<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question about Wildfire signature updates in Palo Alto Active-Passive mode. in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/question-about-wildfire-signature-updates-in-palo-alto-active/m-p/1246012#M6613</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109787"&gt;@Kyungsoo-Choi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="163" data-end="592"&gt;I would first ask the customer to clarify how they believe content updates are being synchronized from the passive firewall to the active firewall, or to verify that this is actually happening. Content updates are &lt;STRONG&gt;NOT&amp;nbsp;&lt;/STRONG&gt;synchronized via HA. Only configuration elements (policies, objects, settings) are synchronized. Dynamic updates such as App-ID, Threat, AV, and WildFire are installed independently on each firewall.&lt;/P&gt;
&lt;P data-start="163" data-end="592"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="594" data-end="969"&gt;From a best-practice standpoint, there’s no requirement to install content updates on the passive firewall first and then the active firewall. The recommended approach is to install content updates on both the active and passive firewalls so they remain on the same content version. This ensures consistent security enforcement and predictable behavior during a failover.&lt;/P&gt;
&lt;P data-start="594" data-end="969"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="971" data-end="1096"&gt;Using scheduled content updates (optionally with an install threshold) on both HA peers is the best way to keep them aligned. For example, Advanced WildFire is designed to provide near real-time threat protection, and best practice is to configure &lt;STRONG data-start="1270" data-end="1309"&gt;real-time &lt;/STRONG&gt;WildFire updates. This ensures the firewall retrieves signatures for newly discovered malware as soon as they are published to the WildFire public cloud.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Jan 2026 13:14:58 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2026-01-20T13:14:58Z</dc:date>
    <item>
      <title>Question about Wildfire signature updates in Palo Alto Active-Passive mode.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/question-about-wildfire-signature-updates-in-palo-alto-active/m-p/1245995#M6612</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Currently, the customer has a configuration where signature updates are performed on the passive device and then synchronized with the active device.&lt;BR /&gt;In this configuration, is it appropriate to perform signature updates on the active device?&lt;BR /&gt;Or what are the recommended settings for Palo Alto Active-Passive Mode?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 09:05:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/question-about-wildfire-signature-updates-in-palo-alto-active/m-p/1245995#M6612</guid>
      <dc:creator>Kyungsoo-Choi</dc:creator>
      <dc:date>2026-01-20T09:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Question about Wildfire signature updates in Palo Alto Active-Passive mode.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/question-about-wildfire-signature-updates-in-palo-alto-active/m-p/1246012#M6613</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109787"&gt;@Kyungsoo-Choi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="163" data-end="592"&gt;I would first ask the customer to clarify how they believe content updates are being synchronized from the passive firewall to the active firewall, or to verify that this is actually happening. Content updates are &lt;STRONG&gt;NOT&amp;nbsp;&lt;/STRONG&gt;synchronized via HA. Only configuration elements (policies, objects, settings) are synchronized. Dynamic updates such as App-ID, Threat, AV, and WildFire are installed independently on each firewall.&lt;/P&gt;
&lt;P data-start="163" data-end="592"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="594" data-end="969"&gt;From a best-practice standpoint, there’s no requirement to install content updates on the passive firewall first and then the active firewall. The recommended approach is to install content updates on both the active and passive firewalls so they remain on the same content version. This ensures consistent security enforcement and predictable behavior during a failover.&lt;/P&gt;
&lt;P data-start="594" data-end="969"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="971" data-end="1096"&gt;Using scheduled content updates (optionally with an install threshold) on both HA peers is the best way to keep them aligned. For example, Advanced WildFire is designed to provide near real-time threat protection, and best practice is to configure &lt;STRONG data-start="1270" data-end="1309"&gt;real-time &lt;/STRONG&gt;WildFire updates. This ensures the firewall retrieves signatures for newly discovered malware as soon as they are published to the WildFire public cloud.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 13:14:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/question-about-wildfire-signature-updates-in-palo-alto-active/m-p/1246012#M6613</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2026-01-20T13:14:58Z</dc:date>
    </item>
  </channel>
</rss>

