{"id":6793,"date":"2014-10-01T14:00:42","date_gmt":"2014-10-01T21:00:42","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6793"},"modified":"2023-03-28T13:39:41","modified_gmt":"2023-03-28T20:39:41","slug":"web-security-tips-using-url-categories-security-policy","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/10\/web-security-tips-using-url-categories-security-policy\/","title":{"rendered":"Web Security Tips: Using URL Categories in Your Security Policy"},"content":{"rendered":"<p>Almost all UTMs or so-called next-generation firewalls have URL filtering capability, but they are not well integrated enough to utilize URL categories in a security policy. By taking advantage of URL categories, you will gain granular control of your network.<\/p>\n<p>If you are unfamiliar with how to use URL categories in your security policy, the following tips can help. These tips provide you with powerful ways to protect your network and improve your bandwidth efficiency.<\/p>\n<p>First, after logging into your Palo Alto Networks Next-Generation Firewall, click the \u201cPolicies\u201d tab. Then, in the list of options on the left, click \u201cSecurity.\u201d<\/p>\n<p>A \u201cURL Category\u201d column will appear (<strong>Figure 1<\/strong>).<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:33.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6897 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Figure1-500x139.png\" alt=\"Figure1-500x139\" width=\"500\" height=\"166\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Figure1-500x139.png 418w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Figure1-500x139-230x76.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/10\/Figure1-500x139-120x40.png 120w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p style=\"text-align: center;\"><strong>Figure 1<\/strong>: URL Category in the security policy.<!--more--><\/p>\n<p>If you do not see the URL Category column on your interface, it is most likely hidden from view. You can unhide it first by clicking the down arrow in any items such as \u201cAction\u201d or \u201dProfile\u201d; I used \u201cAction\u201d this time (<strong>Figure 2<\/strong>). Then move your mouse on \u201cColumns\u201d and check the \u201cURL Category\u201d box near the bottom of the list.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:109.57%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-medium wp-image-6795 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure2-230x252.png\" alt=\"Figure2\" width=\"230\" height=\"252\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure2-230x252.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure2-273x300.png 273w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure2-36x40.png 36w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure2.png 391w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/center><\/p>\n<p style=\"text-align: center;\"><strong>Figure 2<\/strong>: Unhiding the URL Category column.<\/p>\n<p style=\"text-align: left;\">\u00a0The following examples show what can be done with URL categories.<\/p>\n<p><strong>1. Block file transfer from unknown sites.<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:9.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-6796 size-large lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3-500x48.png\" alt=\"Figure3\" width=\"500\" height=\"48\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3-500x48.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3-230x22.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3-510x49.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3-240x23.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure3.png 1382w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><br \/>\n<strong>Figure 3:<\/strong>\u00a0Block download security policy.<\/p>\n<p>An \u201cunknown\u201d URL most likely refers to a newly registered or unregistered URL, which is often used by cybercriminals. The files from \u201cunknown\u201d URLs can be considered high-risk files. You can block all file types from such \u201cunknown\u201d URL by creating the \u201cblock download from unknown\u201d security policy shown in <strong>Figure 3<\/strong>. This means any files that might be transferred from an unknown URL will be blocked.<\/p>\n<p><strong>2. Decrypt SSL for specified URL category.<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:14%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-6797 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4-500x70.png\" alt=\"Figure4\" width=\"500\" height=\"70\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4-500x70.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4-230x32.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4-510x72.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4-240x34.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure4.png 1382w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><br \/>\n<strong>Figure 4<\/strong>. Decryption policies based on URL category.<\/p>\n<p>In our 2014\u00a0<a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\" rel=\"noopener\">Application Usage and Threat Report<\/a>,\u00a0we discovered 34% of all applications seen on enterprise networks use SSL. The risk of malicious activities and compromises are often hidden in SSL. Palo Alto Networks provides the ability to decrypt SSL based on URL categories. For example, you may want to decrypt and inspect webmail to block malware or sensitive files, but may not want to decrypt sensitive web activities such as online-banking to protect end-user\u2019s privacy.<\/p>\n<p>By applying decryption to the \u201cweb-based-email\u201d URL category, you can decrypt webmail and apply other security features such as antivirus and data filtering.<\/p>\n<p>In addition, you can choose not to decrypt online banking, by choosing the \u201cfinancial services\u201d URL category as \u201cNo Decrypt.\u201d<\/p>\n<p><strong>3. Limit streaming media bandwidth during only business hours.<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:9.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-6798 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5-500x48.png\" alt=\"Figure5\" width=\"500\" height=\"48\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5-500x48.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5-230x22.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5-510x49.png 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5-240x23.png 240w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/09\/Figure5.png 1383w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><br \/>\n<strong>Figure 5:<\/strong>\u00a0Limit streaming in quality of service (QoS) policy.<\/p>\n<p>Our 2014 <a href=\"http:\/\/connect.paloaltonetworks.com\/autr-en\" target=\"_blank\" rel=\"noopener\">Application Usage and Threat Report<\/a>\u00a0also\u00a0found that photo and video sites consumed 15% of all bandwidth we studied -- 7.5 times greater than that consumed by email. To improve productivity and bandwidth efficiency, you can limit the bandwidth for streaming media by creating a quality of service (QoS) policy. You can set maximum throughput for this policy and a schedule can be defined so that the QoS policy is effective only during business hours.<\/p>\n<p>To learn more about web security, please visit our resource page, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/products\/features\/url-filtering.html\" target=\"_blank\" rel=\"noopener\">Control Web Activity with URL Filtering.<\/a>\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost all UTMs or so-called next-generation firewalls have URL filtering capability, but they are not well integrated enough to utilize URL categories in a security policy. By taking advantage of URL categories, &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,744],"tags":[485,134,745,746,747],"coauthors":[716],"class_list":["post-6793","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-web-security","tag-application-usage-and-threat-report","tag-autr","tag-pan-db","tag-qos","tag-ssl-decryption"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6793"}],"version-history":[{"count":20,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6793\/revisions"}],"predecessor-version":[{"id":182192,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6793\/revisions\/182192"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6793"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}