<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WildFire - What sort of hit rate do you see? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41981#M30861</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Last thursday one of our firewalls had 26 wildfire submissions that were determined to be malware - all coming in thru email.&amp;nbsp;&amp;nbsp; That is probably a record, some days it is just a few.&amp;nbsp; Note these were all PE files.&amp;nbsp;&amp;nbsp; Seeing as nobody should really be getting executables thru email I decided to block them which means less work for me.&amp;nbsp; However, I also would still like to send them off to wildfire if possible so if they are bad it will help out all the other palo users,&amp;nbsp; I just posted a question on how to do that if possible in these forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is really interesting to go to the virus total link and see how many of the top av products have detected what wildfire finds - it seems most of the av products take a few days to detect something after wildfire has detected it for me.&amp;nbsp; Not to mention I might then see 3 or 4 variants with the same file name but different md5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be interesting once I add office docs and pdf files into the mix - just testing them now.&amp;nbsp; I would be curious how many people using wildfire detect malware infected office and pdf docs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Apr 2014 14:38:38 GMT</pubDate>
    <dc:creator>mikeberk</dc:creator>
    <dc:date>2014-04-28T14:38:38Z</dc:date>
    <item>
      <title>WildFire - What sort of hit rate do you see?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41979#M30859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I enabled WildFire a month or so back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know it works as I download files regularly from the PAN "random wildfire test file" site and sure enough a little while later an alert pings in and it shows in the dashboard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In production it seems that &lt;STRONG&gt;&lt;EM&gt;everything&lt;/EM&gt;&lt;/STRONG&gt; that my users download is either from trusted sources or has checksummed as clean - in theory this is a good thing and we are a corporate so I wouldn't expect people to be downloading "&lt;EM&gt;bad stuff&lt;/EM&gt;", but I guess I almost expected to see a little more stuff being downloaded that would be sent to WildFire.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wondered how everyone else finds the service and if there are any recommended ways to test it other than the Palo Alto test site?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Apr 2014 13:03:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41979#M30859</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2014-04-27T13:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire - What sort of hit rate do you see?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41980#M30860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you can trust that if the files all match the checksum they have been verified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a test you could create a brand new file and post this to a g-drive or dropbox then download it via your configured policies.&amp;nbsp; Since you created the file yourself from scratch it would not be in any of the wildfire previous scans.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Apr 2014 18:01:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41980#M30860</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-04-27T18:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire - What sort of hit rate do you see?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41981#M30861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Last thursday one of our firewalls had 26 wildfire submissions that were determined to be malware - all coming in thru email.&amp;nbsp;&amp;nbsp; That is probably a record, some days it is just a few.&amp;nbsp; Note these were all PE files.&amp;nbsp;&amp;nbsp; Seeing as nobody should really be getting executables thru email I decided to block them which means less work for me.&amp;nbsp; However, I also would still like to send them off to wildfire if possible so if they are bad it will help out all the other palo users,&amp;nbsp; I just posted a question on how to do that if possible in these forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is really interesting to go to the virus total link and see how many of the top av products have detected what wildfire finds - it seems most of the av products take a few days to detect something after wildfire has detected it for me.&amp;nbsp; Not to mention I might then see 3 or 4 variants with the same file name but different md5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be interesting once I add office docs and pdf files into the mix - just testing them now.&amp;nbsp; I would be curious how many people using wildfire detect malware infected office and pdf docs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 14:38:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41981#M30861</guid>
      <dc:creator>mikeberk</dc:creator>
      <dc:date>2014-04-28T14:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire - What sort of hit rate do you see?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41982#M30862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That makes sense in our case Mike - we don't use wildfire on inbound email &lt;STRONG&gt;&lt;EM&gt;but&lt;/EM&gt;&lt;/STRONG&gt; we quarantine anything executable at the gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may try enabling wildfire on our inbound SMTP rule as that should catch some nasties.. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Apr 2014 14:43:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-what-sort-of-hit-rate-do-you-see/m-p/41982#M30862</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2014-04-28T14:43:42Z</dc:date>
    </item>
  </channel>
</rss>

