<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identifying files that were 'allowed' but are know known to be malicious in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64179#M38533</link>
    <description>&lt;P&gt;You are correct. Malicious files visible in the WildFire submission logs should mean that they were allowed thorugh the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please note that wildfire-upload-skip doesn't necesseriaily mean that file will be blocked by AV profile. W&lt;SPAN&gt;ildfire-upload-skip only means that file was already uploaded to the cloud. There could be some scenarios when the file won't be uploaded because it is already being analyzed by the cloud but will not be blocked because verdict is not yet available or FW hasn't been updated yet.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Sep 2015 10:16:10 GMT</pubDate>
    <dc:creator>mvidic</dc:creator>
    <dc:date>2015-09-04T10:16:10Z</dc:date>
    <item>
      <title>Identifying files that were 'allowed' but are now known to be malicious</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64067#M38485</link>
      <description>&lt;P&gt;Wondering how others are tracking down files that were allowed through the firewall but later determined to be malicious (as a result of WF analysis)&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2015 16:57:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64067#M38485</guid>
      <dc:creator>r_gine</dc:creator>
      <dc:date>2015-09-03T16:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying files that were 'allowed' but are know known to be malicious</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64081#M38493</link>
      <description>&lt;P&gt;In my experience malicious files are usualy downloaded via http or sent by email.&lt;/P&gt;&lt;P&gt;In case of direct http access you can easily find the potentialy infected host easily from PA logs. In case of proxy access it is necessary to determine the end host from proxy server logs. PAN-OS 7.0 offers some extended XFF features and should be possible to read the end host directly from PA logs although I haven't tested it in production. In case of malicious email attachements it is necessary to determine end meilbox from the mail server logs.&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2015 06:12:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64081#M38493</guid>
      <dc:creator>mvidic</dc:creator>
      <dc:date>2015-09-03T06:12:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying files that were 'allowed' but are know known to be malicious</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64121#M38511</link>
      <description>&lt;P&gt;Thanks -- I don't think I was very clear in asking my question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For this example, let's consider the case of an SMTP message with an attachment (Word Doc). (assuming the Palo is configured to forward all file types to the WildFire public cloud for malware analysis)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. If the data filtering log were to show 'wildfire-upload-skip', one could conclude that that file (hash) had been previously seen by WildFire. The file would &lt;U&gt;not&lt;/U&gt; be uploaded to WildFire for analysis. If that file was deemed do be malicious by WildFire, the file would be 'Denied' and probably recieve a 'subtype' of 'wildfire-virus'.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. If the data filtering log were to show 'wildfire-upload-success', one could conclude that the file had not seen before by WildFire &amp;nbsp;and that the file would allowed through the filewall (and on to the e-mail gateway and mail server). &lt;STRONG&gt;At this point, I want to know if that file/hash comes back from WF categorized as 'malicious'.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are not logging 'benign' results from WildFire. I made the&amp;nbsp;assumption&amp;nbsp;that&amp;nbsp;when I look in&amp;nbsp;the 'WildFire Submission' log, those would show me the WF submissions that returned as malicious (and had been previously allowed through into the net work) however when I search for those files in my mail server and gateway, they're not there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2015 14:22:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64121#M38511</guid>
      <dc:creator>r_gine</dc:creator>
      <dc:date>2015-09-03T14:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: Identifying files that were 'allowed' but are know known to be malicious</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64179#M38533</link>
      <description>&lt;P&gt;You are correct. Malicious files visible in the WildFire submission logs should mean that they were allowed thorugh the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please note that wildfire-upload-skip doesn't necesseriaily mean that file will be blocked by AV profile. W&lt;SPAN&gt;ildfire-upload-skip only means that file was already uploaded to the cloud. There could be some scenarios when the file won't be uploaded because it is already being analyzed by the cloud but will not be blocked because verdict is not yet available or FW hasn't been updated yet.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2015 10:16:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identifying-files-that-were-allowed-but-are-now-known-to-be/m-p/64179#M38533</guid>
      <dc:creator>mvidic</dc:creator>
      <dc:date>2015-09-04T10:16:10Z</dc:date>
    </item>
  </channel>
</rss>

