Palo Alto Networks' URL Filtering feature not only controls access to web content based on categories but also plays a crucial role in preventing credential theft. By integrating Credential Phishing Prevention with URL Filtering, organizations can detect and block attempts to submit corporate credentials to malicious or untrusted websites.
Credential phishing prevention works by scanning username and password submissions to websites and comparing those submissions against valid corporate credentials. You can choose what websites you want to either allow or block corporate credential submissions to based on the URL category of the website. When a user attempts to submit credentials to a site in a category you have restricted, either a block response page prevents the user from submitting credentials or a continue page warns users against submitting credentials to sites in certain URL categories, but still allows them to continue with the submission.
Reference: Credential Phishing Prevention - Palo Alto Networks
Credential Phishing Prevention works by monitoring credential submissions to websites and comparing them against known corporate credentials. URL Filtering profiles can be configured to specify actions (allow, alert, block, continue) for credential submissions based on URL categories. This allows administrators to:
This integration ensures that even if users access a phishing site, the firewall can prevent them from inadvertently compromising corporate credentials.
Palo Alto Networks offers several methods to detect credential submissions:
Each method offers varying levels of detection accuracy and administrative overhead.
Palo Alto Networks utilizes Bloom Filters within the Domain Credential Filter method to securely detect the submission of corporate credentials on web pages. A Bloom Filter is a compact, probabilistic data structure that allows the firewall to check if a username and password pair matches known corporate credentials without storing or exposing the actual credentials.
This method requires the deployment of the Windows User-ID agent along with the User-ID Credential Service add-on on a Read-Only Domain Controller (RODC). The Credential Service scans the directory for usernames and password hashes of group members specified in the RODC's Password Replication Policy (PRP). It then constructs a Bloom Filter from this data and forwards it to the User-ID agent. The firewall retrieves the latest Bloom Filter from the User-ID agent at regular intervals to detect credential submissions.
sequenceDiagram participant RODC participant CredentialService participant UserIDAgent participant Firewall RODC->>CredentialService: Provide user credentials (usernames and password hashes) CredentialService->>CredentialService: Generate Bloom Filter CredentialService->>UserIDAgent: Send Bloom Filter Firewall->>UserIDAgent: Request Bloom Filter UserIDAgent->>Firewall: Provide Bloom Filter
sequenceDiagram participant User participant Website participant Firewall participant BloomFilter participant IPUserMapping User->>Website: Submit username and password Website->>Firewall: Forward credentials Firewall->>BloomFilter: Check credentials against Bloom Filter BloomFilter-->>Firewall: Match/No Match Firewall->>IPUserMapping: Verify username-IP association IPUserMapping-->>Firewall: Confirm association Firewall->>User: Allow/Block/Alert based on policy
To set up Credential Phishing Prevention:
Objects > Security Profiles > URL Filtering
.
For detailed guidance, refer to the official documentation: Set Up Credential Phishing Prevention .
sequenceDiagram participant User participant Website participant Firewall participant GroupMappingTable User->>Website: Submit Username Website->>Firewall: Forward Submission Firewall->>GroupMappingTable: Check Username GroupMappingTable-->>Firewall: Return Match/No Match Firewall->>User: Allow/Block/Alert based on result
sequenceDiagram participant User participant Website participant Firewall participant IPUserMappingTable User->>Website: Submit Username Website->>Firewall: Forward Submission Firewall->>IPUserMappingTable: Verify Username-IP Association IPUserMappingTable-->>Firewall: Return Match/No Match Firewall->>User: Allow/Block/Alert based on result
sequenceDiagram participant User participant Website participant Firewall participant UserIDAgent participant BloomFilter participant IPUserMappingTable User->>Website: Submit Username & Password Website->>Firewall: Forward Submission Firewall->>UserIDAgent: Retrieve Bloom Filter UserIDAgent-->>Firewall: Provide Bloom Filter Firewall->>BloomFilter: Check Credentials BloomFilter-->>Firewall: Return Match/No Match Firewall->>IPUserMappingTable: Verify Username-IP Association IPUserMappingTable-->>Firewall: Return Match/No Match Firewall->>User: Allow/Block/Alert based on result