<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildfire Malware Domain &amp; Palo-Alto Malware Domain Do Not Agree in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-malware-domain-palo-alto-malware-domain-do-not-agree/m-p/48292#M35539</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone who has been using Wildfire encountered a case where a piece of Malware identified via the WF assessment has had the following in the summary:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-family: 'Calibri','sans-serif'; font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-GB; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;Malware came from a malware domain&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where the applicable URL category returned by Palo (Brightcloud online URL lookup) does not recognise it as a malware hosting domain?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that the different services use different backend databases - but it's a bit annoying that there is a 'signature' (URL) available that would have prevented the download in 'one hand' that isn't being made available to the other hand!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Jul 2012 13:21:30 GMT</pubDate>
    <dc:creator>apackard</dc:creator>
    <dc:date>2012-07-16T13:21:30Z</dc:date>
    <item>
      <title>Wildfire Malware Domain &amp; Palo-Alto Malware Domain Do Not Agree</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-malware-domain-palo-alto-malware-domain-do-not-agree/m-p/48292#M35539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone who has been using Wildfire encountered a case where a piece of Malware identified via the WF assessment has had the following in the summary:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-family: 'Calibri','sans-serif'; font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-GB; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;Malware came from a malware domain&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where the applicable URL category returned by Palo (Brightcloud online URL lookup) does not recognise it as a malware hosting domain?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that the different services use different backend databases - but it's a bit annoying that there is a 'signature' (URL) available that would have prevented the download in 'one hand' that isn't being made available to the other hand!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 13:21:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-malware-domain-palo-alto-malware-domain-do-not-agree/m-p/48292#M35539</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2012-07-16T13:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Malware Domain &amp; Palo-Alto Malware Domain Do Not Agree</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-malware-domain-palo-alto-malware-domain-do-not-agree/m-p/48293#M35540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just guessing here but since PA is working on their own url category db to replace Brightcloud (I think this year already) then the db used in wildfire is the new PA db where the PA devices mostly use Brightcloud db today (I guess the new db is to be released for PANOS 5.0)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another idea might be how the resolution is performed - will Brightcloud check the full url and not just the domain part (Im thinking in case wildfire checks the full url like one folder on a webserver can be classified as malware while another folder is classified as something else)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But yeah I agree, would be nice if any bad urls known by wildfire could be pushed out to the regular url-db so customers who doesnt run wildfire can take advantage of this (for example if you block access to url category "malware") but also so the bad malware isnt downloaded by the client at all (because stuff that hits wildfire has been downloaded by the clients).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 18:30:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-malware-domain-palo-alto-malware-domain-do-not-agree/m-p/48293#M35540</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-07-16T18:30:45Z</dc:date>
    </item>
  </channel>
</rss>

