{"id":8317,"date":"2015-03-09T16:00:09","date_gmt":"2015-03-09T23:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=8317"},"modified":"2015-12-11T09:41:17","modified_gmt":"2015-12-11T17:41:17","slug":"new-to-url-filtering","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/03\/new-to-url-filtering\/","title":{"rendered":"New to URL Filtering?"},"content":{"rendered":"<p>New to URL Filtering? Learn more about the steps required to start using the URL filtering feature in the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/url-filtering.html\" target=\"_blank\">PAN-OS Administrator\u2019s Guide for 6.1<\/a>.<\/p>\n<p><!--more--><\/p>\n<p>After <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/url-filtering\/configure-url-filtering.html\" target=\"_blank\">configuring URL filtering<\/a>, you can <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/url-filtering\/monitor-web-activity.html\" target=\"_blank\">monitor web activity<\/a> and then determine what actions to take on specific websites and website categories. To control HTTPS traffic, the firewall must have a decryption policy in place between the zones that allow web traffic.<\/p>\n<p>Bonus reading:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/url-filtering\/url-filtering-use-case-examples.html\" target=\"_blank\">URL Filtering Use Case Examples<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/url-filtering\/troubleshoot-url-filtering.html\" target=\"_blank\">Troubleshoot URL Filtering<\/a><\/li>\n<\/ul>\n<p>Happy reading!<br \/>\nYour friendly Technical Publications team<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New to URL Filtering? Learn more about the steps required to start using the URL filtering feature in the PAN-OS Administrator\u2019s Guide for 6.1.<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587,744],"tags":[506],"coauthors":[711],"class_list":["post-8317","post","type-post","status-publish","format-standard","hentry","category-technical-documentation","category-web-security","tag-url-filtering"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=8317"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8317\/revisions"}],"predecessor-version":[{"id":11404,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/8317\/revisions\/11404"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=8317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=8317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=8317"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=8317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}