<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildfire - Time required to block known malware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17697#M12891</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes - I've checked the portal and it is VERY malicious (turning off IE phishing protection, disabling the firewall etc)!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I understand that some malware is polymorphic and will change it's binary fingerprint, the fact that this was a &lt;EM&gt;skipped&lt;/EM&gt; upload means that it must have been seen before in it's current "guise" and I can only assume that it would have looked just as malicious previously (I can;t see why not).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As we haven't had a upload for 4 days (and the most likely EXE upload was at least 12 days ago) that seems to suggest that no AV signature has been released in the previous 2 weeks that should have triggered on the re-download (or the signature released failed to match it properly?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Feb 2013 17:56:32 GMT</pubDate>
    <dc:creator>apackard</dc:creator>
    <dc:date>2013-02-18T17:56:32Z</dc:date>
    <item>
      <title>Wildfire - Time required to block known malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17695#M12889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using the 'free' Wildfire service, does anyone know how long should I expect the delay to be before downloads marked as malware are blocked subsequently?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, today we had a download ("pdf_delta_ticket.scr" below) that was logged as &lt;STRONG&gt;upload-skip&lt;/STRONG&gt; which to my knowledge means that it has been seen before by this device.&amp;nbsp; As the last previous &lt;STRONG&gt;upload-success&lt;/STRONG&gt; was ~6 days previously (and as it was a DLL it almost certainly wasn't the original download) this seems to suggest that the time taken is more than a few days (we download and install AV updates daily).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5667_pastedImage_1.png" style="width: 1200px; height: 256px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 17:24:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17695#M12889</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2013-02-18T17:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire - Time required to block known malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17696#M12890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whenever a new file is sent to wildfire it is analyzed for various malicious behaviors. You can login to your wildfire portal to check the status of your files i.e only if it is found to be malicious an av signature is created and released. So have you had a chance to look at your wildfire portal @ &lt;A href="https://wildfire.paloaltonetworks.com/Wildfire" style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #316989; background-color: #ffffff;" title="https://wildfire.paloaltonetworks.com/Wildfire"&gt;https://wildfire.paloaltonetworks.com/Wildfire&lt;/A&gt; .&lt;/P&gt;&lt;P&gt;Also refer the following documents:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3555"&gt;WildFire Decision Flow&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3252"&gt;How to Configure Wildfire&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Subijith Raghunandan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 17:44:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17696#M12890</guid>
      <dc:creator>sraghunandan</dc:creator>
      <dc:date>2013-02-18T17:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire - Time required to block known malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17697#M12891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes - I've checked the portal and it is VERY malicious (turning off IE phishing protection, disabling the firewall etc)!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I understand that some malware is polymorphic and will change it's binary fingerprint, the fact that this was a &lt;EM&gt;skipped&lt;/EM&gt; upload means that it must have been seen before in it's current "guise" and I can only assume that it would have looked just as malicious previously (I can;t see why not).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As we haven't had a upload for 4 days (and the most likely EXE upload was at least 12 days ago) that seems to suggest that no AV signature has been released in the previous 2 weeks that should have triggered on the re-download (or the signature released failed to match it properly?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 17:56:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17697#M12891</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2013-02-18T17:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire - Time required to block known malware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17698#M12892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;However - having checked the flowchart in the referenced documents (thanks) I note that the hash check is actually performed in the Palo cloud, not on the PA device - so I guess this means that it is not dependent on the previous upload from our network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Feb 2013 18:09:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-time-required-to-block-known-malware/m-p/17698#M12892</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2013-02-18T18:09:46Z</dc:date>
    </item>
  </channel>
</rss>

