{"id":4105,"date":"2013-11-05T18:54:59","date_gmt":"2013-11-06T02:54:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4105"},"modified":"2013-11-05T18:54:59","modified_gmt":"2013-11-06T02:54:59","slug":"tip-week-protecting-users-future-frights","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2013\/11\/tip-week-protecting-users-future-frights\/","title":{"rendered":"Tip of the Week: Protecting Your Users Against Future Frights!"},"content":{"rendered":"<p>I don\u2019t know about you, but last week, I got my fill of mini Snickers<sup>\u00ae<\/sup>, Kit Kats<sup>\u00ae<\/sup> and \u201cfun-size\u201d candy to last me another year.\u00a0 As all of us take down our Halloween decorations in our office cubes, we acknowledge that we have to resume our normal day-to-day activities <i>[read: fewer calories]<\/i>.\u00a0 For network security administrators, that means you\u2019re probably back at your desk monitoring your users\u2019 activities via the logs and alerts generated across all of the security consoles and management screens for your enterprise network.<\/p>\n<p>The <b>trick<\/b> with legacy security devices is that they don\u2019t provide a complete, seamless view of what\u2019s happening on your network, and they often require multiple tools to manage all of your policies. \u00a0That\u2019s why for <a href=\"https:\/\/paloaltonetworks.com\/customers.html\" target=\"_blank\">Palo Alto Networks customers<\/a>, the <b>real treat<\/b> is having a next-generation network security platform in your bag. \u00a0Administrators are able to build dynamic, contextual policies that tap into all of the technologies designed in our extensible platform.<\/p>\n<p>As with any holiday season, this time of year brings an influx of scams and threats that your users face as they utilize your network to access the Internet. \u00a0That\u2019s true whether they\u2019re using the laptop or workstation you\u2019ve provided them, not to mention mobile threat risks associated with the use of their own personal devices. \u00a0It\u2019s with those challenges in mind that we built our <a href=\"https:\/\/www.paloaltonetworks.com\/products\/features\/url-filtering.html\" target=\"_blank\">PAN-DB URL filtering technology<\/a>, which allows you to reduce malware incidents by prohibiting access to known malware and phishing-based websites.<\/p>\n<p>What you do is simply create a new URL filtering profile to categorize the URLs with an action set to block both the \u201cMalware\u201d and \u201cPhishing\u201d categories.\u00a0 Now apply this URL filtering profile within any existing or new security policy rule for outbound connections. \u00a0The idea is that you can easily create relevant policies that keep out the bad stuff without harming your organization\u2019s productivity.<\/p>\n<p>Stay safe, and Happy [fill in the blank]. \u00a0Well, you get the point\u2026<\/p>\n<p>- <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/dana-Torgersen\/\" target=\"_blank\">Dana Torgersen<\/a>, Product Marketing Manager<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I don\u2019t know about you, but last week, I got my fill of mini Snickers\u00ae, Kit Kats\u00ae and \u201cfun-size\u201d candy to last me another year.\u00a0 As all of us take down our &hellip;<\/p>\n","protected":false},"author":30,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[108,195],"tags":[74,208],"coauthors":[],"class_list":["post-4105","post","type-post","status-publish","format-standard","hentry","category-threat-prevention-2","category-tip-of-the-week","tag-malware","tag-phishing"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4105"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4105\/revisions"}],"predecessor-version":[{"id":4108,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4105\/revisions\/4108"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4105"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}