How to test URL Filtering Inline ML detection

How to test URL Filtering Inline ML detection

8664
Created On 04/20/21 23:04 PM - Last Modified 12/16/22 04:43 AM


Objective


Verify that the URL Filtering Inline ML detection is working properly.

Environment


  • Palo Alto Firewalls.
  • PAN-OS 10.0.and above.
  • URL Filtering Inline ML
  • Active WildFire license.


Procedure


  1. Make sure that a blocking action is defined for Phishing Detection and JavaScript Exploit Detection under the Inline ML tab in the URL Filtering profile.
GUI: Objects > Security Profiles > URL Filtering
Enabling URL Filtering Inline ML modules
  1. To perform the test, visit http://mlav.testpanw.com/js.html to test Malicious javascript detection, and http://mlav.testpanw.com/phishing.html to test phishing detection.


Additional Information


The log type will be “url” and will be found under the URL Filtering Logs. 

Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000sY4UCAU&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language