<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitoring Accessed URL's in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45829#M33680</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is where Palo is doing a disservice to it's customer base.&amp;nbsp; I'm not certain where this premise that "We should only log things that we want to deny" came from.&amp;nbsp; The firewall is a security appliance.&amp;nbsp; A device used for usage audit history and compliance verification.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's annoying when I call into TAC and I get the same spiel from them about "Logging on session start"...well you know that is going to create a lot of logs.&amp;nbsp; Since when is more information a bad thing?&amp;nbsp; Using a firewall as it's intended wouldn't administrators need to be able to track back a source of infection?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we're blocking every malicious thing from the beginning and nothing ever is miscategorized, not caught, or users never do anything bad then sure we don't need to log the "allowed" stuff.&amp;nbsp; But we live in the real world.&amp;nbsp; Where things are missed, malware gets by and users don't do what we want them to.&amp;nbsp; It kind of difficult to triage incidents retroactively when there isn't even a log of the even occurring.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry this didn't answer the question (it already has been), but it seems in general more and more comments are about "not logging" to reduce the performance hit or log retention when what should happen is administrators should bake these concerns into the original architecture and deploy a solution taking these concerns in mind.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Aug 2015 14:29:07 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2015-08-12T14:29:07Z</dc:date>
    <item>
      <title>Monitoring Accessed URL's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45826#M33677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the URL filtering license, I am trying to log all websites that a user access, however, I noticed PA only logs websites which the user fails to access due to a URL filtering policy, ie only websites that are blocked from the user because they fall under a blocked category.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to log user access to all URL's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Aug 2015 21:05:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45826#M33677</guid>
      <dc:creator>rsaber</dc:creator>
      <dc:date>2015-08-09T21:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring Accessed URL's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45827#M33678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can get them to log by changing the category from allow to alert.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But be careful what you ask for, this will generate a lot of logs and reduce your overall logging time period as logs roll over when space is used up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2015 00:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45827#M33678</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-08-10T00:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring Accessed URL's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45828#M33679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firewall will log the blocked website. But if you want to log the website that users have visited you have to set the action to alert for all URL category.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2015 18:46:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45828#M33679</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-08-10T18:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring Accessed URL's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45829#M33680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is where Palo is doing a disservice to it's customer base.&amp;nbsp; I'm not certain where this premise that "We should only log things that we want to deny" came from.&amp;nbsp; The firewall is a security appliance.&amp;nbsp; A device used for usage audit history and compliance verification.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's annoying when I call into TAC and I get the same spiel from them about "Logging on session start"...well you know that is going to create a lot of logs.&amp;nbsp; Since when is more information a bad thing?&amp;nbsp; Using a firewall as it's intended wouldn't administrators need to be able to track back a source of infection?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we're blocking every malicious thing from the beginning and nothing ever is miscategorized, not caught, or users never do anything bad then sure we don't need to log the "allowed" stuff.&amp;nbsp; But we live in the real world.&amp;nbsp; Where things are missed, malware gets by and users don't do what we want them to.&amp;nbsp; It kind of difficult to triage incidents retroactively when there isn't even a log of the even occurring.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry this didn't answer the question (it already has been), but it seems in general more and more comments are about "not logging" to reduce the performance hit or log retention when what should happen is administrators should bake these concerns into the original architecture and deploy a solution taking these concerns in mind.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Aug 2015 14:29:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/monitoring-accessed-url-s/m-p/45829#M33680</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-12T14:29:07Z</dc:date>
    </item>
  </channel>
</rss>

