Featured Articles
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Table of Contents Introduction. Category Mappings For Moving From Symantec WebFilter to PAN-DB. Roll Out URL Category Enforcement Best Practice URL Filtering Profile. Use URL Categories To Define SSL Decryption Policies. URL Filtering Use Cases. Useful Resources.   Introduction   This document is designed to assist you in migrating your environment from using Symantec Web Filter categories on ProxySG to using URL filtering capabilities in the Palo Alto Networks next-generation firewall enabled by PAN-DB, Palo Alto Networks cloud-based URL categorization service.   The first part of this document contains category mappings to assist you in selecting which PAN-DB URL categories to use. In most cases, there is a one-to-one mapping between the URL categorization commonly used in Symantec Web Filter and the categorization provided by Palo Alto Networks.   The second part of the document contains examples on how to migrate from Symantec Web Filter categories to PAN-DB categories and how to use them in the security policies of the next-generation firewall. During the migration, it is a recommended best practice to configure a URL Filtering profile with all categories set to “alert” in parallel with your web filtering solution. This allows you to run reports in PAN-OS and Proxy-SG to verify policies and category mappings before switching the URL filtering functions over completely to PAN-DB URL categorization on our next generation firewall.   The third part of this document contains usage examples and recommended security best practices when using PAN-DB for URL categorization in the next-generation firewall.     Category Mappings for Moving From Symantec WebFilter to PAN-DB   To start the migration, the first thing we recommend is to review the categories that are blocked by policy with the Symantec WebFilter and map them to the corresponding PAN-DB URL categories.   The Symantec WebFilter Database is organized into 85 URL categories. You can find a complete list and definitions of the categories at this link: https://sitereview.bluecoat.com/category-descriptions.   PAN-DB is organized into more than 65 URL categories. You can find a complete list and definitions of the categories at this link: Complete List of PAN-DB URL Filtering Categories.   Symantec WebFilter offers a service called “Site Review.” The purpose of “Site Review” is to allow Symantec customers to check the current database categorization of WebFilter URLs and report sites that they believe are incorrectly categorized. You can find the "Site Review" at this link: https://sitereview.bluecoat.com/.   PAN-DB URL filter also offers a service called “Test a Site.” The purpose of “Test a Site” is to allow Palo Alto Networks customers to check the current database categorization of PAN-DB URLs and report sites that they believe are incorrectly categorized. You can find "Test a Site" at this link: https://urlfiltering.paloaltonetworks.com/.   The table below will help you with the category mapping exercise.   Symantec Palo Alto Networks Differences Recommendations Abortion Abortion     Adult/Mature Content Adult or Questionable     Alcohol Alcohol and Tobacco     Alternative Spirituality/Belief Religion     Art/Culture Entertainment and Arts     Auctions Auctions     Audio/Video Clips Streaming Media or Music     Brokerage/Trading Stock Advice and Tools or Financial Services     Business/Economy Business and Economy     Charitable Organizations Society     Chat (IM)/SMS Internet Communications and Telephony     Child Pornography Adult     Computer/Information Security Computer and Internet Info or Hacking     Content Servers Content Delivery Networks     Controlled Substances Abused Drugs     Dynamic DNS Host Dynamic-DNS   Best Practice recommendation, Block “dynamic-dns” category E-Card/Invitations Shareware-and-Freeware     Education Educational Institutions     Email Web-based Email     Entertainment Entertainment and Arts     Extreme Extremism   Best Practice recommendation, Block “extremism” category File Storage/Sharing Online Storage and Backup     Financial Services Financial Services     For Kids Society This Symantec category is not a stand-alone category   Gambling Gambling     Games Games     Government/Legal Government     Hacking Hacking     Health Health and Medicine     Humor/Jokes Entertainment and Arts or Questionable     Informational N/A This Symantec category is not a stand-alone category Recommended action: – Use “Test a Site” to find corresponding PAN-DB category for matching websites   – Or Create a Custom URL category and control matching websites Internet Connected Devices Computer and Internet Info There is no one-to-one mapping for this category. This is a subset of “computer-and-internet-info” category Recommended action: – Use “Test a Site” to find corresponding PAN-DB category for matching websites   – Or Create a Custom URL category and control matching websites Internet Telephony Internet Communications and Telephony     Intimate Apparel/Swimsuit Swimsuits and Intimate Apparel     Job Search/Careers Job Search     Malicious Outbound Data/Botnets Command-and-Control   Best Practice recommendation, Block “Command-and-Control” category Malicious Sources/Malnets Malware   Best Practice recommendation, Block “malware” category Marijuana Abused Drugs     Media Sharing Streaming Media or Online Storage and Backup     Military Military     Mixed Content/ Potentially Adult Adult, Nudity or Questionable Based on the category description provided by Symantec, most URLs should be mapped to “adult” but the URLs could also be part of “nudity” or “questionable”   News/Media News     Newsgroups/Forums News or Personal-Sites-And-Blogs     Non-Viewable/Infrastructure Insufficient Content     Nudity Nudity     Office/Business Applications Computer and Internet Info     Online Meetings Internet Communications and Telephony     Peer-to-Peer (P2P) Peer-to-Peer     Personals/Dating Dating     Personal Sites Personal Sites and Blogs     Phishing Phishing   Best Practice recommendation, Block “phishing” category Piracy/Copyright Concerns Copyright-Infringement   Best Practice recommendation, Block “copyright-infringement“ category Placeholders Parked   Best Practice recommendation, Block “parked” category Political/Social Advocacy Philosophy and Political Advocacy     Pornography Adult     Potentially Unwanted Software Shareware and Freeware or Questionable     Proxy Avoidance Proxy Avoidance and Anonymizers   Best Practice recommendation, Block “proxy-avoidance-and-anonymizers” category Radio/Audio Streams Streaming Media     Real Estate Real Estate     Reference Reference and Research     Religion Religion     Remote Access Tools Internet Communications and Telephony       Restaurants/Dining/Food Society     Scam/Questionable/Illegal Questionable     Search Engines/Portals Search Engines     Sex Education Sex Education     Sexual Expression Adult or Society If the website content pertains to sexual identity then the category will be "society" If not, the category will be "adult"   Shopping Shopping     Social Networking Social Networking     Society/Daily Living Society     Software Downloads Shareware and Freeware or Computer and Internet Info     Spam Questionable URLs related to spam are included in the category "questionable" This category also includes websites with illegal, immoral and offensive content   Sports/Recreation Sports     Suspicious Insufficient Content or Questionable     Technology/Internet Computer and Internet Info     Tobacco Alcohol and Tobacco     Translation Translation     Travel Travel     TV/Video Streams Streaming Media     Uncategorized Unknown   Best Practice recommendation, Block “unknown” category Vehicles Motor Vehicles     Violence/Hate/Racism Extremism   Best Practice recommendation, Block “extremism” category Weapons Weapons     Web Ads/Analytics Web Advertisements     Web Hosting Web Hosting         Roll Out URL Category Enforcement   The recommended practice for deploying URL filtering in your organization is to start with a “passive" URL Filtering profile that will create log entries by employing the “alert” policy action on all categories in parallel with your existing web filter appliance. On the Palo Alto Networks firewall, create a new URL Filtering profile. Select Objects > Security Profiles > URL Filtering. Select the default profile and then click Clone. The new profile will be named default-1. Select the default-1 profile and rename it. For example, rename it to URL-Monitoring. Configure the action for all categories to alert. In the section that lists all URL categories, select all categories. To the right of the Action column heading, mouse over and select the down arrow and then select Set Selected Actions and choose Alert. Click OK to save the profile. After setting the Alert action, you can monitor user web activity through URL filtering reports on both appliances for a few days or weeks to determine accuracy of the provided category mappings. Palo Alto Networks recommends to validate accuracy for the top 1,000 websites seen by your organization. Apply the URL Filtering profile to the security policy rule(s) that allows web traffic of users. Select Policies > Security and select the appropriate security policy to modify it. Select the Actions tab and in the Profile Setting section, click the drop-down for URL filtering and select the new profile. Click OK to save. View the URL filtering logs to determine all of the website categories that your users are accessing. For information on viewing the logs and generating reports, see Monitor Web Activity. Select Monitor > Logs > URL Filtering. A log entry will be created for any website that exists in the URL filtering database in a category that is set to any action other than allow. In this procedure, all categories will be set to alert, which will cause traffic for all websites to be logged. This may potentially create a large amount of log files, so it is best to do this for initial monitoring purposes to determine the types of websites your users are accessing and compare URL categories triggered. Collect all URL category objects used in the Symantec Web Filter Policy Manager and map them into PAN-DB URL categories using the provided URL category map after vetting them for accuracy using the above steps. After determining the categories that your organization allows users to access, set the policy action to “allow” for these URL categories on the next-generation firewall. The firewall does not generate logs for traffic matching these URL categories. You can then make decisions on the URL categories that should be controlled according to the company policy by setting the appropriate policy action to each of these categories in the URL Filtering profile(s). The recommended actions column of the "URL category" table in the previous section and the "best practices" section at the end of this document are provided to further assist you in making policy decisions. If possible, it is recommended to use a “slow roll” approach, using USER-ID as described below when deploying these newly created URL Filtering profile(s) to Security policies. Clone an existing policy that allows web access and add an additional match criteria on User set to a single department. (i.e., IT, Marketing, Engineering, etc.) Add the new URL Filtering profile to this Security policy and move the policy above all policies that allow web access since policy rules are matched top down. Monitor the above policy for usage and get feedback from the users belonging to the Group Object. Incorporate changes as necessary to the URL Filtering profile before adding it to all other applicable security policies.     Best Practice URL Filtering Profile   Attach a URL Filtering profile to all rules that allow access to web-based applications to protect against URLs that have been observed hosting malware or exploitive content. As a best practice, use PAN-DB URL filtering to prevent access to web content that is at high-risk for being malicious. These include command-and-control, copyright-infringement, dynamic-dns, extremism, malware, phishing, proxy-avoidance-and-anonymizers, unknown, and parked. The best practice URL Filtering profile sets all known dangerous URL categories to block. Failure to block these dangerous categories puts you at risk for exploit infiltration, malware download, command and control activity, and data exfiltration. In addition to blocking known bad categories, you should also alert on all other categories so you have visibility into the sites your users are visiting. If you need to phase in a block policy, set categories to continue and create a custom response page to educate users on your acceptable use policies and alert them to the fact that they are visiting a site that may pose a threat. This will pave the way for you to outright block the categories after a monitoring period.   What if I can’t block all of the recommended categories?   If you find that users need access to sites in the blocked categories, consider creating an allow list for just the specific sites if you feel the risk is justified. On categories you decide to allow, make sure you set up credential phishing prevention to ensure that users aren’t submitting their corporate credentials to a site that may be hosting a phishing attack. Allowing traffic to a recommended block category poses the following risks:   Malware – Sites known to host malware or used for command and control (C2) traffic. May also exhibit Exploit Kits. Phishing – Known to host credential phishing pages or phishing for personal identification. Dynamic-dns – Hosts and domain names for systems with dynamically assigned IP addresses and which are oftentimes used to deliver malware payloads or C2 traffic. Also, dynamic DNS domains do not go through the same vetting process as domains that are registered by a reputable domain registration company and are, therefore, less trustworthy. Unknown – Sites that have not yet been identified by PAN-DB, perhaps because they were just registered. However,  these are sites that are oftentimes generated by domain generation algorithms and are later found to exhibit malicious behavior. Command-and-control – Command-and-control URLs and domains used by malware and/or compromised systems to surreptitiously communicate with an attacker's remote server to receive malicious commands or exfiltrate data. Copyright-infringement – Domains with illegal content, such as content that allows illegal download of software or other intellectual property. This category was introduced to enable adherence to child protection laws required in the education industry as well as laws in countries that require internet providers to prevent users from sharing copyrighted material through their service. Extremism – Websites promoting terrorism, racism, fascism or other extremist views discriminating people or groups of different ethnic backgrounds, religions, or other beliefs. This category was introduced to enable adherence to child protection laws required in the education industry. Proxy-avoidance-and-anonymizers – URLs and services often used to bypass content filtering products. Parked – Domains registered by individuals, oftentimes later found to be used for credential phishing. These domains may be similar to legitimate domains. For example, pal0alto0netw0rks.com, with the intent of phishing for credentials or personal identify information. Or, they may be domains that an individual purchases rights in hopes that it may be valuable someday, such as panw.net.   USE URL Categories to Define Traffic to Decrypt or Not Decrypt   Plan to decrypt as much traffic that is not private or sensitive as your firewall resources allow to reduce the attack surface by exposing and preventing encrypted threats. Understand local laws and regulations about the traffic you can legally decrypt and user notification requirements.   Please see documentation for SSL Decryption deployment and pre-requisites. The below steps describe Decryption policy definitions only.   Create a “no-decrypt” policy that will prevent any website mapping to the recommended "no-decrypt" URL category list (i.e., financial-services, health-and-medicine, government, etc.) from being decrypted. Even while not using decryption it is a recommended best practice to create a Decryption Profile to block sessions with expired certificates or untrusted issuers and use it with your "no-decrypt" policy. Navigate to Objects > Decryption Profile. Add a Profile called “nodecrypt” and check “Block sessions with expired certificates” and “Block sessions with untrusted issuers” under No Decryption tab. Navigate to Policies > Decryption and click Add. Enter a Name and optionally enter a Description and Tag(s). On the Source tab, enter the zone where the users are connected. On the Destination tab, enter the zone that is connected to the internet. On the URL Category tab, click Add and select the financial-services, government, and health-and-medicine URL categories. On the Options tab, set the action to No Decrypt. Also set Decryption Profile to a “nodecrypt”. Click OK to save the policy rule. Create a “must-decrypt” policy that will decrypt any website mapping to the recommended "must-decrypt" URL category list. (Malware, Phishing, Unknown, Command-and-control, Copyright-infringement, Proxy-avoidance-and-anonymizers, Content-deliver-networks, Parked, Web-based-email, Social Networking, Personal-sites-blogs, Web-hosting, Insufficient-content, Not-resolved, Online-storage and backup, Hacking, Questionable, Dynamic DNS) Navigate to Policies > Decryption and click Add. Enter a Name and optionally enter a Description and Tag(s). On the Source tab, enter the zone where the users are connected. On the Destination tab, enter the zone that is connected to the internet. On the Service/URL Category tab, enter all the Recommended URL Categories On the Options tab, set the Action to Decrypt and the Type to SSL Forward Proxy. Use a Decryption Profile along with your decryption policy to block sessions that fail on SSL decryption. Ensure that this "must-decrypt" policy is listed after the "no-decrypt" policy to ensure that rule processing occurs in the correct order. Create a “best-effort-decrypt” policy that will decrypt all other traffic using the same steps as above but with URL categories set to "any" and a Decryption Profile with options under Failure Checks section unchecked. This ensures that sessions are allowed even if SSL decryption fails.   With these three decrypt policies in place, any traffic destined for the financial-services or health-and-medicine or government URL categories will not be decrypted. All other traffic will be decrypted.     URL Filtering Use Cases   Case-1: Policy to block download of high-risk file types from certain categories [Decryption + URL Filtering + File-Blocking + Threat Prevention]   Please refer to SSL Decryption Best Practices to enable SSL decryption. This is necessary to accurately inspect, classify, and block encrypted traffic. Create a File Blocking Security Profile. The default basic file blocking profile can be used, or we can create a custom profile based on the basic file blocking profile. Select Objects > Security Profiles > File Blocking. Select “basic file blocking” or “strict file blocking” profile and click Clone. Rename the profile and edit to select appropriate file types for Block, Continue, and Alert actions based on your company policy or use the default profile provided. Click OK. Create the security policy rule that will block risky file downloads from specific categories. This rule must precede other rules because it is a specific rule. (More specific rules must precede other rules.) Select Policies > Security and click Add. Enter a Name and optionally a Description and Tag(s). On the Source tab add the zone where the users are connected. On the Destination tab, select the zone that is connected to the internet. On the Service/URL Category tab, Add the specific categories from which risky file download needs to be blocked. (i.e., Web-hosting, Personal-sites-blogs, Social Networking, Peer-to-Peer, Online-storage and backup, Web-based-email, Copyright-infringement, Shareware-and-freeware). On the Actions tab, select Action “Allow” and add the default profiles for Antivirus, Vulnerability Protection, Anti-Spyware, URL Filtering, and the newly created File Blocking profile. Click OK to save the security profile. Commit the Configuration. With this Security policy rule in place, any user trying to download executable files or other risky files from Dropbox, Box, or any free software download websites will be blocked. Because this rule will also allow access to the internet, threat prevention profiles are applied to the rule, so traffic that matches the policy will be scanned for threats. This is important because the allow rule is terminal and will not continue to check other rules if there is a traffic match.     Case-2: Policy to Control Web Access [Decryption + User-ID + App-ID + URL Filtering + Data Filtering + Threat Prevention] In this use case, users belonging to the Marketing group, for example, have access to Box for collaboration but not to any of the other “online-storage-and backup” vendors. All other users are blocked from all “online-storage-and-backup” applications. The company policy also states that documents marked “Confidential” should not be shared on Box by the Marketing group.     Please refer to the SSL Decryption Best Practices to enable SSL decryption. This is necessary to accurately inspect, classify, and block encrypted traffic. Create a Security Policy that will block all users from accessing “online-backup-and-storage” applications. This can be done either using a specific Security Policy or as part of a URL Filtering profile that would be included in all Security Policies that allow internet access. Select Policies > Security and click Add. Enter a Name and optionally a Description and Tag(s). On the Source tab add the zone where the users are connected. On the Destination tab, select the zone that is connected to the internet. On the Service/URL Category tab, click Add and add the online-storage-and-backup category. On the Actions tab, select Action Deny. Click OK to save the security profile. Create a Data Pattern Custom Object and add it to a data filtering Security Profile. Select Objects > Custom Objects > Data Patterns and click Add. Select Pattern Type as “Regular Expression”. Select File Type as “Any”. Set Data Pattern to “.*((Confidential)|(CONFIDENTIAL))”. Click OK. Select Objects > Security Profiles > Data Filtering and click Add. Set the Data Pattern Field to the above created object. Set Alert/Block Threshold to 1 and Log Severity to Critical and Click OK. Create the Security Policy that will allow the Marketing group to access Box application. Because this allow rule will also allow access to the internet, threat prevention profiles are applied to the rule, so traffic that matches the policy will be scanned for threats. This rule must precede other rules because it is more specific than the other policies. Select Policies > Security and click Add. Enter a Name and optionally a Description and Tag(s). On the Source tab add the zone where the users are connected. On the User tab in the Source User section click Add. Select the directory group that contains your marketing users. On the Destination tab, select the zone that is connected to the internet. On the Applications tab, click Add and add the boxnet App-ID signature. On the Actions tab, add the default profiles for Antivirus, Vulnerability Protection, and Anti-Spyware. Also add the Data Filtering profile that was created in the previous step. Click OK to save the Security Profile and commit the configuration. With these policies in place, any user who is part of the Marketing group will have full access to Box application and any user that is not part of the Marketing group will be blocked from all online-storage-and-backup websites. Additionally, all files that are shared on Box will be scanned for the keyword “Confidential” and blocked if found. An entry will also be logged under Monitor > Logs > Data Filtering.     Case-3: Subscribe to an external malicious URL feed [URL Filtering + External Dynamic Lists]   In this use case, administrator wants the firewall to ingest an external feed that provides IOCs (Indicators of Compromise) in the form of URLs. This dynamic list of URLs has to be continuously updated in policy and blocked by Palo Alto Networks next generation firewall without any manual intervention.   To protect your network from new sources of threat or malware, you can use External Dynamic List in URL Filtering profiles to block or allow or to define granular actions such as continue, alert, or override for URLs before you attach the profile to a Security Policy rule. Unlike the allow list, block list, or a custom URL category on the firewall, an external dynamic list gives you the ability to update the list without a configuration change or commit on the firewall.   Navigate to Objects > External Dynamic Lists. Click Add. Select Type “URL List”. Enter Source [this could be a web server hosting a file of URL’s]. Select appropriate Frequency of checks using the Repeat field. Click OK. Navigate to Objects > Security Profiles > URL Filtering. Select appropriate URL Filtering profile. The above created EDL should be seen as a custom category. Assign appropriate policy action to this category. This URL Filtering profile can now be added to a Security Policy(s).     With this Security Policy in place, any user attempting to connect to websites part of the URL feed will be blocked. This URL list is dynamically updated by the firewall without any commit required by the administrator. Any attempt to connect to these URLs is also logged under Monitor > Logs > URL Filtering.       Useful Resources PAN-DB URL Categorization Workflow Monitor Web Activity Configure URL Filtering Customize URL Filtering Response Pages Create Custom URL Categories Use an External Dynamic List in a URL Filtering Profile Safe Search Enforcement Prevent Credential Phishing Troubleshoot URL Filtering Incorrect Categorization SSL Decryption Overview
View full article
  • 4 Posts
  • 186 Subscriptions
Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Top Contributors