Why is pan-db downloaded?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Why is pan-db downloaded?

L0 Member

Hello, everyone.

 

I'm using only ATP(Advanced Threat Prevention) license for AWS firewall.
However, I see PAN-DB is continuously being downloaded in system log.
Why is PAN-DB still being downloaded even though I am not using URL license?

 

I was using pan-os-10.2.8-h5 and tried upgrading to 10.2.11, but the same problem occurred.

 

sseo333111_0-1724653889978.png

sseo333111_1-1724653924427.png

sseo333111_3-1724654001227.png

 

 

 

 

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

I think (this is an educated guess, i haven't seen a customer without URL filtering for over a decade) this is due to advanced DNS protection also using part of the URL filtering database to categorize dns lookups

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

I think (this is an educated guess, i haven't seen a customer without URL filtering for over a decade) this is due to advanced DNS protection also using part of the URL filtering database to categorize dns lookups

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

L1 Bithead

PAN-OS downloads PAN-DB even if you don’t have the URL Filtering license because certain threat prevention features still reference PAN-DB, particularly for ATP-related functions and internal system operations.

Here’s what’s likely going on:

ATP & Threat Prevention Features:
Some advanced threat inspection modules check PAN-DB for context (e.g., to assess malicious behavior of URLs or links embedded in traffic).
Even without URL Filtering enforcement enabled, PAN-OS may still use PAN-DB for backend lookups to improve ATP accuracy.

Automatic System Behavior:
The URL Filtering feature is enabled by default in some templates or base configs.
PAN-OS may continue syncing PAN-DB updates even if no active policy is using it—unless you explicitly disable the feature.
PAN-OS Internal Dependencies:
PAN-OS 10.x and newer versions are tightly integrated across feature sets, so even "unused" components (like PAN-DB) may get partial updates as dependencies of ATP or WildFire inspection.

You can check whether URL Filtering is truly in use by running:
> show running security-policy
> show url-filtering rules


Also in GUI:

Go to Objects > Security Profiles > URL Filtering
Check if any profile is assigned to a security policy
If you see profiles attached to rules—even empty or default ones—it can trigger PAN-DB update behavior.

If you're absolutely sure you don’t need PAN-DB:

1.Remove URL Filtering Profiles from all policies.

2. Disable PAN-DB from auto-updating (though not directly configurable, you can try limiting its access):
Block update server access to updates.paloaltonetworks.com for PAN-DB (not ideal if ATP still needs it).
Or disable the URL Filtering license from Device > Licenses if trial was previously activated (contact support if needed).

PAN-OS 10.2.8-h5 and 10.2.11 are both stable, but the behavior is consistent across these because it’s design behavior, not a bug.

  • 1 accepted solution
  • 1998 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!