<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL filtering in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63560#M38230</link>
    <description>&lt;P&gt;The short answer is probably yes it's worth it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's the size of your company?&lt;/P&gt;&lt;P&gt;Do you have an HR policy that requires you to restrict "offensive" content?&lt;/P&gt;&lt;P&gt;Do you implicitly trust the Threat (subscription) service intelligence?&lt;/P&gt;&lt;P&gt;Do you implictly trust the Wild-Fire (can be a subscription) service intelligence?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Palo URL Filtering service isn't as good as I had hopped it would be, but it still does a good job. &amp;nbsp;Until recently PAN-DB categorized &lt;A href="http://www.funnyordie.com" target="_blank"&gt;www.funnyordie.com&lt;/A&gt; as "Questionable". &amp;nbsp;It was a battle with the URL team to get them to categorize it as something other than Questionable. &amp;nbsp;It took &amp;gt; 5 days through a TAC case after 2 separate auto-categorization requests that were initially denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the most part, especially as it relates to malware getting site recategorized are a pain, but things seem to be improving.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What benefit are you looking to get?&lt;/P&gt;</description>
    <pubDate>Mon, 24 Aug 2015 21:04:59 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2015-08-24T21:04:59Z</dc:date>
    <item>
      <title>URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63553#M38228</link>
      <description>&lt;P&gt;Who is using URL filtering? Is it worth the added cost? Is there any way to do it without the license?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 19:38:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63553#M38228</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-08-24T19:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63560#M38230</link>
      <description>&lt;P&gt;The short answer is probably yes it's worth it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What's the size of your company?&lt;/P&gt;&lt;P&gt;Do you have an HR policy that requires you to restrict "offensive" content?&lt;/P&gt;&lt;P&gt;Do you implicitly trust the Threat (subscription) service intelligence?&lt;/P&gt;&lt;P&gt;Do you implictly trust the Wild-Fire (can be a subscription) service intelligence?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Palo URL Filtering service isn't as good as I had hopped it would be, but it still does a good job. &amp;nbsp;Until recently PAN-DB categorized &lt;A href="http://www.funnyordie.com" target="_blank"&gt;www.funnyordie.com&lt;/A&gt; as "Questionable". &amp;nbsp;It was a battle with the URL team to get them to categorize it as something other than Questionable. &amp;nbsp;It took &amp;gt; 5 days through a TAC case after 2 separate auto-categorization requests that were initially denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the most part, especially as it relates to malware getting site recategorized are a pain, but things seem to be improving.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What benefit are you looking to get?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 21:04:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63560#M38230</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-24T21:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63596#M38247</link>
      <description>&lt;P&gt;I work at a college of 5000 and we are looking to keep the network safe from breaches more than anything. We are currently using the threat prevention subscription and have benefitted a lot from it, but the price of these subscriptions are outrageous. I do not know if there is a HR policy restricting offensive content and how offensive content would be described. We do not have wild fire and at this point I don't see a need for it in our environment.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2015 13:26:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63596#M38247</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-08-25T13:26:55Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63615#M38258</link>
      <description>&lt;P&gt;Easy stuff first...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Eventhough you don't purchase the WF subscription you can still benefit from it. &amp;nbsp;I'm not certain the timelines, when items deamed "malware" get included into to "Threats" if at all, but even w/o a WF subscription you're still allowed to send files to the WF cloud. &amp;nbsp;You just only get sig updates ever 24-hrs vice every 30 minutes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As to URL subscriptions. &amp;nbsp;With it you'd be able to deny users/students from accessing gambling, pronography, hate type sites. &amp;nbsp;Those would be the ones that i would classify as an "Offensive" nature. &amp;nbsp;Then there's Anonymizers, drugs, hacking, malware, phishing, and "parked" type sites that URL filtering would provide restrictions on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For our network we get thousands of hits to "malware," but that includes guest IP space. &amp;nbsp;Being able to block "parked" domains are good because they're typically used by hackers as those domains typically have no relavant INet traffic except as an infection source.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2015 20:27:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63615#M38258</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2015-08-25T20:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63658#M38275</link>
      <description>&lt;P&gt;How do you do the wild fire that doesn't require the subscription?&amp;nbsp; Yeah I am aware of what filtering would give us I just don't think I should have to pay for it as a subscription and such a high priced subscription I was hoping there was a cheaper way to do it.&lt;/P&gt;&lt;P&gt;I don't know what a parked domain is and what the benefits of blocking it would be.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 20:15:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63658#M38275</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-08-26T20:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63663#M38276</link>
      <description>&lt;P&gt;To configure Wildfire, just do as the documents say. The only thing you dont get by not having the license is the quick turnaround on file detonations and also you wont get updates every 15 minutes (or so).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The base wildfire is already part of the threat license, the additional license gets you the same thing except quicker.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Articles/Wildfire-Configuration-Testing-and-Monitoring/ta-p/57722" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Articles/Wildfire-Configuration-Testing-and-Monitoring/ta-p/57722&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the descriptions for the URL filtering module, here is an article I use frequently for the executives to use to tell me what to block.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://urlfiltering.paloaltonetworks.com/CategoryList.aspx" target="_blank"&gt;https://urlfiltering.paloaltonetworks.com/CategoryList.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this help!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2015 22:50:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63663#M38276</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2015-08-26T22:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63829#M38346</link>
      <description>&lt;P&gt;I followed the documents but it is failing to register to the wildfire server using wildfire-default-cloud is this the correct one for the service without the subscription&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2015 18:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63829#M38346</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-08-28T18:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63832#M38347</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes that is the same one. Check your logs to see if you maybe blocking the traffic? If you are not blocking the traffic, then it could be a registration issue, I had one and they had to dig deep to figure it out. To check this follow the steps in the testing area of this link, &lt;A href="https://live.paloaltonetworks.com/t5/Articles/Wildfire-Configuration-Testing-and-Monitoring/ta-p/57722" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Articles/Wildfire-Configuration-Testing-and-Monitoring/ta-p/57722&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mine tested registration just fine, but then showed it wasnt registered in the status section. If that is the case, you have to open a case with support.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2015 20:06:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63832#M38347</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2015-08-28T20:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: URL filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63845#M38359</link>
      <description>&lt;P&gt;Yeah I will probably get on the phone with support and see if they can find the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2015 21:12:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/url-filtering/m-p/63845#M38359</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2015-08-28T21:12:31Z</dc:date>
    </item>
  </channel>
</rss>

