Information
URL filters should not specify any categories as Allow Categories.
Rationale:
Setting a URL filter to have one or more entries under Allow Categories will cause no log entries to be produced in the URL Filtering logs for access to URLs in those categories. For forensic, legal, and HR purposes, it is advisable to log access to every URL. In many cases failure to log all URL access is a violation of corporate policy, legal requirements or regulatory requirements.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Navigate to Objects > Security Profiles > URL Filtering.
For each permitted category, set the Site Access action to alert
Impact:
Not having an effective URL Filtering configuration can leave an organization open to legal action, internal HR issues, non-compliance with regulatory policies or productivity loss.
Default Value:
A default URL Filtering Security Profile is configured, with the following categories set to 'block': abused-drugs adult gambling hacking malware phishing questionable weapons 3 Categories are set to alert in the default policy, and 58 Categories are set to allow (which means they are not logged)
References:
'PAN-OS Administrator's Guide 9.0 (English) - URL Filtering Best Practices': https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering/url-filtering-best-practices.html
'PAN-OS Administrator's Guide 9.0 (English) - URL Filtering' - https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/url-filtering.html