How to test URL Filtering Inline ML detection
8664
Created On 04/20/21 23:04 PM - Last Modified 12/16/22 04:43 AM
Objective
Verify that the URL Filtering Inline ML detection is working properly.
Environment
- Palo Alto Firewalls.
- PAN-OS 10.0.and above.
- URL Filtering Inline ML
- Active WildFire license.
Procedure
- Make sure that a blocking action is defined for Phishing Detection and JavaScript Exploit Detection under the Inline ML tab in the URL Filtering profile.
GUI: Objects > Security Profiles > URL Filtering
- To perform the test, visit http://mlav.testpanw.com/js.html to test Malicious javascript detection, and http://mlav.testpanw.com/phishing.html to test phishing detection.
Additional Information
The log type will be “url” and will be found under the URL Filtering Logs.