<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble differentiating between malware already seen by WildFire and malware 'first seen' by Wil in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/63328#M38119</link>
    <description>&lt;P&gt;In addition to what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic﻿&lt;/a&gt;&amp;nbsp;said, you should have a look at WildFire Submissions log. By default it will only display malicious files that were uploaded to the cloud, from which we can conclude that those files have not been previously seen by the WF cloud, were not blocked and made it through to your network.&lt;/P&gt;&lt;P&gt;You can also turn on option Device &amp;gt; Setup &amp;gt; Wildfire &amp;gt; Report benign files. With this option enabled Wildfire Submissions log wil also display Benign files which were uploaded to the cloud.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Aug 2015 06:08:59 GMT</pubDate>
    <dc:creator>mvidic</dc:creator>
    <dc:date>2015-08-19T06:08:59Z</dc:date>
    <item>
      <title>Trouble differentiating between malware already seen by WildFire and malware 'first seen' by WildFire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/27722#M20213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm having trouble determining which malware has already been seen by WildFire (therefore it was not re-sent for analysis and blocked by the FW) vs. a file that our organization sent to WF and was determined to be malicious after analysis (not seen before by WF) . This would significantly help our organization respond to malicious files that may have made it to internal systems (mail servers, desktop, etc). Right now, I go into the analysis report and look at the first seen date... I know there's a better way. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Aug 2015 15:45:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/27722#M20213</guid>
      <dc:creator>r_gine</dc:creator>
      <dc:date>2015-08-06T15:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble differentiating between malware already seen by WildFire and malware 'first seen' by WildFire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/27723#M20214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello r_gine,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a file has already been seen by wildfire then it will show as wildfire skip in the log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Aug 2015 20:49:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/27723#M20214</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2015-08-07T20:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble differentiating between malware already seen by WildFire and malware 'first seen' by WildFire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/27724#M20215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In Data Filtering log: &lt;/P&gt;&lt;P&gt;- action 'wildfire-upload-success' means file was first seen by your device, &lt;/P&gt;&lt;P&gt;- &lt;SPAN style="font-size: 13.3333330154419px;"&gt;action 'wildfire-upload-skip' means file was already known to WF&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, unfortunately you need to look in 2 log files to see if it was malicious and if you were first to see it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Aug 2015 11:20:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/27724#M20215</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-08-10T11:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble differentiating between malware already seen by WildFire and malware 'first seen' by Wil</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/63328#M38119</link>
      <description>&lt;P&gt;In addition to what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic﻿&lt;/a&gt;&amp;nbsp;said, you should have a look at WildFire Submissions log. By default it will only display malicious files that were uploaded to the cloud, from which we can conclude that those files have not been previously seen by the WF cloud, were not blocked and made it through to your network.&lt;/P&gt;&lt;P&gt;You can also turn on option Device &amp;gt; Setup &amp;gt; Wildfire &amp;gt; Report benign files. With this option enabled Wildfire Submissions log wil also display Benign files which were uploaded to the cloud.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 06:08:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-differentiating-between-malware-already-seen-by-wildfire/m-p/63328#M38119</guid>
      <dc:creator>mvidic</dc:creator>
      <dc:date>2015-08-19T06:08:59Z</dc:date>
    </item>
  </channel>
</rss>

