<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Nominated Discussion: URL Filtering Profile Set to Allow Ransomware in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/ta-p/516907</link>
    <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;I data-stringify-type="italic"&gt;This article is based on a discussion,&lt;SPAN&gt;&lt;A title="URL set to allow Ransomware" href="https://live.paloaltonetworks.com/t5/general-topics/url-set-to-allow-ransomware/m-p/516381" target="_blank" rel="noopener"&gt;URL set to allow Ransomware&lt;/A&gt;,&lt;/SPAN&gt;&lt;/I&gt;&lt;I data-stringify-type="italic"&gt;&amp;nbsp;posted by &lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/204018" target="_blank" rel="noopener"&gt;@Schneur_Feldman&lt;/A&gt;&amp;nbsp;&lt;/I&gt;&lt;I data-stringify-type="italic"&gt;and answered by &lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130" target="_blank" rel="noopener"&gt;@Astardzhiev&lt;/A&gt;, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;.&lt;/I&gt;&lt;I data-stringify-type="italic"&gt;&amp;nbsp;Read on to see the discussion and solution!&lt;/I&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Can anyone please explain why Palo Alto Networks would release a Ransomware URL Category and put the default to allow?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's going to be a pain logging into every single client of ours that uses Palo and changing&amp;nbsp;Ransomware URL Category to block. Is there a way to automate it? What would the CLI command be?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Palo Alto Networks doesn't have visibility into how, why and where you are using your URL filtering profiles. They give you the tools, it is your decision how to use them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CLI command would be:&lt;/P&gt;
&lt;P&gt;- Locally managed firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set profiles url-filtering &amp;lt;profile-name&amp;gt; block ransomware&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Panorama managed firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set device-group &amp;lt;device-group-name&amp;gt; profiles url-filtering &amp;lt;profile-name&amp;gt; block ransomware&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are couple of ways to automate such change and depending on your environment:&lt;/P&gt;
&lt;P&gt;- Export firewall running config; search and edit the XML defining any URL filtering profile; import, load and commit the edited config&lt;/P&gt;
&lt;P&gt;- Similar as above but for Panorama config, modifying any URL filtering in all available device-groups&lt;/P&gt;
&lt;P&gt;From your comment it seems you support multiple different clients, which probably require different ways to connect and different credentials. So you are probably better using the XML API. You may want to check &lt;A href="https://github.com/PaloAltoNetworks/pan-os-python" target="_self"&gt;python framework&lt;/A&gt;, which could save you some time (connecting and authenticating to the device).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To further expand on this, Palo Alto Networks can't identify what you're using a profile for. If I have devices segmented off into a malware research zone and utilize a subset of my machines for those purposes, I absolutely wouldn't want Palo Alto Networks to modify my profiles to block a newly introduced category for a subset of machines where I would actually&amp;nbsp;&lt;EM&gt;want&amp;nbsp;&lt;/EM&gt;to allow the traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're managing multiple clients I'd really recommend looking at the benefits of utilizing Panorama to manage all of them, or better yet managing them directly through the XML configuration file and templating some of the configuration yourself if you can't get approved to purchase Panorama. The API here can also be a major help, but if you're not comfortable with it it's not going to be a quick fix since you'll need to be parsing results and using that information in additional changes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;MARK&gt;NOTE: The new "ransomware" category &lt;STRONG&gt;&lt;EM&gt;is&lt;/EM&gt;&lt;/STRONG&gt; blocked in the "default" URL Filtering category. But as you pointed out correctly&amp;nbsp;it is not blocked by default in custom URL Filtering categories because Palo Alto Networks doesn't know what you are using custom categories for.&lt;/MARK&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Default URL Filtering Profile" style="width: 969px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44415iDD1798E8B08395B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="default_url_profile.jpg" alt="Default URL Filtering Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Default URL Filtering Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Custom URL Filtering Profile" style="width: 967px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44416iB415704909FE9FF3/image-size/large?v=v2&amp;amp;px=999" role="button" title="custom_url_profile.jpg" alt="Custom URL Filtering Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Custom URL Filtering Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 05 Oct 2022 19:37:51 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2022-10-05T19:37:51Z</dc:date>
    <item>
      <title>Nominated Discussion: URL Filtering Profile Set to Allow Ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/ta-p/516907</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;I data-stringify-type="italic"&gt;This article is based on a discussion,&lt;SPAN&gt;&lt;A title="URL set to allow Ransomware" href="https://live.paloaltonetworks.com/t5/general-topics/url-set-to-allow-ransomware/m-p/516381" target="_blank" rel="noopener"&gt;URL set to allow Ransomware&lt;/A&gt;,&lt;/SPAN&gt;&lt;/I&gt;&lt;I data-stringify-type="italic"&gt;&amp;nbsp;posted by &lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/204018" target="_blank" rel="noopener"&gt;@Schneur_Feldman&lt;/A&gt;&amp;nbsp;&lt;/I&gt;&lt;I data-stringify-type="italic"&gt;and answered by &lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130" target="_blank" rel="noopener"&gt;@Astardzhiev&lt;/A&gt;, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;.&lt;/I&gt;&lt;I data-stringify-type="italic"&gt;&amp;nbsp;Read on to see the discussion and solution!&lt;/I&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Can anyone please explain why Palo Alto Networks would release a Ransomware URL Category and put the default to allow?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's going to be a pain logging into every single client of ours that uses Palo and changing&amp;nbsp;Ransomware URL Category to block. Is there a way to automate it? What would the CLI command be?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Palo Alto Networks doesn't have visibility into how, why and where you are using your URL filtering profiles. They give you the tools, it is your decision how to use them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CLI command would be:&lt;/P&gt;
&lt;P&gt;- Locally managed firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set profiles url-filtering &amp;lt;profile-name&amp;gt; block ransomware&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Panorama managed firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set device-group &amp;lt;device-group-name&amp;gt; profiles url-filtering &amp;lt;profile-name&amp;gt; block ransomware&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are couple of ways to automate such change and depending on your environment:&lt;/P&gt;
&lt;P&gt;- Export firewall running config; search and edit the XML defining any URL filtering profile; import, load and commit the edited config&lt;/P&gt;
&lt;P&gt;- Similar as above but for Panorama config, modifying any URL filtering in all available device-groups&lt;/P&gt;
&lt;P&gt;From your comment it seems you support multiple different clients, which probably require different ways to connect and different credentials. So you are probably better using the XML API. You may want to check &lt;A href="https://github.com/PaloAltoNetworks/pan-os-python" target="_self"&gt;python framework&lt;/A&gt;, which could save you some time (connecting and authenticating to the device).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To further expand on this, Palo Alto Networks can't identify what you're using a profile for. If I have devices segmented off into a malware research zone and utilize a subset of my machines for those purposes, I absolutely wouldn't want Palo Alto Networks to modify my profiles to block a newly introduced category for a subset of machines where I would actually&amp;nbsp;&lt;EM&gt;want&amp;nbsp;&lt;/EM&gt;to allow the traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're managing multiple clients I'd really recommend looking at the benefits of utilizing Panorama to manage all of them, or better yet managing them directly through the XML configuration file and templating some of the configuration yourself if you can't get approved to purchase Panorama. The API here can also be a major help, but if you're not comfortable with it it's not going to be a quick fix since you'll need to be parsing results and using that information in additional changes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;MARK&gt;NOTE: The new "ransomware" category &lt;STRONG&gt;&lt;EM&gt;is&lt;/EM&gt;&lt;/STRONG&gt; blocked in the "default" URL Filtering category. But as you pointed out correctly&amp;nbsp;it is not blocked by default in custom URL Filtering categories because Palo Alto Networks doesn't know what you are using custom categories for.&lt;/MARK&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Default URL Filtering Profile" style="width: 969px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44415iDD1798E8B08395B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="default_url_profile.jpg" alt="Default URL Filtering Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Default URL Filtering Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Custom URL Filtering Profile" style="width: 967px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44416iB415704909FE9FF3/image-size/large?v=v2&amp;amp;px=999" role="button" title="custom_url_profile.jpg" alt="Custom URL Filtering Profile" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Custom URL Filtering Profile&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 05 Oct 2022 19:37:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/ta-p/516907</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-10-05T19:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Nominated Discussion: URL Filtering Profile Set to Allow Ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/tac-p/523805#M559</link>
      <description>&lt;P&gt;If I may add my 2 cent here.&lt;BR /&gt;&lt;BR /&gt;While I can agree on the fact that Palo Alto is not aware of what a URL filtering profile is used for.&lt;/P&gt;&lt;P&gt;A new category like ransomware should at least be implemented as "alert" for all URL filtering profiles that are detected&lt;/P&gt;&lt;P&gt;Palo Alto is all about security. therefore to me as a customer. I would expect such a URL category to be blocked by default, or that I would have to manually enable that new URL category.&lt;/P&gt;&lt;P&gt;Now in regards to Encrypted-DNS i see how that might be a more tricky case and I could understand to have it as "Alert" only.&lt;/P&gt;&lt;P&gt;But what I would never want from a newly created URL category, to be implemented in my URL Profiles set to "ALLOW" that is by far the worst of them all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2022 15:51:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/tac-p/523805#M559</guid>
      <dc:creator>AlexNC</dc:creator>
      <dc:date>2022-12-12T15:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Nominated Discussion: URL Filtering Profile Set to Allow Ransomware</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/tac-p/523983#M561</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/135038"&gt;@AlexNC&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your feedback. I understand your concern.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do want to emphasize that the new "ransomware" category &lt;STRONG&gt;&lt;EM&gt;is&lt;/EM&gt;&lt;/STRONG&gt; blocked in the &lt;STRONG&gt;default&lt;/STRONG&gt; URL Filtering profile.&amp;nbsp; Current design sets it to a default allow on custom created URL filtering profiles only (same for all other categories).&lt;/P&gt;
&lt;P&gt;One can easily adjust the action on all categories at once and set it to alert for example.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;That being said, new categories will also get a default allow action. Customers are informed well in advance and usually a placeholder is created weeks in advance to allow customers to make the necessary adjustments in time.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 13 Dec 2022 17:24:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-url-filtering-profile-set-to-allow/tac-p/523983#M561</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-12-13T17:24:06Z</dc:date>
    </item>
  </channel>
</rss>

