URL category and control matching websites&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Internet Connected Devices&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;There is no one-to-one mapping for this category. This is a subset of “computer-and-internet-info” category&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Recommended action:&lt;/P&gt;
&lt;P&gt;– Use “Test a Site” to find corresponding PAN-DB category for matching websites&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;– Or Create a Custom URL category and control matching websites&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Internet Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Intimate Apparel/Swimsuit&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Swimsuits and Intimate Apparel&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Job Search/Careers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Job Search&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Malicious Outbound Data/Botnets&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Command-and-Control&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “Command-and-Control” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Malicious Sources/Malnets&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Malware&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “malware” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Marijuana&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Abused Drugs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Media Sharing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media or Online Storage and Backup&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Military&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Military&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Mixed Content/ Potentially Adult&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult, Nudity or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Based on the category description provided by Symantec, most URLs should be mapped to “adult” but the URLs could also be part of “nudity” or “questionable”&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;News/Media&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;News&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Newsgroups/Forums&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;News or Personal-Sites-And-Blogs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Non-Viewable/Infrastructure&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Insufficient Content&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Nudity&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Nudity&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Office/Business Applications&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Online Meetings&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Peer-to-Peer (P2P)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Peer-to-Peer&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Personals/Dating&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Dating&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Personal Sites&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Personal Sites and Blogs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Phishing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Phishing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “phishing” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Piracy/Copyright Concerns&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Copyright-Infringement&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “copyright-infringement“ category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Placeholders&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Parked&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “parked” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Political/Social Advocacy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Philosophy and Political Advocacy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Pornography&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Potentially Unwanted Software&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shareware and Freeware or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Proxy Avoidance&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Proxy Avoidance and Anonymizers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “proxy-avoidance-and-anonymizers” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Radio/Audio Streams&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Real Estate&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Real Estate&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Reference&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Reference and Research&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Religion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Religion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Remote Access Tools&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Restaurants/Dining/Food&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Scam/Questionable/Illegal&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Search Engines/Portals&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Search Engines&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Sex Education&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Sex Education&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Sexual Expression&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult or Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;If the website content pertains to sexual identity then the category will be "society"&lt;/P&gt;
&lt;P&gt;If not, the category will be "adult"&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Shopping&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shopping&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Social Networking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Social Networking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Society/Daily Living&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Software Downloads&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shareware and Freeware or Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Spam&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;URLs related to spam are included in the category "questionable"&lt;/P&gt;
&lt;P&gt;This category also includes websites with illegal, immoral and offensive content&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Sports/Recreation&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Sports&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Suspicious&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Insufficient Content or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Technology/Internet&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Tobacco&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Alcohol and Tobacco&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Translation&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Translation&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Travel&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Travel&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;TV/Video Streams&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Uncategorized&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Unknown&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “unknown” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Vehicles&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Motor Vehicles&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Violence/Hate/Racism&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Extremism&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “extremism” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Weapons&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Weapons&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Web Ads/Analytics&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Web Advertisements&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Web Hosting&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Web Hosting&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680735"&gt;&lt;/A&gt;Roll Out URL Category Enforcement&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The recommended practice for deploying URL filtering in your organization is to start with a “passive" URL Filtering profile that will create log entries by employing the “alert” policy action on all categories in parallel with your existing web filter appliance.
&lt;UL&gt;
&lt;LI type="circle"&gt;On the Palo Alto Networks firewall, create a new URL Filtering profile.
&lt;UL&gt;
&lt;LI type="square"&gt;Select&amp;nbsp;&lt;STRONG&gt;Objects &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; Security Profiles &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; URL Filtering&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI type="square"&gt;Select the default profile and then click&amp;nbsp;&lt;STRONG&gt;Clone&lt;/STRONG&gt;. The new profile will be named&amp;nbsp;&lt;STRONG&gt;default-1&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI type="square"&gt;Select the&amp;nbsp;&lt;STRONG&gt;default-1&amp;nbsp;&lt;/STRONG&gt;profile and rename it. For example, rename it to URL-Monitoring.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI type="circle"&gt;Configure the action for all categories to&amp;nbsp;alert.
&lt;UL&gt;
&lt;LI type="square"&gt;In the section that lists all URL categories, select all categories.&lt;/LI&gt;
&lt;LI type="square"&gt;To the right of the&amp;nbsp;&lt;EM&gt;Action&amp;nbsp;&lt;/EM&gt;column heading, mouse over and select the down arrow and then select&amp;nbsp;&lt;STRONG&gt;Set Selected Actions&lt;/STRONG&gt;&amp;nbsp;and choose &lt;STRONG&gt;Alert&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI type="square"&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the profile.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18920i93B114EBE17ECC02/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;After setting the &lt;STRONG&gt;Alert&lt;/STRONG&gt; action, you can monitor user web activity through URL filtering reports on both appliances for a few days or weeks to determine accuracy of the provided category mappings. Palo Alto Networks recommends to validate accuracy for the top 1,000 websites seen by your organization.
&lt;UL&gt;
&lt;LI type="circle"&gt;Apply the URL Filtering profile to the security policy rule(s) that allows web traffic&amp;nbsp;of users.
&lt;UL&gt;
&lt;LI type="square"&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; Security&amp;nbsp;&lt;/STRONG&gt;and select the appropriate security policy to modify it.&lt;/LI&gt;
&lt;LI type="square"&gt;Select the&amp;nbsp;&lt;STRONG&gt;Actions&amp;nbsp;&lt;/STRONG&gt;tab and in the&amp;nbsp;&lt;STRONG&gt;Profile Setting&lt;/STRONG&gt;&amp;nbsp;section, click the drop-down for&amp;nbsp;&lt;STRONG&gt;URL filtering &lt;/STRONG&gt;and select the new profile.&lt;/LI&gt;
&lt;LI type="square"&gt;Click&amp;nbsp;&lt;STRONG&gt;OK &lt;/STRONG&gt;to save.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI type="circle"&gt;View the URL filtering logs to determine all of the website categories that your users are accessing.&lt;/LI&gt;
&lt;LI type="circle"&gt;For information on viewing the logs and generating reports, see&amp;nbsp;&lt;SPAN&gt;&lt;A title="Monitor Web Activity" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/monitor-web-activity#id648a849c-db96-4028-a6cc-f669dc109ed4" target="_blank" rel="noopener"&gt;Monitor Web Activity&lt;/A&gt;&lt;/SPAN&gt;.
&lt;UL&gt;
&lt;LI type="square"&gt;Select&amp;nbsp;&lt;STRONG&gt;Monitor &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; Logs &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; URL Filtering&lt;/STRONG&gt;. A log entry will be created for any website that exists in the URL filtering database in a category that is set to any action other than&amp;nbsp;&lt;STRONG&gt;allow.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;In this procedure, all categories will be set to alert, which will cause traffic for all websites to be logged. This may potentially create a large amount of log files, so it is best to do this for initial monitoring purposes to determine the types of websites your users are accessing and compare URL categories triggered.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Collect all URL category objects used in the Symantec Web Filter Policy Manager and map them into PAN-DB URL categories using the provided URL category map after vetting them for accuracy using the above steps.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;After determining the categories that your organization allows users to access, set the policy action to “allow” for these URL categories on the next-generation firewall. The firewall does not generate logs for traffic matching these URL categories.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;You can then make decisions on the URL categories that should be controlled according to the company policy by setting the appropriate policy action to each of these categories in the URL Filtering profile(s). The recommended actions column of the "URL category" table in the previous section and the "best practices" section at the end of this document are provided to further assist you in making policy decisions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;If possible, it is recommended to use a “slow roll” approach, using USER-ID as described below when deploying these newly created URL Filtering profile(s) to Security policies.
&lt;UL&gt;
&lt;LI type="circle"&gt;Clone an existing policy that allows web access and add an additional match criteria on User set to a single department. (i.e., IT, Marketing, Engineering, etc.)&lt;/LI&gt;
&lt;LI type="circle"&gt;Add the new URL Filtering profile to this Security policy and move the policy above all policies that allow web access since policy rules are matched top down.&lt;/LI&gt;
&lt;LI type="circle"&gt;Monitor the above policy for usage and get feedback from the users belonging to the Group Object.&lt;/LI&gt;
&lt;LI type="circle"&gt;Incorporate changes as necessary to the URL Filtering profile before adding it to all other applicable security policies.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680736"&gt;&lt;/A&gt;Best Practice URL Filtering Profile&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Attach a&amp;nbsp;&lt;SPAN&gt;&lt;A title="URL Filtering profile" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/url-filtering-concepts/url-filtering-profile" target="_blank" rel="noopener"&gt;URL Filtering profile&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;to all rules that allow access to web-based applications to protect against URLs that have been observed hosting malware or exploitive content.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;As a &lt;SPAN&gt;&lt;A title="best practice" href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-internet-gateway/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles" target="_blank" rel="noopener"&gt;best practice&lt;/A&gt;&lt;/SPAN&gt;, use PAN-DB&amp;nbsp;URL filtering&amp;nbsp;to prevent access to web content that is at high-risk for being malicious.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;These include command-and-control, copyright-infringement, dynamic-dns, extremism, malware, phishing, proxy-avoidance-and-anonymizers, unknown, and parked. The best practice URL Filtering profile sets all known dangerous URL categories to block. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Failure to block these dangerous categories puts you at risk for exploit infiltration, malware download, command and control activity, and data exfiltration.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;In addition to blocking known bad categories, you should also alert on all other categories so you have visibility into the sites your users are visiting. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If you need to phase in a block policy, set categories to continue and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A title="create a custom response page" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/customize-the-url-filtering-response-pages.html" target="_blank" rel="noopener"&gt;create a custom response page&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;to educate users on your acceptable use policies and alert them to the fact that they are visiting a site that may pose a threat. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;This will pave the way for you to outright block the categories after a monitoring period.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;STRONG&gt;What if I can’t block all of the recommended categories?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you find that users need access to sites in the blocked categories, consider creating an allow list for just the specific sites if you feel the risk is justified. On categories you decide to allow, make sure you&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A title="set up credential phishing prevention" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/threat-prevention/prevent-credential-phishing/set-up-credential-phishing-prevention" target="_blank" rel="noopener"&gt;set up credential phishing prevention&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;to ensure that users aren’t submitting their corporate credentials to a site that may be hosting a phishing attack. Allowing traffic to a recommended block category poses the following risks:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Malware –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Sites known to host malware or used for command and control (C2) traffic. May also exhibit Exploit Kits.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Phishing –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Known to host credential phishing pages or phishing for personal identification.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Dynamic-dns –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Hosts and domain names for systems with dynamically assigned IP addresses and which are oftentimes used to deliver malware payloads or C2 traffic. Also, dynamic DNS domains do not go through the same vetting process as domains that are registered by a reputable domain registration company and are, therefore, less trustworthy.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Unknown –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Sites that have not yet been identified by PAN-DB, perhaps because they were just registered. However,&amp;nbsp; these are sites that are oftentimes generated by domain generation algorithms and are later found to exhibit malicious behavior.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Command-and-control –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Command-and-control URLs and domains used by malware and/or compromised systems to surreptitiously communicate with an attacker's remote server to receive malicious commands or exfiltrate data.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Copyright-infringement –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Domains with illegal content, such as content that allows illegal download of software or other intellectual property. This category was introduced to enable adherence to child protection laws required in the education industry as well as laws in countries that require internet providers to prevent users from sharing copyrighted material through their service.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Extremism –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Websites promoting terrorism, racism, fascism or other extremist views discriminating people or groups of different ethnic backgrounds, religions, or other beliefs. This category was introduced to enable adherence to child protection laws required in the education industry.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Proxy-avoidance-and-anonymizers –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;URLs and services often used to bypass content filtering products.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Parked –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Domains registered by individuals, oftentimes later found to be used for credential phishing. These domains may be similar to legitimate domains. For example, pal0alto0netw0rks.com, with the intent of phishing for credentials or personal identify information. Or, they may be domains that an individual purchases rights in hopes that it may be valuable someday, such as panw.net.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc520305318"&gt;&lt;/A&gt;USE URL Categories to Define Traffic to Decrypt or Not Decrypt&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Plan to decrypt as much traffic that is not private or sensitive as your firewall&amp;nbsp;resources&amp;nbsp;allow to reduce the attack surface by exposing and preventing encrypted threats. Understand local laws and regulations about the traffic you can legally decrypt and user notification requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see documentation for &lt;SPAN&gt;&lt;A title="SSL Decryption deployment" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/decryption/decryption-overview" target="_blank" rel="noopener"&gt;&lt;EM&gt;SSL Decryption deployment&lt;/EM&gt;&lt;/A&gt;&lt;/SPAN&gt; and pre-requisites&lt;EM&gt;. &lt;/EM&gt;The below steps describe Decryption policy definitions only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create a “no-decrypt” policy that will prevent any website mapping to the recommended "no-decrypt" URL category list (i.e., financial-services, health-and-medicine, government, etc.) from being decrypted.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Even while not using decryption it is a recommended best practice to create a Decryption Profile to block sessions with expired certificates or untrusted issuers and use it with your "no-decrypt" policy.&lt;/LI&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Decryption Profile&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Add a Profile called “nodecrypt” and check “Block sessions with expired certificates” and “Block sessions with untrusted issuers” under &lt;STRONG&gt;No Decryption&lt;/STRONG&gt; tab.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18921i7BC52902436F1792/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Decryption&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a &lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally enter a&amp;nbsp;Description&amp;nbsp;and&amp;nbsp;Tag(s).&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;URL Category&lt;/STRONG&gt;&amp;nbsp;tab, click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;&amp;nbsp;and select the&amp;nbsp;financial-services, government,&amp;nbsp;and&amp;nbsp;health-and-medicine URL categories.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Options&lt;/STRONG&gt;&amp;nbsp;tab, set the action to&amp;nbsp;No Decrypt.&lt;/LI&gt;
&lt;LI&gt;Also set &lt;STRONG&gt;Decryption Profile&lt;/STRONG&gt; to a “nodecrypt”.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the policy rule.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Create a “must-decrypt” policy that will decrypt any website mapping to the recommended "must-decrypt" URL category list. &lt;BR /&gt;(Malware, Phishing, Unknown, Command-and-control, Copyright-infringement, Proxy-avoidance-and-anonymizers, Content-deliver-networks, Parked, Web-based-email, Social Networking, Personal-sites-blogs, Web-hosting, Insufficient-content, Not-resolved, Online-storage and backup, Hacking, Questionable, Dynamic DNS)&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Decryption&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally enter a&amp;nbsp;Description&amp;nbsp;and&amp;nbsp;Tag(s).&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the &lt;STRONG&gt;Service/URL Category&lt;/STRONG&gt; tab, enter all the Recommended URL Categories&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Options&lt;/STRONG&gt;&amp;nbsp;tab, set the Action to&amp;nbsp;Decrypt&amp;nbsp;and the&amp;nbsp;Type&amp;nbsp;to&amp;nbsp;SSL Forward Proxy.&lt;/LI&gt;
&lt;LI&gt;Use a Decryption Profile along with your decryption policy to block sessions that fail on SSL decryption.&lt;/LI&gt;
&lt;LI&gt;Ensure that this "must-decrypt" policy is listed after the "no-decrypt" policy to ensure that rule processing occurs in the correct order.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18922i47967731EB14E9CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Create a “best-effort-decrypt” policy that will decrypt all other traffic using the same steps as above but with URL categories set to "any" and a Decryption Profile with options under Failure Checks section unchecked. This ensures that sessions are allowed even if SSL decryption fails.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18923iCBE3EC86FB60881A/image-size/large?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With these three decrypt policies in place, any traffic destined for the&amp;nbsp;financial-services&amp;nbsp;or&amp;nbsp;health-and-medicine&amp;nbsp;or government URL categories will not be decrypted. All other traffic will be decrypted.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680738"&gt;&lt;/A&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;URL Filtering Use Cases&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Case-1:&lt;/STRONG&gt; Policy to block download of high-risk file types from certain categories [Decryption + URL Filtering + File-Blocking + Threat Prevention]&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Please refer to &lt;SPAN&gt;&lt;A title="SSL Decryption Best Practices" href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-decryption/decryption-best-practices" target="_blank" rel="noopener"&gt;SSL Decryption Best Practices&lt;/A&gt;&lt;/SPAN&gt; to enable SSL decryption. This is necessary to accurately inspect, classify, and block encrypted traffic.&lt;/LI&gt;
&lt;LI&gt;Create a File Blocking Security Profile.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;The default basic file blocking profile can be used, or we can create a custom profile based on the basic file blocking profile.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;File Blocking&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select “&lt;STRONG&gt;basic file blocking&lt;/STRONG&gt;” or “&lt;STRONG&gt;strict file blocking&lt;/STRONG&gt;” profile and click &lt;STRONG&gt;Clone&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Rename the profile and edit to select appropriate file types for Block, Continue, and Alert actions based on your company policy or use the default profile provided.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18924iD925016F1B2CB978/image-size/large?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Create the security policy rule that will block risky file downloads from specific categories.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;This rule must precede other rules because it is a specific rule. (More specific rules must precede other rules.)&lt;/LI&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally a&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Tag(s)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab add the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, select the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the &lt;STRONG&gt;Service/URL Category&lt;/STRONG&gt; tab, Add the specific categories from which risky file download needs to be blocked. (i.e., Web-hosting, Personal-sites-blogs, Social Networking, Peer-to-Peer, Online-storage and backup, Web-based-email, Copyright-infringement, Shareware-and-freeware).&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Actions&lt;/STRONG&gt;&amp;nbsp;tab, select Action “Allow” and add the default profiles for&amp;nbsp;Antivirus,&amp;nbsp;Vulnerability Protection, Anti-Spyware, URL Filtering, and the newly created File Blocking profile.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the security profile.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Commit&lt;/STRONG&gt; the Configuration.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="6.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18925i7BAD7620F2999A15/image-size/large?v=v2&amp;amp;px=999" role="button" title="6.png" alt="6.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;With this Security policy rule in place, any user trying to download executable files or other risky files from Dropbox, Box, or any free software download websites will be blocked.&lt;/LI&gt;
&lt;LI&gt;Because this rule will also allow access to the internet, threat prevention profiles are applied to the rule, so traffic that matches the policy will be scanned for threats. This is important because the allow rule is terminal and will not continue to check other rules if there is a traffic match.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Case-2:&lt;/STRONG&gt; Policy to Control Web Access [Decryption + User-ID + App-ID + URL Filtering + Data Filtering + Threat Prevention]&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In this use case, users belonging to the Marketing group, for example, have access to Box for collaboration but not to any of the other “online-storage-and backup” vendors. All other users are blocked from all “online-storage-and-backup” applications. The company policy also states that documents marked “Confidential” should not be shared on Box by the Marketing group.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Please refer to the &lt;SPAN&gt;&lt;A title="SSL Decryption Best Practices" href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-decryption/decryption-best-practices" target="_blank" rel="noopener"&gt;SSL Decryption Best Practices&lt;/A&gt;&lt;/SPAN&gt; to enable SSL decryption. This is necessary to accurately inspect, classify, and block encrypted traffic.&lt;/LI&gt;
&lt;LI&gt;Create a Security Policy that will block all users from accessing “online-backup-and-storage” applications. This can be done either using a specific Security Policy or as part of a URL Filtering profile that would be included in all Security Policies that allow internet access.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally a&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Tag(s)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab add the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, select the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Service/URL Category&lt;/STRONG&gt;&amp;nbsp;tab, click&amp;nbsp;Add&amp;nbsp;and add the&amp;nbsp;online-storage-and-backup&amp;nbsp;category.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Actions&lt;/STRONG&gt;&amp;nbsp;tab, select Action Deny.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the security profile.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Create a Data Pattern Custom Object and add it to a data filtering Security Profile.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Custom Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Data Patterns&lt;/STRONG&gt; and click &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Pattern Type&lt;/STRONG&gt; as “Regular Expression”.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;File Type&lt;/STRONG&gt; as “Any”.&lt;/LI&gt;
&lt;LI&gt;Set &lt;STRONG&gt;Data Pattern&lt;/STRONG&gt; to “.*((Confidential)|(CONFIDENTIAL))”.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Data Filtering&lt;/STRONG&gt; and click &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Set the &lt;STRONG&gt;Data Pattern Field&lt;/STRONG&gt; to the above created object.&lt;/LI&gt;
&lt;LI&gt;Set &lt;STRONG&gt;Alert/Block Threshold&lt;/STRONG&gt; to 1 and &lt;STRONG&gt;Log Severity&lt;/STRONG&gt; to Critical and Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="7.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18926i332DD5D6ECC887BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="7.png" alt="7.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18927i4EB89236AB152272/image-size/large?v=v2&amp;amp;px=999" role="button" title="8.png" alt="8.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Create the Security Policy that will allow the Marketing group to access Box application. Because this allow rule will also allow access to the internet, threat prevention profiles are applied to the rule, so traffic that matches the policy will be scanned for threats.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;This rule must precede other rules because it is more specific than the other policies.&lt;/LI&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally a&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Tag(s)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab add the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;User&lt;/STRONG&gt;&amp;nbsp;tab in the&amp;nbsp;Source User&amp;nbsp;section click&amp;nbsp;Add.&lt;/LI&gt;
&lt;LI&gt;Select the directory group that contains your&amp;nbsp;marketing&amp;nbsp;users.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, select the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Applications&lt;/STRONG&gt;&amp;nbsp;tab, click&amp;nbsp;Add&amp;nbsp;and add the&amp;nbsp;boxnet&amp;nbsp;App-ID signature.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Actions&lt;/STRONG&gt;&amp;nbsp;tab, add the default profiles for&amp;nbsp;Antivirus,&amp;nbsp;Vulnerability Protection, and&amp;nbsp;Anti-Spyware.&lt;/LI&gt;
&lt;LI&gt;Also add the Data Filtering profile that was created in the previous step.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the Security Profile and commit the configuration.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="9.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18928i04D2CEBA1FD9979F/image-size/large?v=v2&amp;amp;px=999" role="button" title="9.png" alt="9.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;With these policies in place, any user who is part of the Marketing group will have full access to Box application and any user that is not part of the Marketing group will be blocked from all online-storage-and-backup websites.&lt;/LI&gt;
&lt;LI&gt;Additionally, all files that are shared on Box will be scanned for the keyword “Confidential” and blocked if found. An entry will also be logged under &lt;STRONG&gt;Monitor&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Logs&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Data Filtering&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Case-3:&lt;/STRONG&gt; Subscribe to an external malicious URL feed [URL Filtering + External Dynamic Lists]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In this use case, a&lt;/EM&gt;&lt;EM&gt;dministrator wants the firewall to ingest an external feed that provides IOCs (Indicators of Compromise) in the form of URLs. This dynamic list of URLs has to be continuously updated in policy and blocked by Palo Alto Networks next generation firewall without any manual intervention.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To protect your network from new sources of threat or malware, you can use&amp;nbsp;&lt;SPAN&gt;&lt;A title="External Dynamic List" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank" rel="noopener"&gt;External Dynamic List&lt;/A&gt;&lt;/SPAN&gt;&amp;nbsp;in URL Filtering profiles to block or allow or to define granular actions such as continue, alert, or override for URLs before you attach the profile to a Security Policy rule. Unlike the allow list, block list, or a custom URL category on the firewall, an external dynamic list gives you the ability to update the list without a configuration change or commit on the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;External Dynamic Lists&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Type&lt;/STRONG&gt; “URL List”.&lt;/LI&gt;
&lt;LI&gt;Enter &lt;STRONG&gt;Source&lt;/STRONG&gt; [this could be a web server hosting a file of URL’s].&lt;/LI&gt;
&lt;LI&gt;Select appropriate Frequency of checks using the Repeat field.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="10.png" style="width: 620px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18929i7636FB359072BE6E/image-size/large?v=v2&amp;amp;px=999" role="button" title="10.png" alt="10.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;URL Filtering&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select appropriate URL Filtering profile.&lt;/LI&gt;
&lt;LI&gt;The above created EDL should be seen as a custom category.&lt;/LI&gt;
&lt;LI&gt;Assign appropriate policy action to this category.&lt;/LI&gt;
&lt;LI&gt;This URL Filtering profile can now be added to a Security Policy(s).&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="11.png" style="width: 677px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18930i772A88042F2B9230/image-size/large?v=v2&amp;amp;px=999" role="button" title="11.png" alt="11.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;With this Security Policy in place, any user attempting to connect to websites part of the URL feed will be blocked. This URL list is dynamically updated by the firewall without any commit required by the administrator. Any attempt to connect to these URLs is also logged under &lt;STRONG&gt;Monitor&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Logs&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;URL Filtering&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680739"&gt;&lt;/A&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Useful Resources&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="PAN-DB URL Categorization Workflow" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/pan-db-categorization" target="_blank" rel="noopener"&gt;PAN-DB URL Categorization Workflow&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Monitor Web Activity" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/monitor-web-activity" target="_blank" rel="noopener"&gt;Monitor Web Activity&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Configure URL Filtering" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/configure-url-filtering" target="_blank" rel="noopener"&gt;Configure URL Filtering&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Customize URL Filtering Response Pages" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/customize-the-url-filtering-response-pages" target="_blank" rel="noopener"&gt;Customize URL Filtering Response Pages&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Create Custom URL Categories" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH5CAK" target="_blank" rel="noopener"&gt;Create Custom URL Categories&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Use an External Dynamic List in a URL Filtering Profile" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/use-an-external-dynamic-list-in-a-url-filtering-profile" target="_blank" rel="noopener"&gt;Use an External Dynamic List in a URL Filtering Profile&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Safe Search Enforcement" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/safe-search-enforcement" target="_blank" rel="noopener"&gt;Safe Search Enforcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Prevent Credential Phishing" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/threat-prevention/prevent-credential-phishing" target="_blank" rel="noopener"&gt;Prevent Credential Phishing&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Troubleshoot URL Filtering" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/troubleshoot-url-filtering" target="_blank" rel="noopener"&gt;Troubleshoot URL Filtering&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Incorrect Categorization" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/troubleshoot-url-filtering/incorrect-categorization" target="_blank" rel="noopener"&gt;Incorrect Categorization&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="SSL Decryption Overview" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/decryption/decryption-overview" target="_blank" rel="noopener"&gt;SSL Decryption Overview&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 28 Feb 2019 12:55:17 GMT</pubDate>
    <dc:creator>sshibiraj</dc:creator>
    <dc:date>2019-02-28T12:55:17Z</dc:date>
    <item>
      <title>Symantec WebFilter to PAN-DB URL Filtering Migration Guide</title>
      <link>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/ta-p/247332</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;H1&gt;Table of Contents&lt;/H1&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680733"&gt;Introduction.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680734"&gt;Category Mappings For Moving From Symantec WebFilter to PAN-DB.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680735"&gt;Roll Out URL Category Enforcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680736"&gt;Best Practice URL Filtering Profile.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc520305318"&gt;Use URL Categories To Define SSL Decryption Policies.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680738"&gt;URL Filtering Use Cases.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="#_Toc521680739"&gt;Useful Resources.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680733"&gt;&lt;/A&gt;&lt;SPAN&gt;Introduction&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This document is designed to assist you in migrating your environment from using Symantec Web Filter categories on ProxySG to using URL filtering capabilities in the Palo Alto Networks next-generation firewall enabled by PAN-DB, Palo Alto Networks cloud-based URL categorization service.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first part of this document contains category mappings to assist you in selecting which PAN-DB URL categories to use. In most cases, there is a one-to-one mapping between the URL categorization commonly used in Symantec Web Filter and the categorization provided by Palo Alto Networks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The second part of the document contains examples on how to migrate from Symantec Web Filter categories to PAN-DB categories and how to use them in the security policies of the next-generation firewall. During the migration, it is a recommended best practice to configure a URL Filtering profile with all categories set to “alert” in parallel with your web filtering solution. This allows you to run reports in PAN-OS and Proxy-SG to verify policies and category mappings before switching the URL filtering functions over completely to PAN-DB URL categorization on our next generation firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The third part of this document contains usage examples and recommended security best practices when using PAN-DB&amp;nbsp;for URL categorization in the next-generation firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680734"&gt;&lt;/A&gt;Category Mappings for Moving From Symantec WebFilter to PAN-DB&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To start the migration, the first thing we recommend is to review the categories that are blocked by policy with the Symantec WebFilter and map them to the corresponding PAN-DB URL categories.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Symantec WebFilter Database is organized into 85 URL categories. You can find&amp;nbsp;a complete list and definitions of the categories at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="https://sitereview.bluecoat.com/category-descriptions" href="https://sitereview.bluecoat.com/category-descriptions" target="_blank" rel="noopener"&gt;https://sitereview.bluecoat.com/category-descriptions&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-DB is organized into more than 65 URL categories. You can find&amp;nbsp;a complete list and definitions of the categories at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="Complete List of PAN-DB URL Filtering Categories" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5hCAC" target="_blank" rel="noopener"&gt;Complete List of PAN-DB URL Filtering Categories&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Symantec WebFilter offers a service called “Site Review.” The purpose of “Site Review” is to allow Symantec customers to check the current database categorization of WebFilter URLs and report sites that they believe are incorrectly categorized. You can find the "Site Review" at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="https://sitereview.bluecoat.com/" href="https://sitereview.bluecoat.com/" target="_blank" rel="noopener"&gt;https://sitereview.bluecoat.com/&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-DB URL filter also offers a service called “Test a Site.” The purpose of “Test a Site” is to allow Palo Alto Networks customers to check the current database categorization of PAN-DB URLs and report sites that they believe are incorrectly categorized. You can find "Test a Site" at this link:&amp;nbsp;&lt;SPAN&gt;&lt;A title="https://urlfiltering.paloaltonetworks.com/" href="https://urlfiltering.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;https://urlfiltering.paloaltonetworks.com/&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The table below will help you with the category mapping exercise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Symantec&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Palo Alto Networks&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Differences&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Recommendations&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Abortion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Abortion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Adult/Mature Content&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Alcohol&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Alcohol and Tobacco&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Alternative Spirituality/Belief&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Religion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Art/Culture&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment and Arts&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Auctions&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Auctions&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Audio/Video Clips&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media or Music&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Brokerage/Trading&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Stock Advice and Tools or Financial Services&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Business/Economy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Business and Economy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Charitable Organizations&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Chat (IM)/SMS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Child Pornography&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Computer/Information Security&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info or Hacking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Content Servers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Content Delivery Networks&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Controlled Substances&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Abused Drugs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Dynamic DNS Host&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Dynamic-DNS&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “dynamic-dns” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;E-Card/Invitations&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shareware-and-Freeware&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Education&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Educational Institutions&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Email&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Web-based Email&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment and Arts&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Extreme&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Extremism&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “extremism” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;File Storage/Sharing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Online Storage and Backup&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Financial Services&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Financial Services&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;For Kids&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;This Symantec category is not a stand-alone category&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Gambling&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Gambling&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Games&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Games&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Government/Legal&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Government&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Hacking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Hacking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Health&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Health and Medicine&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Humor/Jokes&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Entertainment and Arts or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Informational&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;N/A&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;This Symantec category is not a stand-alone category&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Recommended action:&lt;/P&gt;
&lt;P&gt;– Use “Test a Site” to find corresponding PAN-DB category for matching websites&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;– Or Create a Custom URL category and control matching websites&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Internet Connected Devices&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;There is no one-to-one mapping for this category. This is a subset of “computer-and-internet-info” category&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Recommended action:&lt;/P&gt;
&lt;P&gt;– Use “Test a Site” to find corresponding PAN-DB category for matching websites&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;– Or Create a Custom URL category and control matching websites&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Internet Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Intimate Apparel/Swimsuit&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Swimsuits and Intimate Apparel&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Job Search/Careers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Job Search&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Malicious Outbound Data/Botnets&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Command-and-Control&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “Command-and-Control” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Malicious Sources/Malnets&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Malware&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “malware” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Marijuana&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Abused Drugs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Media Sharing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media or Online Storage and Backup&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Military&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Military&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Mixed Content/ Potentially Adult&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult, Nudity or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Based on the category description provided by Symantec, most URLs should be mapped to “adult” but the URLs could also be part of “nudity” or “questionable”&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;News/Media&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;News&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Newsgroups/Forums&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;News or Personal-Sites-And-Blogs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Non-Viewable/Infrastructure&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Insufficient Content&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Nudity&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Nudity&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Office/Business Applications&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Online Meetings&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Peer-to-Peer (P2P)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Peer-to-Peer&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Personals/Dating&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Dating&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Personal Sites&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Personal Sites and Blogs&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Phishing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Phishing&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “phishing” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Piracy/Copyright Concerns&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Copyright-Infringement&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “copyright-infringement“ category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Placeholders&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Parked&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “parked” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Political/Social Advocacy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Philosophy and Political Advocacy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Pornography&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Potentially Unwanted Software&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shareware and Freeware or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Proxy Avoidance&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Proxy Avoidance and Anonymizers&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “proxy-avoidance-and-anonymizers” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Radio/Audio Streams&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Real Estate&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Real Estate&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Reference&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Reference and Research&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Religion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Religion&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Remote Access Tools&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Internet Communications and Telephony&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Restaurants/Dining/Food&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Scam/Questionable/Illegal&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Search Engines/Portals&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Search Engines&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Sex Education&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Sex Education&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Sexual Expression&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Adult or Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;If the website content pertains to sexual identity then the category will be "society"&lt;/P&gt;
&lt;P&gt;If not, the category will be "adult"&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Shopping&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shopping&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Social Networking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Social Networking&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Society/Daily Living&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Society&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Software Downloads&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Shareware and Freeware or Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Spam&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;URLs related to spam are included in the category "questionable"&lt;/P&gt;
&lt;P&gt;This category also includes websites with illegal, immoral and offensive content&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Sports/Recreation&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Sports&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Suspicious&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Insufficient Content or Questionable&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Technology/Internet&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Computer and Internet Info&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Tobacco&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Alcohol and Tobacco&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Translation&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Translation&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Travel&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Travel&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;TV/Video Streams&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Streaming Media&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Uncategorized&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Unknown&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “unknown” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Vehicles&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Motor Vehicles&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Violence/Hate/Racism&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Extremism&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Best Practice recommendation, Block “extremism” category&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Weapons&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Weapons&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Web Ads/Analytics&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Web Advertisements&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Web Hosting&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Web Hosting&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680735"&gt;&lt;/A&gt;Roll Out URL Category Enforcement&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The recommended practice for deploying URL filtering in your organization is to start with a “passive" URL Filtering profile that will create log entries by employing the “alert” policy action on all categories in parallel with your existing web filter appliance.
&lt;UL&gt;
&lt;LI type="circle"&gt;On the Palo Alto Networks firewall, create a new URL Filtering profile.
&lt;UL&gt;
&lt;LI type="square"&gt;Select&amp;nbsp;&lt;STRONG&gt;Objects &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; Security Profiles &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; URL Filtering&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI type="square"&gt;Select the default profile and then click&amp;nbsp;&lt;STRONG&gt;Clone&lt;/STRONG&gt;. The new profile will be named&amp;nbsp;&lt;STRONG&gt;default-1&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI type="square"&gt;Select the&amp;nbsp;&lt;STRONG&gt;default-1&amp;nbsp;&lt;/STRONG&gt;profile and rename it. For example, rename it to URL-Monitoring.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI type="circle"&gt;Configure the action for all categories to&amp;nbsp;alert.
&lt;UL&gt;
&lt;LI type="square"&gt;In the section that lists all URL categories, select all categories.&lt;/LI&gt;
&lt;LI type="square"&gt;To the right of the&amp;nbsp;&lt;EM&gt;Action&amp;nbsp;&lt;/EM&gt;column heading, mouse over and select the down arrow and then select&amp;nbsp;&lt;STRONG&gt;Set Selected Actions&lt;/STRONG&gt;&amp;nbsp;and choose &lt;STRONG&gt;Alert&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI type="square"&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the profile.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18920i93B114EBE17ECC02/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;After setting the &lt;STRONG&gt;Alert&lt;/STRONG&gt; action, you can monitor user web activity through URL filtering reports on both appliances for a few days or weeks to determine accuracy of the provided category mappings. Palo Alto Networks recommends to validate accuracy for the top 1,000 websites seen by your organization.
&lt;UL&gt;
&lt;LI type="circle"&gt;Apply the URL Filtering profile to the security policy rule(s) that allows web traffic&amp;nbsp;of users.
&lt;UL&gt;
&lt;LI type="square"&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; Security&amp;nbsp;&lt;/STRONG&gt;and select the appropriate security policy to modify it.&lt;/LI&gt;
&lt;LI type="square"&gt;Select the&amp;nbsp;&lt;STRONG&gt;Actions&amp;nbsp;&lt;/STRONG&gt;tab and in the&amp;nbsp;&lt;STRONG&gt;Profile Setting&lt;/STRONG&gt;&amp;nbsp;section, click the drop-down for&amp;nbsp;&lt;STRONG&gt;URL filtering &lt;/STRONG&gt;and select the new profile.&lt;/LI&gt;
&lt;LI type="square"&gt;Click&amp;nbsp;&lt;STRONG&gt;OK &lt;/STRONG&gt;to save.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI type="circle"&gt;View the URL filtering logs to determine all of the website categories that your users are accessing.&lt;/LI&gt;
&lt;LI type="circle"&gt;For information on viewing the logs and generating reports, see&amp;nbsp;&lt;SPAN&gt;&lt;A title="Monitor Web Activity" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/monitor-web-activity#id648a849c-db96-4028-a6cc-f669dc109ed4" target="_blank" rel="noopener"&gt;Monitor Web Activity&lt;/A&gt;&lt;/SPAN&gt;.
&lt;UL&gt;
&lt;LI type="square"&gt;Select&amp;nbsp;&lt;STRONG&gt;Monitor &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; Logs &lt;/STRONG&gt;&amp;gt;&lt;STRONG&gt; URL Filtering&lt;/STRONG&gt;. A log entry will be created for any website that exists in the URL filtering database in a category that is set to any action other than&amp;nbsp;&lt;STRONG&gt;allow.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;In this procedure, all categories will be set to alert, which will cause traffic for all websites to be logged. This may potentially create a large amount of log files, so it is best to do this for initial monitoring purposes to determine the types of websites your users are accessing and compare URL categories triggered.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Collect all URL category objects used in the Symantec Web Filter Policy Manager and map them into PAN-DB URL categories using the provided URL category map after vetting them for accuracy using the above steps.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;After determining the categories that your organization allows users to access, set the policy action to “allow” for these URL categories on the next-generation firewall. The firewall does not generate logs for traffic matching these URL categories.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;You can then make decisions on the URL categories that should be controlled according to the company policy by setting the appropriate policy action to each of these categories in the URL Filtering profile(s). The recommended actions column of the "URL category" table in the previous section and the "best practices" section at the end of this document are provided to further assist you in making policy decisions.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;If possible, it is recommended to use a “slow roll” approach, using USER-ID as described below when deploying these newly created URL Filtering profile(s) to Security policies.
&lt;UL&gt;
&lt;LI type="circle"&gt;Clone an existing policy that allows web access and add an additional match criteria on User set to a single department. (i.e., IT, Marketing, Engineering, etc.)&lt;/LI&gt;
&lt;LI type="circle"&gt;Add the new URL Filtering profile to this Security policy and move the policy above all policies that allow web access since policy rules are matched top down.&lt;/LI&gt;
&lt;LI type="circle"&gt;Monitor the above policy for usage and get feedback from the users belonging to the Group Object.&lt;/LI&gt;
&lt;LI type="circle"&gt;Incorporate changes as necessary to the URL Filtering profile before adding it to all other applicable security policies.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680736"&gt;&lt;/A&gt;Best Practice URL Filtering Profile&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Attach a&amp;nbsp;&lt;SPAN&gt;&lt;A title="URL Filtering profile" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/url-filtering-concepts/url-filtering-profile" target="_blank" rel="noopener"&gt;URL Filtering profile&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;to all rules that allow access to web-based applications to protect against URLs that have been observed hosting malware or exploitive content.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;As a &lt;SPAN&gt;&lt;A title="best practice" href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-internet-gateway/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles" target="_blank" rel="noopener"&gt;best practice&lt;/A&gt;&lt;/SPAN&gt;, use PAN-DB&amp;nbsp;URL filtering&amp;nbsp;to prevent access to web content that is at high-risk for being malicious.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;These include command-and-control, copyright-infringement, dynamic-dns, extremism, malware, phishing, proxy-avoidance-and-anonymizers, unknown, and parked. The best practice URL Filtering profile sets all known dangerous URL categories to block. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Failure to block these dangerous categories puts you at risk for exploit infiltration, malware download, command and control activity, and data exfiltration.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;In addition to blocking known bad categories, you should also alert on all other categories so you have visibility into the sites your users are visiting. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;If you need to phase in a block policy, set categories to continue and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A title="create a custom response page" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/customize-the-url-filtering-response-pages.html" target="_blank" rel="noopener"&gt;create a custom response page&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;to educate users on your acceptable use policies and alert them to the fact that they are visiting a site that may pose a threat. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;This will pave the way for you to outright block the categories after a monitoring period.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;STRONG&gt;What if I can’t block all of the recommended categories?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you find that users need access to sites in the blocked categories, consider creating an allow list for just the specific sites if you feel the risk is justified. On categories you decide to allow, make sure you&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;A title="set up credential phishing prevention" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/threat-prevention/prevent-credential-phishing/set-up-credential-phishing-prevention" target="_blank" rel="noopener"&gt;set up credential phishing prevention&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;to ensure that users aren’t submitting their corporate credentials to a site that may be hosting a phishing attack. Allowing traffic to a recommended block category poses the following risks:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Malware –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Sites known to host malware or used for command and control (C2) traffic. May also exhibit Exploit Kits.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Phishing –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Known to host credential phishing pages or phishing for personal identification.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Dynamic-dns –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Hosts and domain names for systems with dynamically assigned IP addresses and which are oftentimes used to deliver malware payloads or C2 traffic. Also, dynamic DNS domains do not go through the same vetting process as domains that are registered by a reputable domain registration company and are, therefore, less trustworthy.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Unknown –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Sites that have not yet been identified by PAN-DB, perhaps because they were just registered. However,&amp;nbsp; these are sites that are oftentimes generated by domain generation algorithms and are later found to exhibit malicious behavior.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Command-and-control –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Command-and-control URLs and domains used by malware and/or compromised systems to surreptitiously communicate with an attacker's remote server to receive malicious commands or exfiltrate data.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Copyright-infringement –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Domains with illegal content, such as content that allows illegal download of software or other intellectual property. This category was introduced to enable adherence to child protection laws required in the education industry as well as laws in countries that require internet providers to prevent users from sharing copyrighted material through their service.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Extremism –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Websites promoting terrorism, racism, fascism or other extremist views discriminating people or groups of different ethnic backgrounds, religions, or other beliefs. This category was introduced to enable adherence to child protection laws required in the education industry.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Proxy-avoidance-and-anonymizers –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;URLs and services often used to bypass content filtering products.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Parked –&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Domains registered by individuals, oftentimes later found to be used for credential phishing. These domains may be similar to legitimate domains. For example, pal0alto0netw0rks.com, with the intent of phishing for credentials or personal identify information. Or, they may be domains that an individual purchases rights in hopes that it may be valuable someday, such as panw.net.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc520305318"&gt;&lt;/A&gt;USE URL Categories to Define Traffic to Decrypt or Not Decrypt&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Plan to decrypt as much traffic that is not private or sensitive as your firewall&amp;nbsp;resources&amp;nbsp;allow to reduce the attack surface by exposing and preventing encrypted threats. Understand local laws and regulations about the traffic you can legally decrypt and user notification requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see documentation for &lt;SPAN&gt;&lt;A title="SSL Decryption deployment" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/decryption/decryption-overview" target="_blank" rel="noopener"&gt;&lt;EM&gt;SSL Decryption deployment&lt;/EM&gt;&lt;/A&gt;&lt;/SPAN&gt; and pre-requisites&lt;EM&gt;. &lt;/EM&gt;The below steps describe Decryption policy definitions only.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create a “no-decrypt” policy that will prevent any website mapping to the recommended "no-decrypt" URL category list (i.e., financial-services, health-and-medicine, government, etc.) from being decrypted.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Even while not using decryption it is a recommended best practice to create a Decryption Profile to block sessions with expired certificates or untrusted issuers and use it with your "no-decrypt" policy.&lt;/LI&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Decryption Profile&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Add a Profile called “nodecrypt” and check “Block sessions with expired certificates” and “Block sessions with untrusted issuers” under &lt;STRONG&gt;No Decryption&lt;/STRONG&gt; tab.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18921i7BC52902436F1792/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Decryption&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a &lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally enter a&amp;nbsp;Description&amp;nbsp;and&amp;nbsp;Tag(s).&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;URL Category&lt;/STRONG&gt;&amp;nbsp;tab, click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;&amp;nbsp;and select the&amp;nbsp;financial-services, government,&amp;nbsp;and&amp;nbsp;health-and-medicine URL categories.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Options&lt;/STRONG&gt;&amp;nbsp;tab, set the action to&amp;nbsp;No Decrypt.&lt;/LI&gt;
&lt;LI&gt;Also set &lt;STRONG&gt;Decryption Profile&lt;/STRONG&gt; to a “nodecrypt”.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the policy rule.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Create a “must-decrypt” policy that will decrypt any website mapping to the recommended "must-decrypt" URL category list. &lt;BR /&gt;(Malware, Phishing, Unknown, Command-and-control, Copyright-infringement, Proxy-avoidance-and-anonymizers, Content-deliver-networks, Parked, Web-based-email, Social Networking, Personal-sites-blogs, Web-hosting, Insufficient-content, Not-resolved, Online-storage and backup, Hacking, Questionable, Dynamic DNS)&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Decryption&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally enter a&amp;nbsp;Description&amp;nbsp;and&amp;nbsp;Tag(s).&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, enter the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the &lt;STRONG&gt;Service/URL Category&lt;/STRONG&gt; tab, enter all the Recommended URL Categories&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Options&lt;/STRONG&gt;&amp;nbsp;tab, set the Action to&amp;nbsp;Decrypt&amp;nbsp;and the&amp;nbsp;Type&amp;nbsp;to&amp;nbsp;SSL Forward Proxy.&lt;/LI&gt;
&lt;LI&gt;Use a Decryption Profile along with your decryption policy to block sessions that fail on SSL decryption.&lt;/LI&gt;
&lt;LI&gt;Ensure that this "must-decrypt" policy is listed after the "no-decrypt" policy to ensure that rule processing occurs in the correct order.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18922i47967731EB14E9CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Create a “best-effort-decrypt” policy that will decrypt all other traffic using the same steps as above but with URL categories set to "any" and a Decryption Profile with options under Failure Checks section unchecked. This ensures that sessions are allowed even if SSL decryption fails.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18923iCBE3EC86FB60881A/image-size/large?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With these three decrypt policies in place, any traffic destined for the&amp;nbsp;financial-services&amp;nbsp;or&amp;nbsp;health-and-medicine&amp;nbsp;or government URL categories will not be decrypted. All other traffic will be decrypted.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680738"&gt;&lt;/A&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;URL Filtering Use Cases&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Case-1:&lt;/STRONG&gt; Policy to block download of high-risk file types from certain categories [Decryption + URL Filtering + File-Blocking + Threat Prevention]&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Please refer to &lt;SPAN&gt;&lt;A title="SSL Decryption Best Practices" href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-decryption/decryption-best-practices" target="_blank" rel="noopener"&gt;SSL Decryption Best Practices&lt;/A&gt;&lt;/SPAN&gt; to enable SSL decryption. This is necessary to accurately inspect, classify, and block encrypted traffic.&lt;/LI&gt;
&lt;LI&gt;Create a File Blocking Security Profile.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;The default basic file blocking profile can be used, or we can create a custom profile based on the basic file blocking profile.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;File Blocking&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select “&lt;STRONG&gt;basic file blocking&lt;/STRONG&gt;” or “&lt;STRONG&gt;strict file blocking&lt;/STRONG&gt;” profile and click &lt;STRONG&gt;Clone&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Rename the profile and edit to select appropriate file types for Block, Continue, and Alert actions based on your company policy or use the default profile provided.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18924iD925016F1B2CB978/image-size/large?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Create the security policy rule that will block risky file downloads from specific categories.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;This rule must precede other rules because it is a specific rule. (More specific rules must precede other rules.)&lt;/LI&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally a&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Tag(s)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab add the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, select the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the &lt;STRONG&gt;Service/URL Category&lt;/STRONG&gt; tab, Add the specific categories from which risky file download needs to be blocked. (i.e., Web-hosting, Personal-sites-blogs, Social Networking, Peer-to-Peer, Online-storage and backup, Web-based-email, Copyright-infringement, Shareware-and-freeware).&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Actions&lt;/STRONG&gt;&amp;nbsp;tab, select Action “Allow” and add the default profiles for&amp;nbsp;Antivirus,&amp;nbsp;Vulnerability Protection, Anti-Spyware, URL Filtering, and the newly created File Blocking profile.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the security profile.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Commit&lt;/STRONG&gt; the Configuration.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="6.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18925i7BAD7620F2999A15/image-size/large?v=v2&amp;amp;px=999" role="button" title="6.png" alt="6.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;With this Security policy rule in place, any user trying to download executable files or other risky files from Dropbox, Box, or any free software download websites will be blocked.&lt;/LI&gt;
&lt;LI&gt;Because this rule will also allow access to the internet, threat prevention profiles are applied to the rule, so traffic that matches the policy will be scanned for threats. This is important because the allow rule is terminal and will not continue to check other rules if there is a traffic match.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Case-2:&lt;/STRONG&gt; Policy to Control Web Access [Decryption + User-ID + App-ID + URL Filtering + Data Filtering + Threat Prevention]&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In this use case, users belonging to the Marketing group, for example, have access to Box for collaboration but not to any of the other “online-storage-and backup” vendors. All other users are blocked from all “online-storage-and-backup” applications. The company policy also states that documents marked “Confidential” should not be shared on Box by the Marketing group.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Please refer to the &lt;SPAN&gt;&lt;A title="SSL Decryption Best Practices" href="https://www.paloaltonetworks.com/documentation/81/best-practices/best-practices-decryption/decryption-best-practices" target="_blank" rel="noopener"&gt;SSL Decryption Best Practices&lt;/A&gt;&lt;/SPAN&gt; to enable SSL decryption. This is necessary to accurately inspect, classify, and block encrypted traffic.&lt;/LI&gt;
&lt;LI&gt;Create a Security Policy that will block all users from accessing “online-backup-and-storage” applications. This can be done either using a specific Security Policy or as part of a URL Filtering profile that would be included in all Security Policies that allow internet access.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally a&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Tag(s)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab add the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, select the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Service/URL Category&lt;/STRONG&gt;&amp;nbsp;tab, click&amp;nbsp;Add&amp;nbsp;and add the&amp;nbsp;online-storage-and-backup&amp;nbsp;category.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Actions&lt;/STRONG&gt;&amp;nbsp;tab, select Action Deny.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the security profile.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Create a Data Pattern Custom Object and add it to a data filtering Security Profile.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Custom Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Data Patterns&lt;/STRONG&gt; and click &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Pattern Type&lt;/STRONG&gt; as “Regular Expression”.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;File Type&lt;/STRONG&gt; as “Any”.&lt;/LI&gt;
&lt;LI&gt;Set &lt;STRONG&gt;Data Pattern&lt;/STRONG&gt; to “.*((Confidential)|(CONFIDENTIAL))”.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Data Filtering&lt;/STRONG&gt; and click &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Set the &lt;STRONG&gt;Data Pattern Field&lt;/STRONG&gt; to the above created object.&lt;/LI&gt;
&lt;LI&gt;Set &lt;STRONG&gt;Alert/Block Threshold&lt;/STRONG&gt; to 1 and &lt;STRONG&gt;Log Severity&lt;/STRONG&gt; to Critical and Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="7.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18926i332DD5D6ECC887BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="7.png" alt="7.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18927i4EB89236AB152272/image-size/large?v=v2&amp;amp;px=999" role="button" title="8.png" alt="8.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;Create the Security Policy that will allow the Marketing group to access Box application. Because this allow rule will also allow access to the internet, threat prevention profiles are applied to the rule, so traffic that matches the policy will be scanned for threats.&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;This rule must precede other rules because it is more specific than the other policies.&lt;/LI&gt;
&lt;LI&gt;Select&amp;nbsp;&lt;STRONG&gt;Policies&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Security&lt;/STRONG&gt;&amp;nbsp;and click&amp;nbsp;&lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter a&amp;nbsp;&lt;STRONG&gt;Name&lt;/STRONG&gt;&amp;nbsp;and optionally a&amp;nbsp;&lt;STRONG&gt;Description&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;Tag(s)&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Source&lt;/STRONG&gt;&amp;nbsp;tab add the zone where the users are connected.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;User&lt;/STRONG&gt;&amp;nbsp;tab in the&amp;nbsp;Source User&amp;nbsp;section click&amp;nbsp;Add.&lt;/LI&gt;
&lt;LI&gt;Select the directory group that contains your&amp;nbsp;marketing&amp;nbsp;users.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&amp;nbsp;tab, select the zone that is connected to the internet.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Applications&lt;/STRONG&gt;&amp;nbsp;tab, click&amp;nbsp;Add&amp;nbsp;and add the&amp;nbsp;boxnet&amp;nbsp;App-ID signature.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Actions&lt;/STRONG&gt;&amp;nbsp;tab, add the default profiles for&amp;nbsp;Antivirus,&amp;nbsp;Vulnerability Protection, and&amp;nbsp;Anti-Spyware.&lt;/LI&gt;
&lt;LI&gt;Also add the Data Filtering profile that was created in the previous step.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;OK&lt;/STRONG&gt;&amp;nbsp;to save the Security Profile and commit the configuration.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="9.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18928i04D2CEBA1FD9979F/image-size/large?v=v2&amp;amp;px=999" role="button" title="9.png" alt="9.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;With these policies in place, any user who is part of the Marketing group will have full access to Box application and any user that is not part of the Marketing group will be blocked from all online-storage-and-backup websites.&lt;/LI&gt;
&lt;LI&gt;Additionally, all files that are shared on Box will be scanned for the keyword “Confidential” and blocked if found. An entry will also be logged under &lt;STRONG&gt;Monitor&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Logs&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Data Filtering&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Case-3:&lt;/STRONG&gt; Subscribe to an external malicious URL feed [URL Filtering + External Dynamic Lists]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In this use case, a&lt;/EM&gt;&lt;EM&gt;dministrator wants the firewall to ingest an external feed that provides IOCs (Indicators of Compromise) in the form of URLs. This dynamic list of URLs has to be continuously updated in policy and blocked by Palo Alto Networks next generation firewall without any manual intervention.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To protect your network from new sources of threat or malware, you can use&amp;nbsp;&lt;SPAN&gt;&lt;A title="External Dynamic List" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank" rel="noopener"&gt;External Dynamic List&lt;/A&gt;&lt;/SPAN&gt;&amp;nbsp;in URL Filtering profiles to block or allow or to define granular actions such as continue, alert, or override for URLs before you attach the profile to a Security Policy rule. Unlike the allow list, block list, or a custom URL category on the firewall, an external dynamic list gives you the ability to update the list without a configuration change or commit on the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;External Dynamic Lists&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Add&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Type&lt;/STRONG&gt; “URL List”.&lt;/LI&gt;
&lt;LI&gt;Enter &lt;STRONG&gt;Source&lt;/STRONG&gt; [this could be a web server hosting a file of URL’s].&lt;/LI&gt;
&lt;LI&gt;Select appropriate Frequency of checks using the Repeat field.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="10.png" style="width: 620px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18929i7636FB359072BE6E/image-size/large?v=v2&amp;amp;px=999" role="button" title="10.png" alt="10.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;Navigate to &lt;STRONG&gt;Objects&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Security Profiles&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;URL Filtering&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select appropriate URL Filtering profile.&lt;/LI&gt;
&lt;LI&gt;The above created EDL should be seen as a custom category.&lt;/LI&gt;
&lt;LI&gt;Assign appropriate policy action to this category.&lt;/LI&gt;
&lt;LI&gt;This URL Filtering profile can now be added to a Security Policy(s).&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="11.png" style="width: 677px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18930i772A88042F2B9230/image-size/large?v=v2&amp;amp;px=999" role="button" title="11.png" alt="11.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;With this Security Policy in place, any user attempting to connect to websites part of the URL feed will be blocked. This URL list is dynamically updated by the firewall without any commit required by the administrator. Any attempt to connect to these URLs is also logged under &lt;STRONG&gt;Monitor&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;Logs&lt;/STRONG&gt;&amp;nbsp;&amp;gt; &lt;STRONG&gt;URL Filtering&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A name="_Toc521680739"&gt;&lt;/A&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Useful Resources&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="PAN-DB URL Categorization Workflow" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/pan-db-categorization" target="_blank" rel="noopener"&gt;PAN-DB URL Categorization Workflow&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Monitor Web Activity" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/monitor-web-activity" target="_blank" rel="noopener"&gt;Monitor Web Activity&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Configure URL Filtering" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/configure-url-filtering" target="_blank" rel="noopener"&gt;Configure URL Filtering&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Customize URL Filtering Response Pages" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/customize-the-url-filtering-response-pages" target="_blank" rel="noopener"&gt;Customize URL Filtering Response Pages&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Create Custom URL Categories" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH5CAK" target="_blank" rel="noopener"&gt;Create Custom URL Categories&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Use an External Dynamic List in a URL Filtering Profile" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/use-an-external-dynamic-list-in-a-url-filtering-profile" target="_blank" rel="noopener"&gt;Use an External Dynamic List in a URL Filtering Profile&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Safe Search Enforcement" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/safe-search-enforcement" target="_blank" rel="noopener"&gt;Safe Search Enforcement&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Prevent Credential Phishing" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/threat-prevention/prevent-credential-phishing" target="_blank" rel="noopener"&gt;Prevent Credential Phishing&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Troubleshoot URL Filtering" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/troubleshoot-url-filtering" target="_blank" rel="noopener"&gt;Troubleshoot URL Filtering&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="Incorrect Categorization" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/url-filtering/troubleshoot-url-filtering/incorrect-categorization" target="_blank" rel="noopener"&gt;Incorrect Categorization&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A title="SSL Decryption Overview" href="https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/decryption/decryption-overview" target="_blank" rel="noopener"&gt;SSL Decryption Overview&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 28 Feb 2019 12:55:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/ta-p/247332</guid>
      <dc:creator>sshibiraj</dc:creator>
      <dc:date>2019-02-28T12:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Symantec WebFilter to PAN-DB URL Filtering Migration Guide</title>
      <link>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/tac-p/538191#M33</link>
      <description>&lt;P&gt;Is there an updated version to this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Apr 2023 03:46:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/tac-p/538191#M33</guid>
      <dc:creator>AustinClark</dc:creator>
      <dc:date>2023-04-11T03:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Symantec WebFilter to PAN-DB URL Filtering Migration Guide</title>
      <link>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/tac-p/1066681#M34</link>
      <description>&lt;P&gt;Can we get an update version of this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2025 18:27:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/featured-articles/symantec-webfilter-to-pan-db-url-filtering-migration-guide/tac-p/1066681#M34</guid>
      <dc:creator>AustinClark</dc:creator>
      <dc:date>2025-01-14T18:27:15Z</dc:date>
    </item>
  </channel>
</rss>

