<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PANOS URL filtering 11.0.4 in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598486#M3785</link>
    <description>&lt;P&gt;Yes correct.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2024 02:09:04 GMT</pubDate>
    <dc:creator>Edsnow</dc:creator>
    <dc:date>2024-09-23T02:09:04Z</dc:date>
    <item>
      <title>PANOS URL filtering 11.0.4</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598455#M3779</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;We have URL filtering profile enabled on our respective policies using URL categories for different services purposes( eg: wsus services we have url category with *.microsoft.com and other doamins allowed in it, similarly for redhat and other devops related having separate url category called into respective source server policies for updates etc. )&lt;/P&gt;
&lt;P&gt;Lets say i have enabled only wsus url category to alert in wsus related security rule which is having microsoft doamins and dependents alowed in it, and all other url category to block. Now since other url categories is blocked under this url profile. What i have observed is any url category (eg: github urlcategory having microsoft domain being blocked for this rule) containing micorsoft domain other than wsus url category (which is set to alert anyways), is getting blocked page for the wsus server updates access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When i observed the url filtering logs i can see the domain got blocked due to github url category having microsoft domain in it and is set to block for this particular rule.&lt;/P&gt;
&lt;P&gt;Hence, i have to enable all the url category to alert having related domains in it to get it work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, since github url category is having other domains also in it which does not required for wsus, is now getting open for wsus server to have access to, which is not desired.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So how i can make this work efficiently without allowing other domains getting indirectly enabled to servers which is not required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 09:41:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598455#M3779</guid>
      <dc:creator>zaidshaikh</dc:creator>
      <dc:date>2024-09-21T09:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: PANOS URL filtering 11.0.4</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598478#M3783</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/128470"&gt;@zaidshaikh&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I understood correctly, You can create URL category based policies instead of allowing the URLs under URL filtering Profile.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2024 14:24:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598478#M3783</guid>
      <dc:creator>Edsnow</dc:creator>
      <dc:date>2024-09-22T14:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: PANOS URL filtering 11.0.4</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598480#M3784</link>
      <description>&lt;P&gt;Thank you for th response.&lt;/P&gt;
&lt;P&gt;Do you mean calling the URL category under the service/url tab of the security policy?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Sep 2024 18:02:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598480#M3784</guid>
      <dc:creator>zaidshaikh</dc:creator>
      <dc:date>2024-09-22T18:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: PANOS URL filtering 11.0.4</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598486#M3785</link>
      <description>&lt;P&gt;Yes correct.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 02:09:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/panos-url-filtering-11-0-4/m-p/598486#M3785</guid>
      <dc:creator>Edsnow</dc:creator>
      <dc:date>2024-09-23T02:09:04Z</dc:date>
    </item>
  </channel>
</rss>

