<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Advanced WildFire Inline ML - Processing Flow in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-wildfire-inline-ml-processing-flow/m-p/553375#M1706</link>
    <description>&lt;P&gt;Hello John_J,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming you are referring to the Wildfire Inline ML (configured in the AV profile), I am not aware of some size limit : the file is checked real time by the firewall against its ML model.&lt;BR /&gt;Then a file blocked would still be sent to Wildfire to check (update ML model if needed). At that stage, I guess you can have the size limit.&lt;BR /&gt;&lt;BR /&gt;Regarding the email, I guess you are more referring to the inline URL categorisation.&lt;BR /&gt;I am not sure if the email is inspected, but the actual query (once someone click on the link) to the URL would be blocked by the firewall thanks to the URL filtering.&lt;BR /&gt;Also, we have prepared a PANCast episode to discuss about phishing and the countermeasure on PAN-OS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update :&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/pancast-episode-25-phishing-emails-and-relevant-threat/ta-p/550121" target="_blank"&gt;https://live.paloaltonetworks.com/t5/pancast/pancast-episode-25-phishing-emails-and-relevant-threat/ta-p/550121&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
    <pubDate>Mon, 04 Sep 2023 08:10:18 GMT</pubDate>
    <dc:creator>ozheng</dc:creator>
    <dc:date>2023-09-04T08:10:18Z</dc:date>
    <item>
      <title>Advanced WildFire Inline ML - Processing Flow</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-wildfire-inline-ml-processing-flow/m-p/553130#M1691</link>
      <description>&lt;P&gt;Does anyone know where in this processing flow does Advanced WildFire Inline ML take place.&amp;nbsp; It would be before the file is sent to WildFire Cloud but would the file be inspected before or after checking the file size?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, are email links inspected by Advanced WildFire Inline ML?&amp;nbsp; From my understanding email links use dynamic analysis in WildFire Cloud which isn't the same as Inline ML.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WildFire Flow Diagram.png" style="width: 703px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52627i4ED356F18C86BCFD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="WildFire Flow Diagram.png" alt="WildFire Flow Diagram.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 19:00:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-wildfire-inline-ml-processing-flow/m-p/553130#M1691</guid>
      <dc:creator>John_J</dc:creator>
      <dc:date>2023-08-09T19:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced WildFire Inline ML - Processing Flow</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-wildfire-inline-ml-processing-flow/m-p/553375#M1706</link>
      <description>&lt;P&gt;Hello John_J,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming you are referring to the Wildfire Inline ML (configured in the AV profile), I am not aware of some size limit : the file is checked real time by the firewall against its ML model.&lt;BR /&gt;Then a file blocked would still be sent to Wildfire to check (update ML model if needed). At that stage, I guess you can have the size limit.&lt;BR /&gt;&lt;BR /&gt;Regarding the email, I guess you are more referring to the inline URL categorisation.&lt;BR /&gt;I am not sure if the email is inspected, but the actual query (once someone click on the link) to the URL would be blocked by the firewall thanks to the URL filtering.&lt;BR /&gt;Also, we have prepared a PANCast episode to discuss about phishing and the countermeasure on PAN-OS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Update :&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/pancast/pancast-episode-25-phishing-emails-and-relevant-threat/ta-p/550121" target="_blank"&gt;https://live.paloaltonetworks.com/t5/pancast/pancast-episode-25-phishing-emails-and-relevant-threat/ta-p/550121&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2023 08:10:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/advanced-wildfire-inline-ml-processing-flow/m-p/553375#M1706</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2023-09-04T08:10:18Z</dc:date>
    </item>
  </channel>
</rss>

