Credential Phishing Prevention Overview

Understanding credential phishing prevention is key for managing security policies effectively.

Where Can I Use This? What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)

Notes:

  • Legacy URL filtering licenses are discontinued, but active legacy licenses are still supported.
  • Prisma Access licenses include Advanced URL Filtering capabilities.

Phishing sites are sites that attackers disguise as legitimate websites with the intent to steal user information, especially the credentials that provide access to your network. When a phishing email enters a network, it takes just a single user to click a link and enter credentials to set a breach into motion.

You can detect and prevent in-progress phishing attacks, thereby preventing credential theft, by controlling sites to which users can submit corporate credentials based on the site’s URL category . This allows you to block users from submitting credentials to untrusted sites while allowing credential submissions to corporate and sanctioned sites.

Credential phishing prevention works by scanning username and password submissions to websites and comparing those submissions against valid corporate credentials. You can choose what websites you want to either allow or block corporate credential submissions to based on the URL category of the website.

When a user attempts to submit credentials to a site in a category you have restricted, either a block response page prevents the user from submitting credentials or a continue page warns users against submitting credentials to sites in certain URL categories, but still allows them to continue with the submission. You can customize response pages to educate users against reusing corporate credentials, even on legitimate, non-phishing sites.

High-level flow of credential phishing prevention check.

Methods to Check for Corporate Credential Submissions

Knowing the differences between detection methods and their requirements is crucial for configuration and troubleshooting.
Where can I use this? What do I need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)

Notes:

  • Legacy URL filtering licenses are discontinued, but active legacy licenses are still supported.
  • Prisma Access licenses include Advanced URL Filtering capabilities.

Before you enable credential phishing prevention, decide which method you want to use to check if valid corporate credentials have been submitted to a web page.

Method to Check Submitted Credentials User-ID Configuration Requirements How does this method detect corporate usernames and/or passwords?
Group Mapping Group Mapping configuration on the firewall

The firewall checks if the username submitted matches any valid corporate username in its user-to-group mapping table.

This method only checks usernames based on LDAP group membership. Simple to configure, but prone to false positives (e.g., common usernames like 'admin'). Does not check passwords.

IP-User Mapping IP address-to-username mappings via user mapping , GlobalProtect , or Authentication Policy/Portal

The firewall checks if the username submitted maps to the IP address of the known logged-in user.

Effective for detecting corporate username submissions tied to the session's source IP, but does not detect corporate password submission .

Domain Credential Filter

Prisma Access doesn't support this method.

  • Windows User-ID agent configured with the User-ID credential service add-on (on RODC).
  • IP address-to-username mappings (as in IP-User Mapping method).

Checks if the submitted username AND password match the user’s corporate credentials.

  • Username/Password Detection: Uses a bloom filter (secure bit mask of username/password hashes) retrieved from a dedicated Windows User-ID agent on an RODC.
  • User Verification: Checks the submitted username against the IP-to-username mapping table (like IP-User Mapping) to ensure the credentials belong to the logged-in user.

This is the most comprehensive method but requires specific infrastructure (Windows User-ID Agent on RODC).

Configure Credential Detection with the Windows User-ID Agent

(Required for Domain Credential Filter Method)

Where can I use this? What do I need?
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)
  • Advanced URL Filtering license (or a legacy URL filtering license)
  • Windows User-ID Agent + User-ID Credential Service add-on
  • Read-Only Domain Controller (RODC)

Note: Legacy URL filtering licenses are discontinued, but active legacy licenses are still supported.

Domain Credential Filter detection enables the firewall to detect passwords submitted to web pages. This method requires the Windows User-ID agent and the User-ID credential service (an add-on) installed on a read-only domain controller (RODC) .

The Domain Credential Filter detection method is supported with the Windows User-ID agent only . You cannot use the PAN-OS integrated User-ID agent for this method.

An RODC maintains a read-only copy of an Active Directory database. Installing the User-ID agent on an RODC is useful because:

Best Practice: Deploy a separate Windows User-ID agent specifically for credential detection on the RODC. Do not use this agent for general IP-address-to-user mapping.

Bloom Filter Process:

  1. The User-ID credential service runs on the RODC.
  2. It scans the directory for usernames and password hashes of users defined in the RODC Password Replication Policy (PRP).
  3. It deconstructs this data into a secure bit mask called a bloom filter .
  4. The User-ID credential service forwards the bloom filter to the Windows User-ID agent (also on the RODC).
  5. The firewall retrieves the latest bloom filter from this User-ID agent periodically.
  6. When the firewall detects a credential submission to a restricted site, it checks the submitted username/password hash against the bloom filter.

The User-ID agent never stores or exposes password hashes directly, nor does it forward them to the firewall. Once hashes are in the bloom filter, they cannot be recovered.

Configuration Steps Summary:

  1. Install and Configure User-ID Agent on RODC:
  2. Enable Information Sharing in User-ID Agent:
    1. Launch the User-ID Agent on the RODC server.
    2. Go to Setup , edit the Setup section.
    3. Select the Credentials tab (visible only if the Credential Service is installed).
    4. Check Import from User-ID Credential Agent .
    5. Click OK, Save, and Commit the agent configuration.
  3. Configure RODC Password Replication Policy (PRP):
    • Define the group(s) of users for credential detection.
    • Add these groups to the Allowed RODC Password Replication Group .
    • Ensure these groups are not also in the Denied RODC Password Replication Group .
  4. Proceed to Firewall Configuration: Continue to the next section to configure the firewall settings.

Set Up Credential Phishing Prevention (Firewall Configuration)

Where can I use this? What do I need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)
  • Advanced URL Filtering (or a legacy URL filtering license)
  • Configured User-ID (method depends on chosen detection type)
  • Decryption Policy (for HTTPS inspection)

Notes:

  • Legacy URL filtering licenses are discontinued, but active legacy licenses are still supported.
  • Prisma Access licenses include Advanced URL Filtering capabilities.

After deciding which user credential detection method to use and (if applicable) configuring the Windows User-ID agent , follow these steps on the firewall (PAN-OS/Panorama or Strata Cloud Manager).

Prerequisite: Verify that the Primary Username configured on the firewall (Device > User Identification > Group Mapping Settings > User and Group Attributes) uses the sAMAccountName attribute. Credential phishing prevention does not support alternate attributes for the primary username check.

Firewall Configuration Steps (PAN-OS / Panorama Example):

  1. Enable User-ID: Ensure User-ID is enabled and configured according to the chosen detection method:
  2. Configure URL Filtering Profile:
    1. Go to Objects > Security Profiles > URL Filtering . Add or modify a profile.
    2. (Best Practice) Block Dangerous Categories: Under the Categories tab, set Site Access to block for categories like: malware , phishing , dynamic-dns , unknown , command-and-control , extremism , copyright-infringement , proxy-avoidance-and-anonymizers , newly-registered-domain , grayware , and parked .
    3. Enable User Credential Detection:
      • Select the Settings tab (or similar location depending on PAN-OS version/management interface). Find the User Credential Detection section.
      • Choose the desired Mode (detection method):
        • IP User Mapping
        • Domain Credential Filter (Requires configuring the User-ID Agent connection under Device > User Identification > User-ID Agents and selecting it here).
        • Group Mapping (Requires selecting the relevant Group Mapping profile).
        Remember the requirements and limitations of each mode!
      • Set the Valid Username Detected Log Severity (default is medium).
    4. Configure Actions for Allowed Categories:
      • Go back to the Categories tab.
      • For each category where Site Access is set to allow or alert , choose an action for User Credential Submission :
        • alert : Log the submission but allow it.
        • allow : (Default) Allow submission without specific logging beyond normal traffic logs.
        • block : Prevent submission and display the anti-phishing block page. (Recommended for untrusted/risky categories like Social Networking, Webmail, etc.)
        • continue : Display the anti-phishing continue page; user must click 'Continue' to submit. Logs the event.

        Apply stricter actions ( block or continue ) to categories where users should generally not be entering corporate credentials.

    5. Click OK to save the URL Filtering profile.
    Note on Trusted Sites: The firewall maintains a list of "trusted" sites (updated via content updates) where credential checks are skipped for performance, even if checks are enabled for the category. Palo Alto Networks has not observed malicious activity on these sites.
  3. Create/Modify Decryption Policy:

    Credential detection requires visibility into the HTTP POST data containing the username/password. Therefore, you must decrypt HTTPS traffic for the sites you want to monitor. Create a Decryption policy rule targeting the relevant source/destination zones, users, and services, setting the action to Decrypt .

  4. Apply Profile to Security Policy:
    1. Go to Policies > Security . Add or modify a rule that allows the relevant web traffic (e.g., outbound web access).
    2. On the Actions tab:
      • Ensure Action is Allow .
      • Set Profile Type to Profiles .
      • In the URL Filtering dropdown, select the profile you configured.
    3. Click OK to save the rule.
  5. Commit Configuration: Commit the changes to the firewall/Panorama.

Monitor and Validate Credential Submissions

After configuration, monitor logs and use CLI commands to verify functionality.

Monitoring Logs:

Validation and Troubleshooting (CLI):

Familiarity with these CLI commands is useful for troubleshooting and verifying User-ID and credential detection status.

Credential Phishing Prevention Quiz

Test your understanding of the concepts covered.

1. What is the primary purpose of Credential Phishing Prevention?

2. Which license is typically required to use Credential Phishing Prevention?

3. Which of the following platforms support Credential Phishing Prevention (assuming appropriate licenses)?

4. What are the three methods available for checking corporate credential submissions?

5. Which credential detection method checks submitted usernames against the firewall's user-to-group mapping table only?

6. What is a noted potential downside of the Group Mapping detection method?

7. Which method verifies that the submitted username matches the user associated with the source IP address of the session?

8. Which credential detection method is capable of detecting both corporate username AND password submissions?

9. What specific infrastructure component is REQUIRED to use the Domain Credential Filter method?

10. What does RODC stand for in the context of the Domain Credential Filter?

11. What is the name of the secure data structure containing obfuscated username and password hash information used by the Domain Credential Filter?

12. Does Prisma Access support the Domain Credential Filter method for credential detection?

13. What Active Directory attribute MUST be used for the 'Primary Username' configuration on the firewall for credential phishing prevention to work correctly?

14. Is traffic decryption generally required for effective credential phishing prevention?

15. Which pair of URL categories is strongly recommended to have 'Site Access' set to 'block' as a best practice?

16. What are the possible actions for 'User Credential Submission' within a URL Filtering profile for categories where 'Site Access' is allowed?

17. What happens when the 'User Credential Submission' action is set to 'continue' for a URL category?

18. Where on the firewall (PAN-OS/Panorama) do you select the credential detection *method* (e.g., IP User Mapping, Domain Credential Filter)?

19. Where on the firewall (PAN-OS/Panorama) do you configure the *action* (block, alert, continue, allow) for credential submissions to specific URL categories?

20. Which CLI command provides general statistics related to credential detection, including bloom filter information if Domain Credential Filter is used?