{"id":9190,"date":"2015-05-27T05:00:34","date_gmt":"2015-05-27T12:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9190"},"modified":"2015-12-11T09:36:20","modified_gmt":"2015-12-11T17:36:20","slug":"log-http-headers-in-web-requests","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/05\/log-http-headers-in-web-requests\/","title":{"rendered":"Log HTTP Headers in Web Requests"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\"><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/url-filtering.html\" target=\"_blank\">URL filtering<\/a><\/span> provides visibility and control over web traffic on your network. For improved visibility into web content, you can now configure the URL Filtering Profile to log HTTP header attributes included in a web request. When a client requests a web page, the HTTP header includes the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/newfeaturesguide\/url-filtering-features\/log-http-headers-in-web-requests.html\" target=\"_blank\"><span class=\"s1\">user agent, referer, and x-forwarded-for<\/span><\/a> fields as attribute-value pairs and forwards them to the web server. When enabled for logging HTTP Headers, the firewall logs the HTTP header attribute-value pairs in the URL Filtering logs.<\/p>\n<p class=\"p2\"><!--more--><\/p>\n<p class=\"p2\">You can enable HTTP Header Logging in six easy steps:<\/p>\n<ol>\n<li class=\"p3\">Create a URL Filtering profile or select an existing one.<\/li>\n<li class=\"p3\">Define how to control access to web content.<\/li>\n<li class=\"p3\">Specify what to log.<\/li>\n<li class=\"p3\">Attach the URL Filtering profile to a policy rule.<\/li>\n<li class=\"p3\">View the URL filtering logs.<\/li>\n<li class=\"p3\">View the related threat logs and WildFire Submission logs directly from the URL Filtering Log entries.<\/li>\n<\/ol>\n<p>For complete details on enabling HTTP Header Logging, see <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/newfeaturesguide\/url-filtering-features\/log-http-headers-in-web-requests.html\" target=\"_blank\"><span class=\"s4\">Log HTTP Headers in Web Requests<\/span><\/a> in the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/newfeaturesguide.html\" target=\"_blank\"><span class=\"s4\">PAN-OS\u00ae New Features Guide Version 6.1<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>URL filtering provides visibility and control over web traffic on your network. For improved visibility into web content, you can now configure the URL Filtering Profile to log HTTP header attributes included &hellip;<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587],"tags":[1022,1205,506,69],"coauthors":[711],"class_list":["post-9190","post","type-post","status-publish","format-standard","hentry","category-technical-documentation","tag-http","tag-http-header-logging","tag-url-filtering","tag-wildfire"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9190"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9190\/revisions"}],"predecessor-version":[{"id":11394,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9190\/revisions\/11394"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9190"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}