====== PAN-OS URL Filtering ====== ===== Multi-Category URL Filtering ===== Remember, if you manually whitelist a site, any specific sub-pages that are normally classed as malware will be allowed through (even though the list of categories will mark it as cust-list, malware). PAN-OS 9.0 introduced multi-category URL Filtering. Best practice for URL risk categories is (source) * High-risk - alert * Medium-risk - alert * Low-risk - allow * Newly-registered domains - block When it comes to multiple categories, PAN-OS lists all categories in the “URL Category List” but only one category in the “Category” column. How does PAN-OS determine which of the selected categories goes by into the category column? Alphabetical order! Thus, everything from abortion to legal gets put as //low-risk// in the category column and everything from military onwards is classified as the actual category. (assuming the sites are //low-risk//) I don’t think any site is classified with just a risk-category. Also, it seems that //malware//, //phishing//, //command-and-control// and //grayware// sites do not have a risk category. I’m assuming this is because they are considered obviously risky. Remember, if you set //low-risk// to //allow//, then all sites will have their actual category in the category column and //low-risk// will still be visible in the “URL Category List” Column. On the other hand, if you set all categories to //allow// and set //low-risk// to //alert// then the “Category” column will show ‘low-risk’ for everything and //malware//, //phishing//, //command-and-control// and //grayware// will not appear as they will not have //low-risk// associated with them and so will be //allow// and not log. Other notes: * //Unknown domains// are classified as //high-risk// until PAN-DB completes site analysis and categorization. * //Unknown IP addresses// are categorized as //medium-risk// until PAN-DB completes site analysis and categorization. * //Online-storage-and-backup// always as the risk category set to //medium-risk// (or higher). * (I think) //dynamic-dns// is always //high-risk//. I could be wrong on that though. [[https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLfmCAG|Here]] is a really nice KB article on multi-category URL Filtering. ===== Test All Categories ===== Here is a simple Linux script to test all categories. I think (I've not tried it) that on Windows you need to replace ''/dev/null'' with ''NUL'' (CMD) or ''$null'' (PowerShell) curl http://urlfiltering.paloaltonetworks.com/test-grayware > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-malware > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-phishing > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-command-and-control > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-abortion > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-abused-drugs > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-adult > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-alcohol-and-tobacco > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-auctions > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-business-and-economy > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-computer-and-internet-info > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-content-delivery-networks > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-copyright-infringement > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-cryptocurrency > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-dating > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-dynamic-dns > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-educational-institutions > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-entertainment-and-arts > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-extremism > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-financial-services > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-gambling > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-games > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-government > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-hacking > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-health-and-medicine > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-home-and-garden > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-hunting-and-fishing > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-insufficient-content > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-internet-communications-and-telephony > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-internet-portals > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-job-search > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-legal > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-military > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-motor-vehicles > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-music > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-news > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-nudity > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-online-storage-and-backup > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-parked > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-peer-to-peer > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-personal-sites-and-blogs > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-philosophy-and-political-advocacy > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-private-ip-addresses > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-proxy-avoidance-and-anonymizers > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-questionable > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-real-estate > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-recreation-and-hobbies > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-reference-and-research > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-religion > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-search-engines > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-sex-education > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-shareware-and-freeware > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-shopping > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-social-networking > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-society > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-sports > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-stock-advice-and-tools > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-streaming-media > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-swimsuits-and-intimate-apparel > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-training-and-tools > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-translation > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-travel > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-unknown > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-weapons > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-web-advertisements > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-web-hosting > /dev/null curl http://urlfiltering.paloaltonetworks.com/test-web-based-email > /dev/null ===== Serve a URL Response Page Over an HTTPS Session Without SSL Decryption ===== Based on [[https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0|this article]]. * Create a URL Filtering profile that blocks the unwanted HTTP and HTTPS websites. Create a Security Policy with an action of "allow" and then link the URL Filtering profile to it. * Response pages must be enabled. * A certificate to be used for Forward Trust on the Palo Alto Networks device. * A certificate to be used for Forward Untrust on the Palo Alto Networks device. * Check [[https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFKCA0|the BrighCloud information]] if using BrightCloud. Once the above requirements have been met, enable the Palo Alto Networks device's ability to inject URL filtering response pages within an HTTPS session with the following configuration command. This command works with either BrightCloud or PAN-DB URL filter: (this setting will automatically by synced in HA). set deviceconfig setting ssl-decrypt url-proxy yes Note that this only works for URL filtering. If you block an application (e.g. Twitter) without decryption, you will just get a native browser error (e.g. Security Connection Failed). You can check a configuration to see if this is set by searching for yes =====Continue and Override Logging===== When a ''continue'' page is displayed, a log with action ''block-continue'' will be created. If the user clicks ''continue'', a log with action ''continue<'' will be created. When a ''override'' page is displayed, a log with action ''block-override'' will be created. If the user clicks ''override'', a log with action ''override'' will be created. =====Forward Slash====== ''*.paloaltonetworks.com'' matches ''www.paloaltonetworks.com'' and ''www.paloaltonetworks.com.uk''. ''*.paloaltonetworks.com/'' matches ''www.paloaltonetworks.com'' but not ''www.paloaltonetworks.com.uk''. =====Medium Risk===== In PANOS 9.0+, the URL category 'medium-risk' exists. This is for sites that have previously been associated with Malware but nothing has been seen for up to 60 days. The exception is online-storage-and-backup. This will always be medium-risk. =====Hold Web Requests===== Requires PAN-OS 9.0.4 or later. Enable the firewall to hold an initial web request as it looks up a website’s URL category with PAN-DB. When a user visits a website, a firewall with URL Filtering enabled checks its local cache of URL categories to categorize the site. If the firewall doesn’t find the URL’s category in the cache, it performs a lookup in PAN-DB. By default, the firewall allows the user’s web request during this cloud lookup and enforces policy when the server responds. But when you choose to hold web requests, the firewall blocks the request until it either finds the URL category or times out. If the lookup times out, the firewall considers the URL category not-resolved. configure set deviceconfig setting ctd hold-client-request yes commit =====Allow Specific Pages on Domain===== Sometimes you want to block a domain but allow specific pages. Let's use YouTube as an example. If you have a custom profile 'whitelist' and a custom profile 'blacklist' and they both contain '*.youtube.com', you will find that block takes prescendence over allow/alert. If you put 'www.youtube.com/watch?v=4lm75v4Ndlg' into the whitelist, you will find the block list still take prescendence over it. To allow the traffic, you need to create a rule that uses 'whitelist' in the match criteria of the rule and then just 'alerts' (or, at least, doesn't block the blacklist). =====Enable Specific YouTube Videos Only===== See [[https://live.paloaltonetworks.com/t5/minemeld-articles/minemeld-to-filter-youtube-videos/ta-p/164928|this link]]. =====YouTube Safe Search Automatic Enforcement===== On PANOS 8.1+ you can use HTTP Header Insertion to enforce YouTube safe search (specifically, enforce YouTube restricted mode). This is set in the URL Profile. However, because safe search enforcement is done before HTTP Header Insertion, YouTube safe search enforcement doesn't work well with the main "Enforce Safe Search" feature as what will happen is that restricted mode will appear to be on but the safe search will think it is off and the end user will have no way of "switching it on" as the HTTP Header Insertion does that on the fly. The solution is to create a dedicated rule for the YouTube application ID (or possibly YouTube URLs) and use HTTP Header Insertion without enforcing safe search. =====Enable Automatic Redirect to Safe Search===== You will need to ensure that you are decrypting the sessions. You will need to block access to the 'search-engine' category as we can only secure Google, Bing, Yahoo and Yandex. However, I only allow Google. Add the following to the list of URL exceptions (I'm pretty sure some of them are also required for Google Maps but I'm not sure which ones) * google.com * google.co.uk * www.google.com * www.google.co.uk * www.google.co.uk/* * accounts.google.com * accounts.google.co.uk * notifications.google.com * history.google.com * myactivity.google.com * contacts.google.com * productforums.google.com * support.google.com * ogs.google.com * feedproxy.google.com * supl.google.com * kh.google.com * pki.google.com * developers.google.com (Used for help documents) * apis.google.com (needed for some features - e.g Google Keep's menu) * www.googleapis.com * maps.googleapis.com * clients1.google.com * clients2.google.com * clients3.google.com * clients4.google.com * clients5.google.com * clients6.google.com * 0.client-channel.google.com * 1.client-channel.google.com * 2.client-channel.google.com * people-pa.clients6.google.com/v2/people/ * people-pa.clients6.google.com/v2/people/lookup * *.client-channel.google.com (needed for Google Hangouts) * sb-ssl.google.com (safe browsing API Lookup) * dl.google.com (serves binary downloads for Chrome, Earth, the Android SDK, and thousands of other files) * cloudconsole-pa.clients6.google.com (needed for loading console.cloud.google.com/apis/library?q=youtube) * servicemanagement.clients6.google.com (needed to activate YouTube API v3 console.cloud.google.com/apis/library?q=youtube) * cloudusersettings-pa.clients6.google.com (needed to manage YouTube API v3) * apikeys.clients6.google.com (needed to manage YouTube API v3) * iam.clients6.google.com (needed to manage YouTube API v3) * monitoring.clients6.google.com (needed to manage YouTube API v3) * clientauthconfig.clients6.google.com (needed to get YouTube API v3 Credential Key) * consent.google.com * policies.google.com * keep.google.com The following is from [[https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/url-filtering/enable-transparent-safe-search-enforcement|these]] [[https://www.paloaltonetworks.com/documentation/scripts/transparent-safe-search.html|two]] pages on Palo's documentation. Search Blocked

Search Blocked

User:

Your search results have been blocked because your search settings are not in accordance with company policy. In order to continue, please update your search settings so that Safe Search is set to the strictest setting. If you are currently logged into your account, please also lock Safe Search and try your search again.

For more information, please refer to:

Please enable JavaScript in your browser.

Please contact your system administrator if you believe this message is in error.

To make the Chrome Omni bar work correctly (without requiring a redirect), I had to go to Chrome settings and add the following as a search provider and then make that provider the default https://www.google.co.uk/search?q=%s&safe=active =====List of URL Categories===== [[https://live.paloaltonetworks.com/t5/Management-Articles/Complete-List-of-PAN-DB-URL-Filtering-Categories/ta-p/129799|List of URL Categories]] [[https://urlfiltering.paloaltonetworks.com/CategoryList.jsp|'Clean' List of URL Categories]] =====Test a Site===== [[https://urlfiltering.paloaltonetworks.com/TestASite.jsp|Test a Site]] =====Block Spyware===== *.360safe.com *.360.cn =====Test URL Filtering===== Another [[https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaDCAS|test page]]. ^ Category ^ Test over HTTP ^ Test over HTTPS ^ |low-risk|[[http://urlfiltering.paloaltonetworks.com/test-low-risk|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-low-risk|Test Over SSL]]| |medium-risk|[[http://urlfiltering.paloaltonetworks.com/test-medium-risk|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-medium-risk|Test Over SSL]]| |high-risk|[[http://urlfiltering.paloaltonetworks.com/test-high-risk|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-high-risk|Test Over SSL]]| |abortion|[[http://urlfiltering.paloaltonetworks.com/test-abortion|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-abortion|Test Over SSL]]| |abused-drugs|[[http://urlfiltering.paloaltonetworks.com/test-abused-drugs|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-abused-drugs|Test Over SSL]]| |adult|[[http://urlfiltering.paloaltonetworks.com/test-adult|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-adult|Test Over SSL]]| |alcohol-and-tobacco|[[http://urlfiltering.paloaltonetworks.com/test-alcohol-and-tobacco|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-alcohol-and-tobacco|Test Over SSL]]| |auctions|[[http://urlfiltering.paloaltonetworks.com/test-auctions|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-auctions|Test Over SSL]]| |business-and-economy|[[http://urlfiltering.paloaltonetworks.com/test-business-and-economy|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-business-and-economy|Test Over SSL]]| |command-and-control|[[http://urlfiltering.paloaltonetworks.com/test-command-and-control|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-command-and-control|Test Over SSL]]| |computer-and-internet-info|[[http://urlfiltering.paloaltonetworks.com/test-computer-and-internet-info|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-computer-and-internet-info|Test Over SSL]]| |content-delivery-networks|[[http://urlfiltering.paloaltonetworks.com/test-content-delivery-networks|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-content-delivery-networks|Test Over SSL]]| |copyright-infringement|[[http://urlfiltering.paloaltonetworks.com/test-copyright-infringement|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-copyright-infringement|Test Over SSL]]| |cryptocurrency|[[http://urlfiltering.paloaltonetworks.com/test-cryptocurrency|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-cryptocurrency|Test Over SSL]]| |dating|[[http://urlfiltering.paloaltonetworks.com/test-dating|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-dating|Test Over SSL]]| |dynamic-dns|[[http://urlfiltering.paloaltonetworks.com/test-dynamic-dns|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-dynamic-dns|Test Over SSL]]| |educational-institutions|[[http://urlfiltering.paloaltonetworks.com/test-educational-institutions|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-educational-institutions|Test Over SSL]]| |entertainment-and-arts|[[http://urlfiltering.paloaltonetworks.com/test-entertainment-and-arts|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-entertainment-and-arts|Test Over SSL]]| |extremism|[[http://urlfiltering.paloaltonetworks.com/test-extremism|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-extremism|Test Over SSL]]| |financial-services|[[http://urlfiltering.paloaltonetworks.com/test-financial-services|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-financial-services|Test Over SSL]]| |gambling|[[http://urlfiltering.paloaltonetworks.com/test-gambling|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-gambling|Test Over SSL]]| |games|[[http://urlfiltering.paloaltonetworks.com/test-games|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-games|Test Over SSL]]| |government|[[http://urlfiltering.paloaltonetworks.com/test-government|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-government|Test Over SSL]]| |grayware|[[http://urlfiltering.paloaltonetworks.com/test-grayware|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-grayware|Test Over SSL]]| |hacking|[[http://urlfiltering.paloaltonetworks.com/test-hacking|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-hacking|Test Over SSL]]| |health-and-medicine|[[http://urlfiltering.paloaltonetworks.com/test-health-and-medicine|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-health-and-medicine|Test Over SSL]]| |home-and-garden|[[http://urlfiltering.paloaltonetworks.com/test-home-and-garden|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-home-and-garden|Test Over SSL]]| |hunting-and-fishing|[[http://urlfiltering.paloaltonetworks.com/test-hunting-and-fishing|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-hunting-and-fishing|Test Over SSL]]| |insufficient-content|[[http://urlfiltering.paloaltonetworks.com/test-insufficient-content|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-insufficient-content|Test Over SSL]]| |internet-communications-and-telephony|[[http://urlfiltering.paloaltonetworks.com/test-internet-communications-and-telephony|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-internet-communications-and-telephony|Test Over SSL]]| |internet-portals|[[http://urlfiltering.paloaltonetworks.com/test-internet-portals|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-internet-portals|Test Over SSL]]| |job-search|[[http://urlfiltering.paloaltonetworks.com/test-job-search|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-job-search|Test Over SSL]]| |legal|[[http://urlfiltering.paloaltonetworks.com/test-legal|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-legal|Test Over SSL]]| |malware|[[http://urlfiltering.paloaltonetworks.com/test-malware|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-malware|Test Over SSL]]| |military|[[http://urlfiltering.paloaltonetworks.com/test-military|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-military|Test Over SSL]]| |motor-vehicles|[[http://urlfiltering.paloaltonetworks.com/test-motor-vehicles|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-motor-vehicles|Test Over SSL]]| |music|[[http://urlfiltering.paloaltonetworks.com/test-music|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-music|Test Over SSL]]| |news|[[http://urlfiltering.paloaltonetworks.com/test-news|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-news|Test Over SSL]]| |newly-registered-domain|[[http://urlfiltering.paloaltonetworks.com/test-newly-registered-domain|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-newly-registered-domain|Test Over SSL]]| |not-resolved|[[http://urlfiltering.paloaltonetworks.com/test-not-resolved|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-not-resolved|Test Over SSL]]| |nudity|[[http://urlfiltering.paloaltonetworks.com/test-nudity|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-nudity|Test Over SSL]]| |online-storage-and-backup|[[http://urlfiltering.paloaltonetworks.com/test-online-storage-and-backup|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-online-storage-and-backup|Test Over SSL]]| |parked|[[http://urlfiltering.paloaltonetworks.com/test-parked|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-parked|Test Over SSL]]| |peer-to-peer|[[http://urlfiltering.paloaltonetworks.com/test-peer-to-peer|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-peer-to-peer|Test Over SSL]]| |personal-sites-and-blogs|[[http://urlfiltering.paloaltonetworks.com/test-personal-sites-and-blogs|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-personal-sites-and-blogs|Test Over SSL]]| |philosophy-and-political-advocacy|[[http://urlfiltering.paloaltonetworks.com/test-philosophy-and-political-advocacy|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-philosophy-and-political-advocacy|Test Over SSL]]| |phishing|[[http://urlfiltering.paloaltonetworks.com/test-phishing|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-phishing|Test Over SSL]]| |private-ip-addresses|[[http://urlfiltering.paloaltonetworks.com/test-private-ip-addresses|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-private-ip-addresses|Test Over SSL]]| |proxy-avoidance-and-anonymizers|[[http://urlfiltering.paloaltonetworks.com/test-proxy-avoidance-and-anonymizers|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-proxy-avoidance-and-anonymizers|Test Over SSL]]| |questionable|[[http://urlfiltering.paloaltonetworks.com/test-questionable|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-questionable|Test Over SSL]]| |ransomware|[[http://urlfiltering.paloaltonetworks.com/test-ransomware|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-ransomware|Test Over SSL]]| |real-estate|[[http://urlfiltering.paloaltonetworks.com/test-real-estate|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-real-estate|Test Over SSL]]| |recreation-and-hobbies|[[http://urlfiltering.paloaltonetworks.com/test-recreation-and-hobbies|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-recreation-and-hobbies|Test Over SSL]]| |reference-and-research|[[http://urlfiltering.paloaltonetworks.com/test-reference-and-research|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-reference-and-research|Test Over SSL]]| |religion|[[http://urlfiltering.paloaltonetworks.com/test-religion|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-religion|Test Over SSL]]| |search-engines|[[http://urlfiltering.paloaltonetworks.com/test-search-engines|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-search-engines|Test Over SSL]]| |sex-education|[[http://urlfiltering.paloaltonetworks.com/test-sex-education|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-sex-education|Test Over SSL]]| |shareware-and-freeware|[[http://urlfiltering.paloaltonetworks.com/test-shareware-and-freeware|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-shareware-and-freeware|Test Over SSL]]| |shopping|[[http://urlfiltering.paloaltonetworks.com/test-shopping|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-shopping|Test Over SSL]]| |social-networking|[[http://urlfiltering.paloaltonetworks.com/test-social-networking|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-social-networking|Test Over SSL]]| |society|[[http://urlfiltering.paloaltonetworks.com/test-society|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-society|Test Over SSL]]| |sports|[[http://urlfiltering.paloaltonetworks.com/test-sports|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-sports|Test Over SSL]]| |stock-advice-and-tools|[[http://urlfiltering.paloaltonetworks.com/test-stock-advice-and-tools|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-stock-advice-and-tools|Test Over SSL]]| |streaming-media|[[http://urlfiltering.paloaltonetworks.com/test-streaming-media|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-streaming-media|Test Over SSL]]| |swimsuits-and-intimate-apparel|[[http://urlfiltering.paloaltonetworks.com/test-swimsuits-and-intimate-apparel|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-swimsuits-and-intimate-apparel|Test Over SSL]]| |training-and-tools|[[http://urlfiltering.paloaltonetworks.com/test-training-and-tools|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-training-and-tools|Test Over SSL]]| |translation|[[http://urlfiltering.paloaltonetworks.com/test-translation|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-translation|Test Over SSL]]| |travel|[[http://urlfiltering.paloaltonetworks.com/test-travel|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-travel|Test Over SSL]]| |unknown|[[http://urlfiltering.paloaltonetworks.com/test-unknown|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-unknown|Test Over SSL]]| |weapons|[[http://urlfiltering.paloaltonetworks.com/test-weapons|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-weapons|Test Over SSL]]| |web-advertisements|[[http://urlfiltering.paloaltonetworks.com/test-web-advertisements|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-web-advertisements|Test Over SSL]]| |web-based-email|[[http://urlfiltering.paloaltonetworks.com/test-web-based-email|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-web-based-email|Test Over SSL]]| |web-hosting|[[http://urlfiltering.paloaltonetworks.com/test-web-hosting|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-web-hosting|Test Over SSL]]| |test-real-time-detection-command-and-control|[[http://urlfiltering.paloaltonetworks.com/test-real-time-detection-command-and-control|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-real-time-detection-command-and-control|Test Over SSL]]| |test-real-time-detection-malware|[[http://urlfiltering.paloaltonetworks.com/test-real-time-detection-malware|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-real-time-detection-malware|Test Over SSL]]| |test-real-time-detection-phishing|[[http://urlfiltering.paloaltonetworks.com/test-real-time-detection-phishing|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-real-time-detection-phishing|Test Over SSL]]| |test-real-time-detection-grayware|[[http://urlfiltering.paloaltonetworks.com/test-real-time-detection-grayware|Test Unencrypted]]|[[https://urlfiltering.paloaltonetworks.com/test-real-time-detection-grayware|Test Over SSL]]|