<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering Implementation Best Practice in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196001#M168</link>
    <description>&lt;P&gt;I would start by reviewing this video and article that Joe put together.&amp;nbsp; It is still relevant today.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tutorials/How-to-Configure-URL-Filtering-Video/ta-p/59300" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tutorials/How-to-Configure-URL-Filtering-Video/ta-p/59300&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P.S. There are other articles including one covering advanced URL Filtering at the bottom of the above page.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jan 2018 20:34:28 GMT</pubDate>
    <dc:creator>bvandivier</dc:creator>
    <dc:date>2018-01-19T20:34:28Z</dc:date>
    <item>
      <title>URL Filtering Implementation Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/195991#M167</link>
      <description>&lt;P&gt;Hell everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I have a vendor that is going to work on deploying the URL Filtering service in our Pan3020 but I wanted to undersandt/learn what the best approach is in order for to come up with an outcome that is manageable once they leave us. As of today, our security profiles such as Wildfire, Antivirus, etc. are applied to each rule. This deployment took a long time due to the amount of rules oure firewall has so the vendor has proposed to create just certain security policy rules for filtering instead of deploying the profile to each single rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I am sure that this could probably be done using the CLI and some sort of scrip but again, I would like to hear other's recommendations regarding this matter. In the future, I am positive that we are going to need to make changes so doing the right thing now will help us.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advanced.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2018 19:48:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/195991#M167</guid>
      <dc:creator>garciar</dc:creator>
      <dc:date>2018-01-19T19:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Implementation Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196001#M168</link>
      <description>&lt;P&gt;I would start by reviewing this video and article that Joe put together.&amp;nbsp; It is still relevant today.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tutorials/How-to-Configure-URL-Filtering-Video/ta-p/59300" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tutorials/How-to-Configure-URL-Filtering-Video/ta-p/59300&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P.S. There are other articles including one covering advanced URL Filtering at the bottom of the above page.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2018 20:34:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196001#M168</guid>
      <dc:creator>bvandivier</dc:creator>
      <dc:date>2018-01-19T20:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Implementation Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196016#M169</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Since URL filtering is heavily politically charged, what I usually do is give the exec board a list of all the categories and have them tell me what to block.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Complete-List-of-PAN-DB-URL-Filtering-Categories/ta-p/129799" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Complete-List-of-PAN-DB-URL-Filtering-Categories/ta-p/129799&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This keeps me out from the abuse the users tend to throw around.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing you can do it enable it and allow all categories, then run reports to see what the users are doing and present that to the board.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2018 21:45:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196016#M169</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-19T21:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Implementation Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196484#M174</link>
      <description>&lt;P&gt;Thank you to all for your answers. I agree that URL filtering is a very political topic; however, I was hoping for right/wrong suggestions regarding the implementation such as, keep in mind this or this will happen, etc. For now, those videos and the URL description document are both very informative.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 19:20:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196484#M174</guid>
      <dc:creator>garciar</dc:creator>
      <dc:date>2018-01-23T19:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Implementation Best Practice</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196970#M178</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You may come across a few sites that are miscategorized, but you can submit them to be changed. Once thing you can try is to put in a policy that allows all categories (ugly I know) and then run reports on ones that are hit the most.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would highly suggest you block the following at a minimum:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;command-and-control&lt;/P&gt;&lt;P&gt;copyright-infringement&lt;/P&gt;&lt;P&gt;dynamic-dns&lt;/P&gt;&lt;P&gt;extermism&lt;/P&gt;&lt;P&gt;malware&lt;/P&gt;&lt;P&gt;phishing&lt;/P&gt;&lt;P&gt;proxy-avoidance-and-anonymizers&lt;/P&gt;&lt;P&gt;questionable&lt;/P&gt;&lt;P&gt;unknown&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Start blocking these and go from there. One thing somone else posted a while back was to run a report on the executives browsing history and present that to the board :).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 23:41:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering-implementation-best-practice/m-p/196970#M178</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-25T23:41:44Z</dc:date>
    </item>
  </channel>
</rss>

