<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/335538#M865</link>
    <description>&lt;P&gt;Shodan is not a hacking site per se.&amp;nbsp; They will port scan all your addresses and will post what vulnerabilities they find.&amp;nbsp; Obviously, you do not want these advertised as the bad actors will use this database to prey on those who are vulnerable.&amp;nbsp; It is best to just block these addresses....but there are alot of them.&amp;nbsp; Some times its a bit of wack-a-mole as well.&amp;nbsp; There are other companies out there that do the same thing as Shodan (such as Digital Ocean).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to see Palo-Alto maintain a dynamic list for these shady characters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Jun 2020 14:53:58 GMT</pubDate>
    <dc:creator>svanloenen</dc:creator>
    <dc:date>2020-06-26T14:53:58Z</dc:date>
    <item>
      <title>URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309744#M743</link>
      <description>&lt;P&gt;&lt;A href="http://shodan.io/" target="_blank"&gt;http://shodan.io/ URL is categorized as hacking website.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Can someone advise as internal users want access to it?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 10:52:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309744#M743</guid>
      <dc:creator>FIDELE</dc:creator>
      <dc:date>2020-02-06T10:52:37Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309814#M744</link>
      <description>&lt;P&gt;Checked reputation of this url and not seeing any poor reputation of it. Some of the sites are categorizing it under internet and info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://talosintelligence.com/reputation_center/lookup?search=shodan.io" target="_blank"&gt;https://talosintelligence.com/reputation_center/lookup?search=shodan.io&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.brightcloud.com/tools/url-ip-lookup.php" target="_blank"&gt;https://www.brightcloud.com/tools/url-ip-lookup.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 14:59:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309814#M744</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-06T14:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309819#M745</link>
      <description>&lt;P&gt;Hello Fidele,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I understand that you want to access 'shodan.io' and it was blocked as a hacking site. There are a couple of ways.&lt;/P&gt;
&lt;P&gt;(a) you can override your URL filtering object and allow hacking sites.&lt;/P&gt;
&lt;P&gt;(b) Depending on the PAN-OS, you can add one site in exception as a white list&lt;/P&gt;
&lt;P&gt;(c) you can create a custom URL object and allow it.&lt;/P&gt;
&lt;P&gt;(d) If you only want to allow for one user, you can create a policy based on the user, and URL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;some useful documents.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/url-filtering/url-filtering-concepts/url-category-exception-lists.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/url-filtering/url-filtering-concepts/url-category-exception-lists.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/block-and-allow-lists" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/block-and-allow-lists&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CltmCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CltmCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Himani&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 15:20:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309819#M745</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2020-02-06T15:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309832#M746</link>
      <description>&lt;P&gt;Yes this can be done or else add object as fqdn "shodan.io" and allow it in policy. But it will allow only 'shodan.io' but not *.shodan.io.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 16:07:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309832#M746</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-06T16:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309836#M747</link>
      <description>&lt;P&gt;Thank you for response. Actually before i do anything, i d like to know if indeed it s hacking website as PaloAlto Firewall categorizes it. I am running PAN-OS 8.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 16:17:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309836#M747</guid>
      <dc:creator>FIDELE</dc:creator>
      <dc:date>2020-02-06T16:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309840#M748</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Its not specific to PAN version. On my firewall (running on 9.0.3) also getting categorized under hacking site. I checked on few sites and reputation of this url is not listed as poor. Please check my earlier reply.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 16:33:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309840#M748</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-02-06T16:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309852#M749</link>
      <description>&lt;P&gt;Yes, it is a hacking website.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can check it here:&amp;nbsp;&lt;A href="https://urlfiltering.paloaltonetworks.com/query/" target="_blank"&gt;https://urlfiltering.paloaltonetworks.com/query/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 17:22:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309852#M749</guid>
      <dc:creator>hisingh</dc:creator>
      <dc:date>2020-02-06T17:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309878#M750</link>
      <description>&lt;P&gt;Thank you very much for your time and feedback&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 19:42:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/309878#M750</guid>
      <dc:creator>FIDELE</dc:creator>
      <dc:date>2020-02-06T19:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/315919#M765</link>
      <description>&lt;P&gt;Visitors on our network can't access to the google drive from web anymore, the application on phone works fine. Anything that I can do about it?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 00:55:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/315919#M765</guid>
      <dc:creator>emir.ay</dc:creator>
      <dc:date>2020-03-12T00:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/335538#M865</link>
      <description>&lt;P&gt;Shodan is not a hacking site per se.&amp;nbsp; They will port scan all your addresses and will post what vulnerabilities they find.&amp;nbsp; Obviously, you do not want these advertised as the bad actors will use this database to prey on those who are vulnerable.&amp;nbsp; It is best to just block these addresses....but there are alot of them.&amp;nbsp; Some times its a bit of wack-a-mole as well.&amp;nbsp; There are other companies out there that do the same thing as Shodan (such as Digital Ocean).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to see Palo-Alto maintain a dynamic list for these shady characters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 14:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/url-filtering/m-p/335538#M865</guid>
      <dc:creator>svanloenen</dc:creator>
      <dc:date>2020-06-26T14:53:58Z</dc:date>
    </item>
  </channel>
</rss>

