One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2150958
Date de publication 2021-01-07 06:01:00 (vue: 2021-01-07 06:05:33)
Titre What is URL filtering? Web filtering explained
Texte This blog was written by a third party author. What is URL filtering? URL filtering is one of the most common types of web filtering techniques used by organizations to restrict the kinds of content that their users may access.  URL filtering blocks users from loading questionable websites or hosted files via corporate device or network resources. The filter is triggered by comparing the URL address a user is trying to access against policy lists that specify whether to block, allow, and/or track visits to certain URL addresses. The URL filtering process occurs at the application layer by examining URL requests over common protocols like HTTP/HTTPS, FTP, and SMTP. Malicious, time-wasting, or otherwise questionable URL addresses can be filtered on a page-by-page basis as well as on a category basis to broadly block access to certain kinds of content such as gambling, social media, or known phishing sites. The known malicious URLs and category definitions in a URL filtering database are primarily maintained by the security vendor supplying the enforcement product. URL classification is typically performed by the vendor through a combination of internal research, threat intelligence, machine learning, and artificial intelligence algorithms. In addition, the URL filtering database and enforcement policy lists are often highly customizable by the customer. That customization can be done across an organization or be tailored to departments, user groups, or even specific users. Similarly, filtering policies could be applied according to time of day or user location. This makes it possible, for instance, to block cloud storage sites for employees except for the sales team who might need them to share information with prospects. Or it could be used to enable remote access by a financial analyst to certain cloud-based accounting software during business hours, but to limit that access after close of business. Web filtering use cases and benefits Web filtering techniques like URL filtering are best known for their cybersecurity use cases, however they provide additional benefits in a number of other business scenarios. The following are 4 of the most common uses of URL filtering and other content filtering methods: Blocking malicious activity URL filtering is most commonly used to block malicious websites and hosted files associated with known phishing campaigns, malware propagation, and other cybercriminal activity. Enforcing NSFW corporate policy Organizations can utilize URL filters to restrict access to not safe for work content that runs afield of corporate policies, such as pornography or gambling sites—many of which are also conduits for cybersecurity threats. Promoting employee efficiency Many businesses take advantage of the additional benefits of URL filtering by utilizing the capabilities to limit employee access to distracting content in categories like shopping, news, and social media sites. Minimizing bandwidth strain In addition to reducing distraction from non-work related content, URL filtering can also minimize the use of bandwidth hogging applications such as video streaming and online gaming sites. URL filtering vs DNS filtering URL filtering is a more granular form of web filtering than DNS filtering, which blocks or allows content across entire web domains based on DNS queries. DNS filtering takes more of a blunt hammer approach to blocking sites. It is most appropriate for filtering out whole domains associated with highly malicious activity that have little chance of hosting legitimate content. Meantime, URL filtering takes more of a scalpel approach, allowing organizations to block certain specific web pages or hosted files from a given domain while allowing users unimpeded access to other legitimate pages hosted on
Envoyé Oui
Condensat access accessing according accounting across activity addition additional additionally address addresses advantage afield after against algorithms aligning allow allowing allows also analyst and/or application applications applied approach appropriate architecture are artificial associated author backhauling bandwidth based basis becoming been benefits best block blocking blocks blog blunt broadly business businesses but campaigns can capabilities care carefully cases categories category centralized certain chance classification close cloud combination comes common commonly compared comparing comprehensive compromised concerns conduits content corporate could crucial customer customizable customization cybercriminal cybersecurity daily database day definitions delivered departments device distracting distraction dns domain domains don't done downside during dynamic efficiency employee employees enable enables enforce enforcement enforcing entire even examining except explained feeding fewer files filter filtered filtering filters financial firewalls flexibility following form from ftp gambling gaming gateway gateways get given granular groups hammer hardware have highly hogging hosted hosting hours how however http/https increasingly information inspect inspecting instance intelligence internal its kinds known latency layer learning legitimate leveraged like limit lists little loading local location locations lot machine machines maintain maintained maintaining makes malicious malware many matter may means meantime media methods: might minimal minimize minimizing more most native nature need network news non not nsfw number occurs often one online operates organization organizations other otherwise out over page pages party perform performance performed phishing policies policy pornography possible preferred primarily process product promoting propagation prospects protocols provide putting queries questionable reducing related remote requests require research resources rest restrict roles runs safe sake sales same scalpel scenarios secure security service share shopping similarly site sites sites—many smtp social software specific specify stopping storage strain streaming such supplying support tailored tailoring take takes task team techniques than them third threat threats through time tools track traditionally traffic triggered trying types typically undue unimpeded unlike updating url urls use used user users uses using utilize utilizing vehicle vendor video visits wasting web websites well what when where whether which who whole without work written
Tags Malware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: