- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
08-25-2024 11:36 PM
Hello, everyone.
I'm using only ATP(Advanced Threat Prevention) license for AWS firewall.
However, I see PAN-DB is continuously being downloaded in system log.
Why is PAN-DB still being downloaded even though I am not using URL license?
I was using pan-os-10.2.8-h5 and tried upgrading to 10.2.11, but the same problem occurred.
08-26-2024 04:02 PM
I think (this is an educated guess, i haven't seen a customer without URL filtering for over a decade) this is due to advanced DNS protection also using part of the URL filtering database to categorize dns lookups
08-26-2024 04:02 PM
I think (this is an educated guess, i haven't seen a customer without URL filtering for over a decade) this is due to advanced DNS protection also using part of the URL filtering database to categorize dns lookups
04-10-2025 01:56 PM
PAN-OS downloads PAN-DB even if you don’t have the URL Filtering license because certain threat prevention features still reference PAN-DB, particularly for ATP-related functions and internal system operations.
Here’s what’s likely going on:
ATP & Threat Prevention Features:
Some advanced threat inspection modules check PAN-DB for context (e.g., to assess malicious behavior of URLs or links embedded in traffic).
Even without URL Filtering enforcement enabled, PAN-OS may still use PAN-DB for backend lookups to improve ATP accuracy.
Automatic System Behavior:
The URL Filtering feature is enabled by default in some templates or base configs.
PAN-OS may continue syncing PAN-DB updates even if no active policy is using it—unless you explicitly disable the feature.
PAN-OS Internal Dependencies:
PAN-OS 10.x and newer versions are tightly integrated across feature sets, so even "unused" components (like PAN-DB) may get partial updates as dependencies of ATP or WildFire inspection.
You can check whether URL Filtering is truly in use by running:
> show running security-policy
> show url-filtering rules
Also in GUI:
Go to Objects > Security Profiles > URL Filtering
Check if any profile is assigned to a security policy
If you see profiles attached to rules—even empty or default ones—it can trigger PAN-DB update behavior.
If you're absolutely sure you don’t need PAN-DB:
1.Remove URL Filtering Profiles from all policies.
2. Disable PAN-DB from auto-updating (though not directly configurable, you can try limiting its access):
Block update server access to updates.paloaltonetworks.com for PAN-DB (not ideal if ATP still needs it).
Or disable the URL Filtering license from Device > Licenses if trial was previously activated (contact support if needed).
PAN-OS 10.2.8-h5 and 10.2.11 are both stable, but the behavior is consistent across these because it’s design behavior, not a bug.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!