Modern Malware Protection
Wildfire configuration
PANOS 5.0/6.0
Alberto Rivai
CISSP, CCIE #20068, CNSE
The Lifecycle of Network Attacks

1

Bait the
end-user
End-user
lured to a
dangerous
application or
website
containing
malicious
content

2 | ©2012, Palo Alto Networks. Confidential and Proprietary.

2

3

4

5

Exploit

Download
Backdoor

Establish
Back-Channel

Explore
& Steal

Infected
content
exploits the
end-user,
often without
their
knowledge

Secondary
payload is
downloaded
in the
background.
Malware
installed

Malware
establishes an
outbound
connection to
the attacker
for ongoing
control

Remote attacker
has control
inside the
network and
escalates the
attack
Anatomy of a Network Compromise
Brute-force

Command
injection

SMTP
Exploitation
Hypervisor

Application servers

Phishing email
(corporate email
with link to malicious
site)

Corporate
Email Server

Virtual server host

Exploitation, tool drops,
credential and data theft

Exploitation, tool drops,
credential and data theft

HTTP
SSL

Phishing email
(web-based email with
malicious attachment)

Initially targeted client

Domain
Controller

Compromise of
mobile devices
Network ownership complete
Legitimate credentials used

Exploit delivery

Remote access tool
download
Command-and-control

Mobile
Devices
Data exfiltration

Workstations harvested for
IP and used as mules

Command-and-control

3 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Advanced threat prevention solution
Rapid, global sharing

Identify & control

Prevent known
threats

Detect unknown
threats

All applications

Our unique approach makes us the only solution that…


Scans ALL applications (including SSL traffic) to secure all avenues in/out of a
network, reduce the attack surface area, and provide context for forensics



Prevents attacks across ALL attack vectors (exploit, malware, DNS, command &
control, and URL) with content-based signatures



Detects zero day malware & exploits using public/private cloud and
automatically creates signatures for global customer base
Wildfire Service Architecture
and Security measure

5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
WildFire Architecture

6 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Security Measures to protect customers
 Device administrators have control over what session information is
sent to the cloud, so users can maintain compliance with local laws
and regulations
 PANOS 5.0/6.0 Device -> Setup –> Wildfire

7 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Cloud Security: Behind the Scenes
 Industry best practices to protect customer data within the cloud
infrastructure
 Data protection, HA and data privacy

8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Cloud Security: Behind the Scenes

 All communication between customer firewalls and the WildFire cloud
occurs between the customer firewall and the WildFire cloud’s nearest
Amazon EC2 server
 Communication between customer firewalls and the Amazon EC2 server
is encrypted using HTTPS/SSL encryption
 Clientside and server-side certificates signed by Palo Alto Networks’
Certificate Authority (CA) ensure that Palo Alto Networks firewalls
will only connect to a valid WildFire cloud instance and vice-versa.

9 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Performance impact on Control Plane
 Test environment
 PA-5060 1 vsys
 100 security policies with Antivirus, threat prevention, and URL filtering,
and WildFire forwarding was enabled on select policies such that the
average rate of forwarding to the WildFire cloud was approximately 2
samples per second
 A traffic load of approximately 16Gbps over 9 different protocols

 Management plane CPU utilization was captured during both tests over a
60 second period and averaged per CPU core.

10 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Configuring Wildfire

11 | ©2012, Palo Alto Networks. Confidential and Proprietary.
File forwarding capacity

12 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Check licenses PANOS 5.0/6.0
 Device -> License tab

Basic WildFire

PAN-OS 5.0

PAN-OS 6.0

WildFire Subscription

WF-500

PAN-OS 5.0

PAN-OS 6.0

✓

✓

Public Cloud

✓

✓

✓

WF-500 support

✓

✓

N/A

API access

✓

✓

Public Cloud

✓

✓

✓

PDF

✓

✓

Office Documents

✓

✓

Java

✓

✓

30 minute signatures
✓

Integrated logging

Windows PE (DLL & EXE)

✓

✓

Windows XP

✓

✓

✓

✓

✓

Windows 7

✓

✓

✓

✓

✓

Android APK

13 | ©2012, Palo Alto Networks. Confidential and Proprietary.

✓
Add File Blocking profile
 PANOS 5.0/6.0
 Objects -> Security Profiles -> File Blocking

14 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Add rule to File Blocking profile
 Click Add to add file forwarding rule

 Action
 Forward - The file is automatically sent to WildFire.
 continue-and-forward—A continue page is presented, and the file is sent to
WildFire (combines the continue and forwardactions). This action only works
with web-based traffic. This is due to the fact that a user must click continue
before the file will be forward and the continue response page option is only
available with http/https.

15 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Add rule to File Blocking profile - continue
 Optional
 Click Add to add rule to monitor other file types

 Click OK

16 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Apply the File Blocking profile in Policies


Go to Policies -> Security



Choose the security policy that you want to inspect for Wildfire



Normally security policy that controls inside to outside



Attach the File Blocking profile to the security policy

17 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Check connectivity
 Execute “test wildfire registration”

 Note: Do not use PING to test connectivity to the server. Ping requests
are disabled on the Wildfire server.

18 | ©2012, Palo Alto Networks. Confidential and Proprietary.
Verify


To verify, if any files have been forwarded to the server, use the following
command: show wildfire status



The total file forwarded counter will provide the number of files being
forwarded to the server.

19 | ©2012, Palo Alto Networks. Confidential and Proprietary.
To view Wildfire Logs
 Note : PANOS 5.0 users with no Wildifre license do not have the
ability to view Wildfire logs from the firewall. You need to go to
https://wildifre.paloaltonetworks.com
 Monitor -> Wildfire Submissions for PANOS 6.0
 Monitor -> Wildfire for PANOS 5.0

20 | ©2012, Palo Alto Networks. Confidential and Proprietary.
To view Wildfire Logs - continue
 For PANOS 5.0 users without Wildfire license, Data Filtering logs can
be used to check the status of the file , here are the three actions
available:
 If you only see “forward” with no “wildfire-upload-success” or “wildfireupload-skip”, means that it is either signed by a trusted file signer, or it
is benign sample that the cloud has already seen.

 Forward
 Data plane detected a Potentially Executable file on a Wildfire-enabled
policy. The file is buffered in the management plane.

 wildfire-upload-success
 This means that the file wasn't signed by a trusted signer, and the file
hasn't yet been seen by the cloud. In this case, the file (and session info)
was uploaded to the cloud for analysis.

21 | ©2012, Palo Alto Networks. Confidential and Proprietary.
To view Wildfire Logs - continue
 wildfire-upload-skip
 This means that the file was already seen by the cloud, but the file was
confirmed to be malware. The device skips the file but still sends the
session info for logging purposes.

 Note : Not every download will be visible in the Dashboard reports.
The WildFire Dashboard reports will remain blank until an unknown
file is uploaded to the cloud.

22 | ©2012, Palo Alto Networks. Confidential and Proprietary.
To show statistics
 Execute “ show wildfire statistics”

 https://live.paloaltonetworks.com/docs/DOC-5097
23 | ©2012, Palo Alto Networks. Confidential and Proprietary.
An Integrated Approach to Threat
Coordinated Threat Prevention Prevention
Bait the
end-user

Exploit

Download
Backdoor

Establish
Back-Channel

App-ID

Block
high-risk apps

Block C&C on
non-standard
ports

URL

Block
known malware
sites

Explore &
Steal

Block malware,
fast-flux domains

Spyware
AV

Threat License

IPS

Block
the exploit
Block spyware,
C&C traffic
Block malware

Files

WildFire

24 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Prevent drive-bydownloads

Detect unknown
malware

Block new C&C
traffic

Coordinated
intelligence to
detect and block
active attacks
based on
signatures,
sources and
behaviors
WildFire Coverage Report
Request your report to see:
 The number of detected
malware samples
 Which samples would have
been prevented by WildFire
 The percent of increased
signature coverage with
WildFire

25 | ©2013, Palo Alto Networks. Confidential and Proprietary.
Thank You

More Related Content

PPTX
Palo Alto Networks 28.5.2013
PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
PPTX
F5 - BigIP ASM introduction
PDF
Future wireless - open roaming
PDF
F5 - Configuring BIG-IP LTM v11 - Instructor PPT.pdf
PDF
Palo alto networks product overview
PPTX
Palo Alto Networks authentication
PDF
Virtual Intranet Access (VIA)
Palo Alto Networks 28.5.2013
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
F5 - BigIP ASM introduction
Future wireless - open roaming
F5 - Configuring BIG-IP LTM v11 - Instructor PPT.pdf
Palo alto networks product overview
Palo Alto Networks authentication
Virtual Intranet Access (VIA)

What's hot (20)

PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPT
Palo alto networks next generation firewalls
PDF
Understanding SASE
PPT
Fortinet FortiOS 5 Presentation
PDF
10 palo alto nat policy concepts
PDF
11 palo alto user-id concepts
PDF
Microsoft Office 365 Security and Compliance
PPTX
SD-WAN plus cloud security
PDF
13 palo alto url web filtering concept
PDF
Base Designs Lab Setup for Validated Reference Design
PPT
Fortigate Training
PDF
Cisco Meraki Overview
PPTX
Getting the most out of the aruba policy enforcement firewall
PPTX
What is Zero Trust
PPT
NIST 800-92 Log Management Guide in the Real World
PPTX
Azure Sentinel.pptx
PPTX
Zero trust deck 2020
PPT
Access Management with Aruba ClearPass
PDF
PaloAlto Enterprise Security Solution
PPTX
Fortinet
Adopting A Zero-Trust Model. Google Did It, Can You?
Palo alto networks next generation firewalls
Understanding SASE
Fortinet FortiOS 5 Presentation
10 palo alto nat policy concepts
11 palo alto user-id concepts
Microsoft Office 365 Security and Compliance
SD-WAN plus cloud security
13 palo alto url web filtering concept
Base Designs Lab Setup for Validated Reference Design
Fortigate Training
Cisco Meraki Overview
Getting the most out of the aruba policy enforcement firewall
What is Zero Trust
NIST 800-92 Log Management Guide in the Real World
Azure Sentinel.pptx
Zero trust deck 2020
Access Management with Aruba ClearPass
PaloAlto Enterprise Security Solution
Fortinet
Ad

Viewers also liked (20)

PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
PDF
Palo alto networks NAT flow logic
PDF
User expert forum user-id
PDF
User id installation and configuration
PDF
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PPTX
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
DOCX
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
PDF
Palo alto networks pcnse6 study guide feb 2015
PDF
FlexPod_for_HondaTH
PDF
PAN Platform Summary
PPTX
NATE-Central-Log
PPTX
Modern Malware by Nir Zuk Palo Alto Networks
PPTX
Vfm website-projects
PPT
Vsphere 4-partner-training180
PDF
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
PDF
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
PPTX
TechWiseTV Workshop: Nexus Data Broker
PDF
Concepts: Management VLAN
PPTX
Vfm strategic benefits from caching
PPTX
Vfm corporate presentation v1
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Palo alto networks NAT flow logic
User expert forum user-id
User id installation and configuration
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo alto networks pcnse6 study guide feb 2015
FlexPod_for_HondaTH
PAN Platform Summary
NATE-Central-Log
Modern Malware by Nir Zuk Palo Alto Networks
Vfm website-projects
Vsphere 4-partner-training180
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
Webinar NETGEAR - ProsSafe Switch gestibili e supporto della configurazione ...
TechWiseTV Workshop: Nexus Data Broker
Concepts: Management VLAN
Vfm strategic benefits from caching
Vfm corporate presentation v1
Ad

Similar to User Expert forum Wildfire configuration (20)

PDF
00 Introduction for sangfor more important
PPT
Squid server
PDF
10 server security hacks to secure your web servers
PPT
4 Steps to Optimal Endpoint Settings
PDF
10 cosas que un firewall debería hacer
DOCX
Monitoring Privileged User Actions for Security and Compliance with SureLog: ...
PPTX
PROJECT REVIEW of technical vulnerability 1 (3).pptx
PDF
Secure Auditing and Deduplicating Data on Cloud
PDF
Cisco, Sourcefire and Lancope - Better Together
PDF
Penetration testing by Burpsuite
PDF
Ethical Hacking PowerPoint presentation.
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PPT
Securing Servers in Public and Hybrid Clouds
PPT
Tech 101: Understanding Firewalls
PPTX
Understanding Network Security and Vulnerability Assessment
PPTX
Scan Website Vulnerability - Project Presentation
PDF
Packet capture and network traffic analysis
PPTX
Cyber security & network attack6
PPT
Presentacion Palo Alto Networks
PDF
Cloud Security:Threats & Mitgations
00 Introduction for sangfor more important
Squid server
10 server security hacks to secure your web servers
4 Steps to Optimal Endpoint Settings
10 cosas que un firewall debería hacer
Monitoring Privileged User Actions for Security and Compliance with SureLog: ...
PROJECT REVIEW of technical vulnerability 1 (3).pptx
Secure Auditing and Deduplicating Data on Cloud
Cisco, Sourcefire and Lancope - Better Together
Penetration testing by Burpsuite
Ethical Hacking PowerPoint presentation.
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Securing Servers in Public and Hybrid Clouds
Tech 101: Understanding Firewalls
Understanding Network Security and Vulnerability Assessment
Scan Website Vulnerability - Project Presentation
Packet capture and network traffic analysis
Cyber security & network attack6
Presentacion Palo Alto Networks
Cloud Security:Threats & Mitgations

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPT
What is a Computer? Input Devices /output devices
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Geologic Time for studying geology for geologist
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
2018-HIPAA-Renewal-Training for executives
Taming the Chaos: How to Turn Unstructured Data into Decisions
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Custom Battery Pack Design Considerations for Performance and Safety
Flame analysis and combustion estimation using large language and vision assi...
Final SEM Unit 1 for mit wpu at pune .pptx
sbt 2.0: go big (Scala Days 2025 edition)
1 - Historical Antecedents, Social Consideration.pdf
Zenith AI: Advanced Artificial Intelligence
What is a Computer? Input Devices /output devices
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Geologic Time for studying geology for geologist
Consumable AI The What, Why & How for Small Teams.pdf
CloudStack 4.21: First Look Webinar slides
A review of recent deep learning applications in wood surface defect identifi...
UiPath Agentic Automation session 1: RPA to Agents
The influence of sentiment analysis in enhancing early warning system model f...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sustainability-14-14877-v2.pddhzftheheeeee
A contest of sentiment analysis: k-nearest neighbor versus neural network
2018-HIPAA-Renewal-Training for executives

User Expert forum Wildfire configuration

  • 1. Modern Malware Protection Wildfire configuration PANOS 5.0/6.0 Alberto Rivai CISSP, CCIE #20068, CNSE
  • 2. The Lifecycle of Network Attacks 1 Bait the end-user End-user lured to a dangerous application or website containing malicious content 2 | ©2012, Palo Alto Networks. Confidential and Proprietary. 2 3 4 5 Exploit Download Backdoor Establish Back-Channel Explore & Steal Infected content exploits the end-user, often without their knowledge Secondary payload is downloaded in the background. Malware installed Malware establishes an outbound connection to the attacker for ongoing control Remote attacker has control inside the network and escalates the attack
  • 3. Anatomy of a Network Compromise Brute-force Command injection SMTP Exploitation Hypervisor Application servers Phishing email (corporate email with link to malicious site) Corporate Email Server Virtual server host Exploitation, tool drops, credential and data theft Exploitation, tool drops, credential and data theft HTTP SSL Phishing email (web-based email with malicious attachment) Initially targeted client Domain Controller Compromise of mobile devices Network ownership complete Legitimate credentials used Exploit delivery Remote access tool download Command-and-control Mobile Devices Data exfiltration Workstations harvested for IP and used as mules Command-and-control 3 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 4. Advanced threat prevention solution Rapid, global sharing Identify & control Prevent known threats Detect unknown threats All applications Our unique approach makes us the only solution that…  Scans ALL applications (including SSL traffic) to secure all avenues in/out of a network, reduce the attack surface area, and provide context for forensics  Prevents attacks across ALL attack vectors (exploit, malware, DNS, command & control, and URL) with content-based signatures  Detects zero day malware & exploits using public/private cloud and automatically creates signatures for global customer base
  • 5. Wildfire Service Architecture and Security measure 5 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 6. WildFire Architecture 6 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 7. Security Measures to protect customers  Device administrators have control over what session information is sent to the cloud, so users can maintain compliance with local laws and regulations  PANOS 5.0/6.0 Device -> Setup –> Wildfire 7 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 8. Cloud Security: Behind the Scenes  Industry best practices to protect customer data within the cloud infrastructure  Data protection, HA and data privacy 8 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 9. Cloud Security: Behind the Scenes  All communication between customer firewalls and the WildFire cloud occurs between the customer firewall and the WildFire cloud’s nearest Amazon EC2 server  Communication between customer firewalls and the Amazon EC2 server is encrypted using HTTPS/SSL encryption  Clientside and server-side certificates signed by Palo Alto Networks’ Certificate Authority (CA) ensure that Palo Alto Networks firewalls will only connect to a valid WildFire cloud instance and vice-versa. 9 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 10. Performance impact on Control Plane  Test environment  PA-5060 1 vsys  100 security policies with Antivirus, threat prevention, and URL filtering, and WildFire forwarding was enabled on select policies such that the average rate of forwarding to the WildFire cloud was approximately 2 samples per second  A traffic load of approximately 16Gbps over 9 different protocols  Management plane CPU utilization was captured during both tests over a 60 second period and averaged per CPU core. 10 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 11. Configuring Wildfire 11 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 12. File forwarding capacity 12 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 13. Check licenses PANOS 5.0/6.0  Device -> License tab Basic WildFire PAN-OS 5.0 PAN-OS 6.0 WildFire Subscription WF-500 PAN-OS 5.0 PAN-OS 6.0 ✓ ✓ Public Cloud ✓ ✓ ✓ WF-500 support ✓ ✓ N/A API access ✓ ✓ Public Cloud ✓ ✓ ✓ PDF ✓ ✓ Office Documents ✓ ✓ Java ✓ ✓ 30 minute signatures ✓ Integrated logging Windows PE (DLL & EXE) ✓ ✓ Windows XP ✓ ✓ ✓ ✓ ✓ Windows 7 ✓ ✓ ✓ ✓ ✓ Android APK 13 | ©2012, Palo Alto Networks. Confidential and Proprietary. ✓
  • 14. Add File Blocking profile  PANOS 5.0/6.0  Objects -> Security Profiles -> File Blocking 14 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 15. Add rule to File Blocking profile  Click Add to add file forwarding rule  Action  Forward - The file is automatically sent to WildFire.  continue-and-forward—A continue page is presented, and the file is sent to WildFire (combines the continue and forwardactions). This action only works with web-based traffic. This is due to the fact that a user must click continue before the file will be forward and the continue response page option is only available with http/https. 15 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 16. Add rule to File Blocking profile - continue  Optional  Click Add to add rule to monitor other file types  Click OK 16 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 17. Apply the File Blocking profile in Policies  Go to Policies -> Security  Choose the security policy that you want to inspect for Wildfire  Normally security policy that controls inside to outside  Attach the File Blocking profile to the security policy 17 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 18. Check connectivity  Execute “test wildfire registration”  Note: Do not use PING to test connectivity to the server. Ping requests are disabled on the Wildfire server. 18 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 19. Verify  To verify, if any files have been forwarded to the server, use the following command: show wildfire status  The total file forwarded counter will provide the number of files being forwarded to the server. 19 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 20. To view Wildfire Logs  Note : PANOS 5.0 users with no Wildifre license do not have the ability to view Wildfire logs from the firewall. You need to go to https://wildifre.paloaltonetworks.com  Monitor -> Wildfire Submissions for PANOS 6.0  Monitor -> Wildfire for PANOS 5.0 20 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 21. To view Wildfire Logs - continue  For PANOS 5.0 users without Wildfire license, Data Filtering logs can be used to check the status of the file , here are the three actions available:  If you only see “forward” with no “wildfire-upload-success” or “wildfireupload-skip”, means that it is either signed by a trusted file signer, or it is benign sample that the cloud has already seen.  Forward  Data plane detected a Potentially Executable file on a Wildfire-enabled policy. The file is buffered in the management plane.  wildfire-upload-success  This means that the file wasn't signed by a trusted signer, and the file hasn't yet been seen by the cloud. In this case, the file (and session info) was uploaded to the cloud for analysis. 21 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 22. To view Wildfire Logs - continue  wildfire-upload-skip  This means that the file was already seen by the cloud, but the file was confirmed to be malware. The device skips the file but still sends the session info for logging purposes.  Note : Not every download will be visible in the Dashboard reports. The WildFire Dashboard reports will remain blank until an unknown file is uploaded to the cloud. 22 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 23. To show statistics  Execute “ show wildfire statistics”  https://live.paloaltonetworks.com/docs/DOC-5097 23 | ©2012, Palo Alto Networks. Confidential and Proprietary.
  • 24. An Integrated Approach to Threat Coordinated Threat Prevention Prevention Bait the end-user Exploit Download Backdoor Establish Back-Channel App-ID Block high-risk apps Block C&C on non-standard ports URL Block known malware sites Explore & Steal Block malware, fast-flux domains Spyware AV Threat License IPS Block the exploit Block spyware, C&C traffic Block malware Files WildFire 24 | ©2012, Palo Alto Networks. Confidential and Proprietary. Prevent drive-bydownloads Detect unknown malware Block new C&C traffic Coordinated intelligence to detect and block active attacks based on signatures, sources and behaviors
  • 25. WildFire Coverage Report Request your report to see:  The number of detected malware samples  Which samples would have been prevented by WildFire  The percent of increased signature coverage with WildFire 25 | ©2013, Palo Alto Networks. Confidential and Proprietary.