Want more detail? Learn about Zscaler Internet Access and its integrated features like URL filtering.
You can also take a more technical look at Zscaler URL Filtering.
URL filtering is a key element of web security that allows organizations to configure how their users access webpages through a network or other systems. It can help to:
Before we continue, let’s clarify some important terms.
A Uniform Resource Locator, or URL, is an address that corresponds to the location of a website, database, web application, or protocol (among other things), allowing a web browser to retrieve it.
Web filtering is a broad term that encompasses multiple methods of controlling the sites and web apps users can access online. URL filtering and DNS filtering are two such methods.
In short, URL filtering blocks URLs (individual webpages) while DNS filtering blocks DNS requests and therefore IP addresses (whole websites).
URL filtering works by applying granular policies that allow or restrict access to particular URLs. These policies can be based on multiple criteria, such as URL categories, specific users or user groups, departments, locations, and time intervals.
When an end user tries to access any URL, the request is compared in real time against active URL filtering policies to determine whether the request should be allowed. If access is granted, the page loads normally. If access is denied, the page is prevented from loading, and the user is instead shown a “block” notification.
Although not a functional disadvantage of URL filtering itself, improper policy configuration can lead to over-filtering. For instance, blocking YouTube to keep developers from getting distracted could also stop them from watching video tutorials, which would slow them and your organization down while potentially creating more work for your IT helpdesk.
It’s also worth noting that URL filtering alone is not a comprehensive internet security strategy. Modern threat actors can develop new URLs and IP addresses extremely quickly, requiring security strategies that go above and beyond simple block and allow lists of known malicious sites.
URL categorization includes much more than just topic tags like “shopping” or “finance.” For example, most URL filtering services integrate with a threat intelligence database to block URLs flagged as exploitive, malicious, or otherwise dangerous, such as those associated with malware campaigns or phishing attacks.
This is just one of various functions that work together to give security teams precise control over web access—let’s take a look at these next.
Basic URL filtering solutions allow administrators to customize simple allow and/or block lists to block access to undesired or malicious URLs. Today’s advanced URL filtering tools include these features and more, allowing you to configure:
Zscaler offers powerful URL filtering as a native feature of Zscaler Internet Access™ (ZIA™), the world’s most deployed security service edge (SSE) platform, along with our industry-leading secure web gateway, data loss prevention, cloud-gen firewall, and more.
Zscaler Internet Access is part of the comprehensive Zscaler Zero Trust Exchange™ platform, which enables fast, secure connections to allow your employees to work from anywhere using the internet as the corporate network.
Through native integration with our entire ecosystem, Zscaler URL filtering offers peerless control over your web traffic, including:
Want more detail? Learn about Zscaler Internet Access and its integrated features like URL filtering.
You can also take a more technical look at Zscaler URL Filtering.
Zscaler Help: About URL Filtering
Read the articleZscaler Web Security Technology
Learn moreZscaler Internet Access
Visit the product pageWeb filtering isn’t one technology—the term refers generally to various methods of controlling access to websites. URL filtering is one such method, able to block URLs or groups of URLs based on various criteria.
URL filtering allows an organization to configure how users access webpages through its network or other systems, making it a key way to protect users and data from phishing, ransomware, and other threats; control bandwidth usage; maintain employee productivity; and limit the organization’s liability by restricting access to inappropriate content.