Log HTTP Headers in Web Requests

Charissa Fleischer

URL filtering provides visibility and control over web traffic on your network. For improved visibility into web content, you can now configure the URL Filtering Profile to log HTTP header attributes included in a web request. When a client requests a web page, the HTTP header includes the user agent, referer, and x-forwarded-for fields as attribute-value pairs and forwards them to the web server. When enabled for logging HTTP Headers, the firewall logs the HTTP header attribute-value pairs in the URL Filtering logs.

You can enable HTTP Header Logging in six easy steps:

  1. Create a URL Filtering profile or select an existing one.
  2. Define how to control access to web content.
  3. Specify what to log.
  4. Attach the URL Filtering profile to a policy rule.
  5. View the URL filtering logs.
  6. View the related threat logs and WildFire Submission logs directly from the URL Filtering Log entries.

For complete details on enabling HTTP Header Logging, see Log HTTP Headers in Web Requests in the PAN-OSĀ® New Features Guide Version 6.1

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.