<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: False Positive Virus in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3920#M2881</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, as part of my ticket I had included the .pcap file from one of the "threats".&amp;nbsp; The issue is still happening, but the bizarre thing is only happening with a few users, most of the users have been able to do updates, myself included.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the Wildfire that is what I thought from reading about it in the forums, but the fact there was no traffic reported for anything for 8 days had me a little concerned.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Oct 2012 16:07:11 GMT</pubDate>
    <dc:creator>rgreens</dc:creator>
    <dc:date>2012-10-11T16:07:11Z</dc:date>
    <item>
      <title>False Positive Virus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3917#M2878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We use Total Defense for an antivirus program.&amp;nbsp; It appears that one of the executable (both the 32 bit and 64 bit versions) in the latest update is being flagged as a virus, Virus/Win32.WGeneric.bnrd, the other executable files are fine.&amp;nbsp; When I look at the Data Filtering log for Wildfire I see it says that it was forwarded.&amp;nbsp; But when I look at the Wildfire report there is no report of that specific executable in the history and I don't see any files in Wild Fire reports in the last 7 days.&amp;nbsp; So I believe I have a two fold issue, one the false positive doesn't allow our users to the the latest update and the fact nothing seems to be reaching Wildfire.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I opened a ticket 8 days ago when I first saw the problem, but they want a copy of the executable.&amp;nbsp; Unfortunately I can't find it because it is never getting to Wildfire and the installation files are inside a .pkg file and can't find a way to extract it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 11:45:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3917#M2878</guid>
      <dc:creator>rgreens</dc:creator>
      <dc:date>2012-10-11T11:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive Virus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3918#M2879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;A "forward" action simply means that the WildFire action was taken for the file, but didn't result in an actual file upload (because it was a trusted file, or WildFire has already seen the file).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;For the false positive issue, you can enable "Data Capture" on data filtering setting and get the file. Or if the issue is reproducible, you can have captures at firewall, initiate anti-virus update and attach those pcaps to the case you opened earlier. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Also on the same note, &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; "wildfire-upload-success" means the file was actually uploaded to the cloud because the cloud had not seen the file before, and it wasn't signed by a trusted signer.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12px; background-color: #ffffff; font-family: Arial, Helvetica, sans-serif;"&gt;Hope this helps.Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 13:24:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3918#M2879</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2012-10-11T13:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive Virus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3919#M2880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The detailed issue is documented at the following link indicating as an expected behavior.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-3369"&gt;https://live.paloaltonetworks.com/docs/DOC-3369&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 15:00:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3919#M2880</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-10-11T15:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive Virus</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3920#M2881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, as part of my ticket I had included the .pcap file from one of the "threats".&amp;nbsp; The issue is still happening, but the bizarre thing is only happening with a few users, most of the users have been able to do updates, myself included.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the Wildfire that is what I thought from reading about it in the forums, but the fact there was no traffic reported for anything for 8 days had me a little concerned.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 16:07:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/false-positive-virus/m-p/3920#M2881</guid>
      <dc:creator>rgreens</dc:creator>
      <dc:date>2012-10-11T16:07:11Z</dc:date>
    </item>
  </channel>
</rss>

