Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I found a few leads googling around Palo Alto Networks docs website:

- "Advanced URL Filtering" seems to have a feature where web content is either can be evaluated "inline" or "web payload data is also submitted to Advanced URL Filtering in the cloud" [1].

- If a URL is considered 2 spooky to load on the user's endpoint, it can instead be loaded via "Remote Browser Isolation" in a remote-desktop-like session, on demand, for that single page only [2].

I think either (or both) could explain the signals you're detecting.

[1]: https://docs.paloaltonetworks.com/advanced-url-filtering/adm....

[2]: https://docs.paloaltonetworks.com/advanced-url-filtering/adm...



This looks exactly like it!! Nice find!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: