<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WildFire and File blocking in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/566880#M114545</link>
    <description>&lt;P&gt;So I can use file blocking profile without WF subscription?&lt;/P&gt;</description>
    <pubDate>Thu, 23 Nov 2023 14:06:51 GMT</pubDate>
    <dc:creator>ramakrishnan.v05</dc:creator>
    <dc:date>2023-11-23T14:06:51Z</dc:date>
    <item>
      <title>WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/376852#M89342</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm new to Palo Alto and I've seen documents where File blocking is used in addition with the WildFire analysis. So, any files which is blocked won't be forwarded to WildFire and the action which is set to 'continue/alert' will be continue forwarding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in my organization I've seen file blocking isn't applied to any security policy while wildfire analysis is set to application and files 'any' to the public cloud and its attached to the security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. My question is, what would the Wildfire achieve with/without the file blocking profile?&lt;/P&gt;&lt;P&gt;2. How does the AV profile works with the WildFire policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please assist? Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 17:15:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/376852#M89342</guid>
      <dc:creator>nsrini1991</dc:creator>
      <dc:date>2020-12-31T17:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377611#M89360</link>
      <description>&lt;P&gt;WildFire and file blocking are independent from eachother, so WildFire can function without a file blocking profile and vice versa.&lt;/P&gt;&lt;P&gt;The only caveat, as you mention, is that if you block a file WildFire won't be able to send it up for analysis.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once WildFire finds a malicious file, a signature is immediately created for the WildFire dynamic updates. Every 24 hours the most prominent WildFire signatures are also rolled up into the daily AV update, so:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-all actions taken based on the outcome from a WildFire analysis are in fact performed by the AV/AS profiles&lt;/P&gt;&lt;P&gt;-the WildFire profile itself is only used for uploading, not prevention&lt;/P&gt;&lt;P&gt;- file blocking is an additional profile that simply decides which file types to allow or block (like opening/blocking a port or application)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 10:50:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377611#M89360</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-01-04T10:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377652#M89369</link>
      <description>&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First of all, I'd like to thank you for your wonderful book 'Mastering the Palo Alto networks' which is very informative and helpful for the beginners like me to nourish our skills on Palo Alto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under Monitor -&amp;gt; Wild fire submissions, I see Malicious is being marked as 'blocked'. From the below, I believe AV is the one which is going to block the viruses and not the Wild Fire. Please correct me if I'm wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Assuming no wildfire license in place and through AV updates, will it be automatically blocked in next 24hours?&lt;/P&gt;&lt;P&gt;2. Will it block only if it's set to 'reset-both' under AV/Wildfire action or it'll block automatically if the action is set to 'default or alert' in the AV profile?&lt;/P&gt;&lt;P&gt;3. In AV profile, I see only HTTP, FTP, SMB, SMTP and POP3. What if any files which are malicious are transferred through SFTP and so on, which isn't part of the AV decoders?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 16:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377652#M89369</guid>
      <dc:creator>nsrini1991</dc:creator>
      <dc:date>2021-01-04T16:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377737#M89381</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Let me try to explain. One thing to remember is that WildFire is the zero day file analysis. If you dont have a license, i would highly suggest you get one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Assuming no wildfire license in place and through AV updates, will it be automatically blocked in next 24hours?&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Correct, once WildFire flags it, it will eventually make its way into the AV definitions.&lt;/P&gt;
&lt;P&gt;2. Will it block only if it's set to 'reset-both' under AV/Wildfire action or it'll block automatically if the action is set to 'default or alert' in the AV profile?&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Make sure your profiles are set to reset-both, otherwise it will be allowed.&lt;/P&gt;
&lt;P&gt;3. In AV profile, I see only HTTP, FTP, SMB, SMTP and POP3. What if any files which are malicious are transferred through SFTP and so on, which isn't part of the AV decoders?&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;So these are just protocols not file types.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClZ5CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClZ5CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 19:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377737#M89381</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-01-04T19:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377962#M89418</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for taking your time to reply to this conversation. Final one and sorry if it's dumb.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What if any malicious files are traversing through SFTP protocol will it be blocked as only FTP, HTTP, HTTPS application/protocols are specified?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 14:22:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377962#M89418</guid>
      <dc:creator>nsrini1991</dc:creator>
      <dc:date>2021-01-05T14:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377969#M89423</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Not a bad question at all. Since in SFTP the traffic is encrypted, the PAN can only read the headers of the packet. So in this case, it is possible that the malicious file can be transferred past the PAN. However if you employ SSL decryption to the traffic, the PAN can see the whole file. If the file is password protected, you'll need to use another program at the OS layer to protect your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:14:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/377969#M89423</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-01-05T15:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/427443#M94606</link>
      <description>&lt;P&gt;Great question.&amp;nbsp; SFTP actually uses SSH for encryption.&amp;nbsp; App-ID recognizes it as SSH.&amp;nbsp; However, it is not FTP over SSH.&amp;nbsp; The protocol is different.&amp;nbsp; If PANW added the SFTP protocol to AV, it could be scanned if SSH Proxy were configured.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 23:42:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/427443#M94606</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-08-17T23:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/566880#M114545</link>
      <description>&lt;P&gt;So I can use file blocking profile without WF subscription?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2023 14:06:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/566880#M114545</guid>
      <dc:creator>ramakrishnan.v05</dc:creator>
      <dc:date>2023-11-23T14:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/567544#M114622</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/238430"&gt;@ramakrishnan.v05&lt;/a&gt;&amp;nbsp;yes you can&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 10:15:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/567544#M114622</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-11-29T10:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire and File blocking</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/567547#M114624</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I thought I replied, but I guess I didn't.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 10:22:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-and-file-blocking/m-p/567547#M114624</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-11-29T10:22:37Z</dc:date>
    </item>
  </channel>
</rss>

