<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Advanced URL Filtering - help me understand it please? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474743#M103386</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I have the regular PAN-DB URL filtering and was considering the Advanced URL filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I understand after reading the documentation, if the PA URL DB recognizes a URL as risky, it sends it to the Advanced URL DB in cloud for real time analysis. Without the advanced URL feature, I'm open to a zero day attack because the URL database on the firewall may not have been updated just yet.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/url-filtering-features/advanced-url-filtering.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/url-filtering-features/advanced-url-filtering.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Malicious URLs can be updated or introduced before URL filtering databases have an opportunity to analyze the content; &lt;STRONG&gt;this lag time&lt;/STRONG&gt; gives attackers an open period from which they can launch precision attack campaigns on the firewall"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have my Application and Threats updates to download and install every 30 minutes. So I'm figuring this "lag time" is the 30 minutes window, correct?&lt;/P&gt;&lt;P&gt;Also, it says it only forewards URL's that are designated as risky. Wanting to know how many "risky" URL's my current standard URL license detects I want to see if its worth it. But, how do I view "risky" URL's?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your opinion is it worth the purchase, have you found it to be a valuable asset?&lt;/P&gt;</description>
    <pubDate>Mon, 21 Mar 2022 17:54:54 GMT</pubDate>
    <dc:creator>roma</dc:creator>
    <dc:date>2022-03-21T17:54:54Z</dc:date>
    <item>
      <title>Advanced URL Filtering - help me understand it please?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474743#M103386</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I have the regular PAN-DB URL filtering and was considering the Advanced URL filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I understand after reading the documentation, if the PA URL DB recognizes a URL as risky, it sends it to the Advanced URL DB in cloud for real time analysis. Without the advanced URL feature, I'm open to a zero day attack because the URL database on the firewall may not have been updated just yet.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/url-filtering-features/advanced-url-filtering.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/url-filtering-features/advanced-url-filtering.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Malicious URLs can be updated or introduced before URL filtering databases have an opportunity to analyze the content; &lt;STRONG&gt;this lag time&lt;/STRONG&gt; gives attackers an open period from which they can launch precision attack campaigns on the firewall"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have my Application and Threats updates to download and install every 30 minutes. So I'm figuring this "lag time" is the 30 minutes window, correct?&lt;/P&gt;&lt;P&gt;Also, it says it only forewards URL's that are designated as risky. Wanting to know how many "risky" URL's my current standard URL license detects I want to see if its worth it. But, how do I view "risky" URL's?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your opinion is it worth the purchase, have you found it to be a valuable asset?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 17:54:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474743#M103386</guid>
      <dc:creator>roma</dc:creator>
      <dc:date>2022-03-21T17:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced URL Filtering - help me understand it please?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474784#M103388</link>
      <description>&lt;P&gt;Haven't really noticed a difference with this.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 20:44:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474784#M103388</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2022-03-21T20:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced URL Filtering - help me understand it please?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474825#M103390</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116207"&gt;@roma&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;"Malicious URLs can be updated or introduced before URL filtering databases have an opportunity to analyze the content; &lt;STRONG&gt;this lag time&lt;/STRONG&gt; gives attackers an open period from which they can launch precision attack campaigns on the firewall"&lt;/BLOCKQUOTE&gt;&lt;P&gt;The lag time is the time between when a malicious URL is introduced and when the URL filtering database [companies] are able to analyze the content and assign categories to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-DB updates are not done as part of application and threats or any configurable dynamic update.&amp;nbsp; "&lt;SPAN&gt;&lt;SPAN class=""&gt;PAN-DB does not have daily updates, instead the URL entries are retrieved from the cloud server as needed. The Palo Alto Networks firewall automatically checks for the updates, and system logs are generated every 8 hours indicating if the latest URL-filtering database was downloaded or not.&lt;/SPAN&gt;&lt;/SPAN&gt;" &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClpMCAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClpMCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With regard to "risky" URLs, these have not been categorized yet.&amp;nbsp; They are recommended to be blocked with the "unknown" category.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/best-practices/10-0/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/best-practices/10-0/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles.html&lt;/A&gt;&amp;nbsp; Blocking unknown may occasionally cause valid web sites to be blocked, but exceptions can be made.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, The URL Filtering subscription is no longer orderable.&amp;nbsp; When it is time to renew, the only option will be Advanced URL Filtering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2022 01:22:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/advanced-url-filtering-help-me-understand-it-please/m-p/474825#M103390</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-03-22T01:22:45Z</dc:date>
    </item>
  </channel>
</rss>

