<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block High Risk TLDs in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/461739#M1471</link>
    <description>&lt;P&gt;Thanks for the responses all.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still believe PAN-OS should support blocking specific TLDs in a simple way; this seems like a fool proof way to greatly reduce the attack surface since we never need to visit sites using these TLDs for legitimate reasons.&lt;/P&gt;</description>
    <pubDate>Fri, 28 Jan 2022 10:20:20 GMT</pubDate>
    <dc:creator>Josh990</dc:creator>
    <dc:date>2022-01-28T10:20:20Z</dc:date>
    <item>
      <title>Block High Risk TLDs</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/452397#M1407</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to start blocking 'high risk' top level domains within PAN-OS. Has anyone else done this successfully?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I presume the following should work based on PAN-OS RegEX:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;URL Category:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*.eg/&lt;/P&gt;&lt;P&gt;*.ex/&lt;/P&gt;&lt;P&gt;etc....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set&amp;nbsp;URL Category to 'Block' within existing URL Filtering Profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 18:14:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/452397#M1407</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2021-12-09T18:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Block High Risk TLDs</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/452600#M1409</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would say utilize the dynamic features of the PAN to do this for you instead of utilizing specific lists. Enable all, AntiVirus, Anti-Spyware with DNS sinkhole, Vulnerability protection, URL filtering, and wildfire. Then use a secure DNS provider, either palo alto's or someone elses, and block all others. I made a video for a conference regarding secure DNS that is worth the 12 minutes.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://youtu.be/ROIAYSEbTuo" target="_blank"&gt;https://youtu.be/ROIAYSEbTuo&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its all about defense in depth and machine learning, rather than static lists.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 21:30:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/452600#M1409</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-12-10T21:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Block High Risk TLDs</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/452943#M1416</link>
      <description>&lt;P&gt;You can dig more from Unit42 post:&amp;nbsp;&lt;A href="https://unit42.paloaltonetworks.com/top-level-domains-cybercrime/" target="_blank"&gt;https://unit42.paloaltonetworks.com/top-level-domains-cybercrime/&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Also, from&amp;nbsp;&lt;A href="https://www.spamhaus.org/statistics/tlds/" target="_blank"&gt;https://www.spamhaus.org/statistics/tlds/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you want to do it at larger scale, EDL can be a better choice than static entries.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 21:07:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/452943#M1416</guid>
      <dc:creator>aobszynski</dc:creator>
      <dc:date>2021-12-13T21:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Block High Risk TLDs</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/461739#M1471</link>
      <description>&lt;P&gt;Thanks for the responses all.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still believe PAN-OS should support blocking specific TLDs in a simple way; this seems like a fool proof way to greatly reduce the attack surface since we never need to visit sites using these TLDs for legitimate reasons.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 10:20:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/block-high-risk-tlds/m-p/461739#M1471</guid>
      <dc:creator>Josh990</dc:creator>
      <dc:date>2022-01-28T10:20:20Z</dc:date>
    </item>
  </channel>
</rss>

