<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking Web Advertisements with an External Dynamic List in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140212#M48237</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using Paloalto 7.1, I added the same EDL but with Plaintext and it works well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This the list that I used , it contains *.xyz.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;List format requirements&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;List must be a plain text document (no HTML, no PDF, etc.).&lt;/LI&gt;&lt;LI&gt;Scheme is optional, and will be truncated if found – even if it is incomplete.&lt;/LI&gt;&lt;LI&gt;http:// is not needed.&lt;/LI&gt;&lt;LI&gt;Wildcards (*) are supported.&lt;UL&gt;&lt;LI&gt;*.example.com/hacked/*&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://www.example.net/wp-*/debug/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.example.net/wp-*/debug/&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Maximum length per line is 1024 characters.&lt;/LI&gt;&lt;LI&gt;Double-byte characters not supported.&lt;/LI&gt;&lt;LI&gt;If specifying a domain, use both formats (as with custom URL categories):&lt;UL&gt;&lt;LI&gt;example.com&lt;/LI&gt;&lt;LI&gt;*.example.com&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Videos/PAN-OS-7-1-URL-Filtering-Dynamic-Block-List-External-Block-List/ta-p/74098" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Videos/PAN-OS-7-1-URL-Filtering-Dynamic-Block-List-External-Block-List/ta-p/74098&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 31 Jan 2017 09:33:52 GMT</pubDate>
    <dc:creator>Mohamed_Mabrouk</dc:creator>
    <dc:date>2017-01-31T09:33:52Z</dc:date>
    <item>
      <title>Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116023#M45450</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attempting to block web advertisements on our PA-3020. We have two of these devices which utilize Panorama. We have blocked anything categorized as "web-advertisement" on the firewall, which is great, but a ton of ads are still getting through. What we would like to do is as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Utilize an external dynamic list (a text file) to block domains&lt;/LI&gt;&lt;LI&gt;When a blocked site is visited, the page will resolve to an "ad blocked" page rather than just not resolving the page at all.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have any suggestions we can use? For our typical malware blacklisting, the sites just do not resolve and show a "page cannot be displayed" message. This is logged, which is great, but for the web advertisement blocking, our CIO wants it to show an "Ad Blocked" message. This message works for anything classified as "web-advertisement."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2016 14:56:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116023#M45450</guid>
      <dc:creator>KevinTucker</dc:creator>
      <dc:date>2016-09-26T14:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116032#M45451</link>
      <description>&lt;P&gt;To the best of my knowledge, if you are using an EBL then you will simply 'deny' the connections from being made. I don't believe that PA has a 'denied' responce page in the context of denying hosts from the network, you can only get that with application response pages.&lt;/P&gt;&lt;P&gt;It might be a better option to look into rolling out ad-blocking via group policy. There are plenty of guides that you can follow and it doesn't take long at all, you also get the added benefit of disabling it when the user wants to access a site that would have otherwise denied access if it couldn't reach it's ad servers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2016 15:05:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116032#M45451</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-09-26T15:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116044#M45452</link>
      <description>&lt;P&gt;Thanks for the reply, BPry. I had it configured previously to just block the sites, however, without showing the "ad blocked" message, our CIO wasn't pleased with that. The GPO is managed by our large company, so it would be worth reaching out to them I believe. I appreciate your input very much.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2016 17:55:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116044#M45452</guid>
      <dc:creator>KevinTucker</dc:creator>
      <dc:date>2016-09-26T17:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116049#M45453</link>
      <description>&lt;P&gt;It's a rather blunt method, but depending on how many domains you're populating in the EBL can you just not create your own local DNS poisoning?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stand up a local internal page with the required block page and for ever domain just put a DNS entry on your network to point hosts to that internal page?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2016 18:20:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/116049#M45453</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2016-09-26T18:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/117027#M45539</link>
      <description>&lt;P&gt;One great way I could think of doing this is to go under Objects, External Dynamic Lists... and create a new Dynamic Domain Lists via Add and selecting Type = Domain List. &amp;nbsp;No doubt, you put the URL and the frequency it updates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next to enable it...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Profiles, Anti-Spyware, and open the DNS Signatures tab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In there, you can apply an External Dynamic LIst Domains... I personally recommend "singhole"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**********&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now it is just a matter of going to your policy that lets your Internet traffic go out and changing the profile to that Anti Spyware profile. &amp;nbsp;Personally, I would recommend doing a Security Profile Group, so you can have consistency.throughout all of your Policies that do filtering via some preconfigured templates that you make.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+++++++++++++++++&lt;BR /&gt;&lt;BR /&gt;Another option is to create a URL Block List... Same as aboe only you apply it to the URL Filtering under Security Profile. &amp;nbsp;It basically shows up with a little "+" next to it. &amp;nbsp;Naturally, you would need to change it in your active URL policy to an action of "Block"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**************************&lt;BR /&gt;&lt;BR /&gt;Another way is to create an IP block list... Again it is in the External Dynamic Lists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would generally apply these via a security policy before your Internet policy. &amp;nbsp;Might make a policy that says something like your normal Inside TO Outside (Destination Address Dynamic IP List YOURBLOCKLIST) ... DENY&lt;BR /&gt;&lt;BR /&gt;Then it ends up in the firewall logs with that rule showing it dropped if the IP address is in the list.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No doubt, you could also use hte "Destination Negate" option in your Internet Out rule and simply only ALLOW Internet traffic that doesn't match an IP on a Dynamic IP List.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps... there is a TON of flexibility with the Palo Alto to block ads.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;______________________________________________&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It depends on which list-type you use what your block page will look like.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, blocking IPs more or less simply show up in the log. &amp;nbsp;If you do this, you want to reset-client or reset-both... otherwise the browser will just hang a while before timing out its TCP session, but you don't really get a block message.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are doing a Domain Block, that will give you your Antivirus / Anti-Spyware Block Page...&lt;BR /&gt;&lt;BR /&gt;If you are doing an Extra Dynamic List on the URL Filtering, which is what you most likely want to do then it would use your normal URL Filtering block page.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2016 19:53:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/117027#M45539</guid>
      <dc:creator>birkhojk</dc:creator>
      <dc:date>2016-09-30T19:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/118600#M45644</link>
      <description>BTW, Kevin could You share what source of ad domains do You use?</description>
      <pubDate>Sun, 09 Oct 2016 11:12:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/118600#M45644</guid>
      <dc:creator>mst</dc:creator>
      <dc:date>2016-10-09T11:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/119113#M45761</link>
      <description>&lt;P&gt;Check this one out:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://pgl.yoyo.org/as" target="_blank"&gt;https://pgl.yoyo.org/as&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDL as a Domain list:&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=plain&amp;amp;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=plain&amp;amp;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDL as an URL list:&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 18:08:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/119113#M45761</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2017-01-31T18:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140193#M48229</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried the EDL with the follwoing link :&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=plain&amp;amp;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=plain&amp;amp;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but this list dosen`t have starts for domains like " *.hostname.com" , I tried another list that have *.xyz.com but it didn`t work&lt;/P&gt;&lt;P&gt;it give me that the EDL is not vaild.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the EDL supports Starts ( ex:*.xyz.com) ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any suggestions ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 08:02:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140193#M48229</guid>
      <dc:creator>Mohamed_Mabrouk</dc:creator>
      <dc:date>2017-01-31T08:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140199#M48230</link>
      <description>&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/23454"&gt;@Mohamed_Mabrouk&lt;/a&gt;: which version of PAN-OS You have installed? Before 7.1 You can use only IP addresses and ranges in EBL, IMHO (look at this &lt;A href="https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Videos/PAN-OS-7-1-URL-Filtering-Dynamic-Block-List-External-Block-List/ta-p/74098" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Videos/PAN-OS-7-1-URL-Filtering-Dynamic-Block-List-External-Block-List/ta-p/74098&lt;/A&gt;).</description>
      <pubDate>Tue, 31 Jan 2017 08:26:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140199#M48230</guid>
      <dc:creator>mst</dc:creator>
      <dc:date>2017-01-31T08:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140212#M48237</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using Paloalto 7.1, I added the same EDL but with Plaintext and it works well&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This the list that I used , it contains *.xyz.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;List format requirements&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;List must be a plain text document (no HTML, no PDF, etc.).&lt;/LI&gt;&lt;LI&gt;Scheme is optional, and will be truncated if found – even if it is incomplete.&lt;/LI&gt;&lt;LI&gt;http:// is not needed.&lt;/LI&gt;&lt;LI&gt;Wildcards (*) are supported.&lt;UL&gt;&lt;LI&gt;*.example.com/hacked/*&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://www.example.net/wp-*/debug/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.example.net/wp-*/debug/&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Maximum length per line is 1024 characters.&lt;/LI&gt;&lt;LI&gt;Double-byte characters not supported.&lt;/LI&gt;&lt;LI&gt;If specifying a domain, use both formats (as with custom URL categories):&lt;UL&gt;&lt;LI&gt;example.com&lt;/LI&gt;&lt;LI&gt;*.example.com&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Videos/PAN-OS-7-1-URL-Filtering-Dynamic-Block-List-External-Block-List/ta-p/74098" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Videos/PAN-OS-7-1-URL-Filtering-Dynamic-Block-List-External-Block-List/ta-p/74098&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 09:33:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140212#M48237</guid>
      <dc:creator>Mohamed_Mabrouk</dc:creator>
      <dc:date>2017-01-31T09:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140225#M48241</link>
      <description>nice &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;so i'll try it on 8.0beta .&lt;BR /&gt;</description>
      <pubDate>Tue, 31 Jan 2017 11:58:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140225#M48241</guid>
      <dc:creator>mst</dc:creator>
      <dc:date>2017-01-31T11:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140324#M48258</link>
      <description>&lt;P&gt;You can use the Yoyo lists in two EDL types, Domain and URL.&lt;/P&gt;&lt;P&gt;With the Domain type, you can block access to the Ads when there is a DNS query to resolve the IP of the server hosting the Ads.&lt;/P&gt;&lt;P&gt;With the URL type, you can block access to the Ads when the host already has a cached IP for the domain, and submits a Client Hello with a matching SNI, or matching&amp;nbsp;the HTTP GET. For HTTPS sessions you need to combine this solution with SSL Decryption to be able to pick up on the HTTP GET message inside the encrypted session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way that I implemented this is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDL as a Domain list 'Yoyo Ads - Domains':&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=plain&amp;amp;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=plain&amp;amp;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDL as an URL list&amp;nbsp;&lt;SPAN&gt;'Yoyo Ads - URL'&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;&lt;A href="https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext" target="_blank"&gt;https://pgl.yoyo.org/as/serverlist.php?hostformat=adblock;showintro=0&amp;amp;startdate%5Bday%5D=&amp;amp;startdate%5Bmonth%5D=&amp;amp;startdate%5Byear%5D=&amp;amp;mimetype=plaintext&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured&amp;nbsp;&lt;SPAN&gt;'Yoyo Ads - Domains' under my Anti-Spyware profile to block:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-01-31 at 10.48.39 AM.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7546iC799EB74033D3020/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-01-31 at 10.48.39 AM.png" alt="Screen Shot 2017-01-31 at 10.48.39 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Note that the drawback of this solution is that the Threat logs will still get filled up with 'Suspicious DNS query' drop alerts for TID&amp;nbsp;12000000 - I couldn't find a way to create a logging exception.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The next step was to configure a Security Policy that precedes my 'Internet access' rule to block any Client Hello messages containing a matching SNI. This will take care of HTTPS sessions that got as far as resolving to an IP and attempting to initiate an SSL session to the Ad servers in the list.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-01-31 at 10.53.51 AM.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7547i1EC560BD6533F42E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-01-31 at 10.53.51 AM.png" alt="Screen Shot 2017-01-31 at 10.53.51 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-01-31 at 10.54.51 AM.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7548iE2FC74A8449FEB78/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-01-31 at 10.54.51 AM.png" alt="Screen Shot 2017-01-31 at 10.54.51 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You could remove the checkbox for 'Log at Session End' to reduce logging in the Traffic logs if you're not interested in logging for this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Finally the last step is, if any clear text or decrypted HTTP makes it through, we block the Ad with URL filtering, which profile is tied to our Internet access security rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-01-31 at 10.58.41 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7549i0EA1F72BDC074F57/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-01-31 at 10.58.41 AM.png" alt="Screen Shot 2017-01-31 at 10.58.41 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Note that this should be combined with SSL decryption to extend coverage for encrypted HTTP(S) traffic. To make SSL Decryption effective for Chrome browsers, configure a security policy that precedes these rules to Deny 'quic' traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Finally my Security policy set looks like this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-01-31 at 11.02.34 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7553i18FFBBEE22C4FDAA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-01-31 at 11.02.34 AM.png" alt="Screen Shot 2017-01-31 at 11.02.34 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(The Sinkhole rule ties to the sinkhole action for Palo Alto Networks DNS Signatures in the Anti-Spyware profile, you can alternatively choose to sinkhole your 'Yoyo Ads - Domains', but as a result, that will mix your&amp;nbsp;Traffic log entries for compromised host detection, as both, an infected host, or a host browsing to an advertisement will result in a 'subsequent' connection to the Sinkhole IP&amp;nbsp;-&amp;nbsp;so instead&amp;nbsp;- using block for Ads will help you prevent&amp;nbsp;the unintended&amp;nbsp;Traffic log&amp;nbsp;pollution).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you have better ways to implement this please feel free to pitch in.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 16:47:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/140324#M48258</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-04-20T16:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/211089#M61592</link>
      <description>&lt;P&gt;Mivaldi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I set this up as you describe and it appears to be working great. I see the denies in the various logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your post is over a year old. Do you have any words of wisdom to add to it since then?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My commit alert is telling me I need to enable certificates. Will look into that next.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 01:16:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/211089#M61592</guid>
      <dc:creator>tsheldon</dc:creator>
      <dc:date>2018-04-20T01:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/211194#M61629</link>
      <description>&lt;P&gt;With&amp;nbsp;the release of PAN-OS 8.0, there are a couple things to add. Even though you won't be able to except TID 12000000 from writing to the Threat Logs,&amp;nbsp;you can actually define a log forwarding filter to prevent these from propagating to Panorama or Splunk (Syslog).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-04-20 at 9.34.43 AM.png" style="width: 587px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14820i1F3E2208342FA8C0/image-dimensions/587x362/is-moderation-mode/true?v=v2" width="587" height="362" role="button" title="Screen Shot 2018-04-20 at 9.34.43 AM.png" alt="Screen Shot 2018-04-20 at 9.34.43 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For a tutorial see:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tutorials/Tutorial-Filtered-Log-Forwarding/ta-p/145950" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tutorials/Tutorial-Filtered-Log-Forwarding/ta-p/145950&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, if there happens to be any domain that needs to be excepted, you can now search and Except domains&amp;nbsp;directly from the EDL's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-04-20 at 9.32.13 AM.png" style="width: 417px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14818i05E5AC14445153CB/image-dimensions/417x326/is-moderation-mode/true?v=v2" width="417" height="326" role="button" title="Screen Shot 2018-04-20 at 9.32.13 AM.png" alt="Screen Shot 2018-04-20 at 9.32.13 AM.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-04-20 at 9.31.23 AM.png" style="width: 417px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14819i78EAB642ADF17964/image-dimensions/417x328/is-moderation-mode/true?v=v2" width="417" height="328" role="button" title="Screen Shot 2018-04-20 at 9.31.23 AM.png" alt="Screen Shot 2018-04-20 at 9.31.23 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 16:37:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/211194#M61629</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-04-20T16:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking Web Advertisements with an External Dynamic List</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/211406#M61681</link>
      <description>&lt;P&gt;Very good. Thank you for posting this information!&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 21:12:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-web-advertisements-with-an-external-dynamic-list/m-p/211406#M61681</guid>
      <dc:creator>tsheldon</dc:creator>
      <dc:date>2018-04-23T21:12:45Z</dc:date>
    </item>
  </channel>
</rss>

