1. Palo Alto Networks PAN-OS® Administrator’s Guide 10.2
"URL Filtering Concepts
" Section: "URL Filtering Order of Operations."
This section details the evaluation logic: "When the firewall receives a request for a web page
it enforces policy in the following order: 1. First
it checks for a match against the custom URL filtering block and allow lists... 2. If the URL does not match a site on the block or allow list
the firewall checks if the URL matches a custom URL category... 3. If the URL does not match a custom URL category
the firewall performs a PAN-DB URL category lookup..." This directly supports options C and D as valid methods that take precedence over the PAN-DB lookup.
2. Palo Alto Networks PAN-OS® Administrator’s Guide 10.2
"Objects > Custom Objects > URL Category
" Section: "Create a Custom URL Category."
This document outlines the procedure for creating a custom URL category (as described in option D) and notes its use for creating exceptions to existing policies. It states
"Use custom URL categories to customize how you secure your network against threats and non-malicious sites."
3. Palo Alto Networks PAN-OS® Administrator’s Guide 10.2
"Objects > Security Profiles > URL Filtering
" Section: "Configure URL Filtering."
This section describes the components of a URL Filtering profile
including the "Allow List" and "Block List." It confirms that adding an entry to the Allow List (as described in option C) will permit access to that specific URL
regardless of its PAN-DB categorization.