<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WildFire Question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5623#M4115</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But doesn't the hash change if the file name changes?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Jun 2014 16:18:51 GMT</pubDate>
    <dc:creator>mrsold</dc:creator>
    <dc:date>2014-06-18T16:18:51Z</dc:date>
    <item>
      <title>WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5619#M4111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have a question about the functionality of WildFire.&amp;nbsp; Here is the scenario (assume we have a WildFire subscription so we are getting updates every 30 minutes):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;User gets an email to download "file.exe" at 0800&lt;/LI&gt;&lt;LI&gt;This hash does not match anything and is sent up to the cloud for analysis.&lt;/LI&gt;&lt;LI&gt;Analysis confirms this file is / has malware - it has not seen this malware before so a new signature is generated - lets say for arguments sake it turns it around fast and is updated at 0830&lt;/LI&gt;&lt;LI&gt;Another user comes in at 0900 and gets the same email with the same link to the same file and clicks the link ... &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will the PA stop that user from downloading that file?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 13:12:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5619#M4111</guid>
      <dc:creator>mrsold</dc:creator>
      <dc:date>2014-06-18T13:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5620#M4112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mrsold,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, PA should stop that user from downloading that file. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few more info for your reference:-&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6589"&gt;WildFire&lt;/A&gt; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; Page no 2 (How Does WildFire Work?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The new &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;signature&lt;/SPAN&gt; will be distributed within 30-60 minutes to all Palo Alto Networks firewalls&amp;nbsp; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;equipped&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; with a WildFire subscription, or the following day as part of the antivirus update for firewalls equipped&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;with&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; a Threat Prevention subscription only.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: C&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;ontinue&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; or continue-and-forward, you can only choose the application web-browsing. If you choose any other application, traffic that matches the security policy will not flow through the firewall due to the fact that the users will not be prompted with a continue page.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 14:37:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5620#M4112</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-18T14:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5621#M4113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Hulk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I'm assuming the hash associated with "file.exe" is hashed and subsequently blocked by WildFire / Threat Prevention - obviously if that same malware were to be packaged in a different exe, say "file1.exe" the process would have to start over...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 15:38:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5621#M4113</guid>
      <dc:creator>mrsold</dc:creator>
      <dc:date>2014-06-18T15:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5622#M4114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN will check the hash of that file, hence not matter, what &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;file name&lt;/SPAN&gt; it is &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;file.exe or file1.exe).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few more info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To verify, if &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;any files&lt;/SPAN&gt; have been forwarded to the server, enter the following command: &lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt; wildfire status &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connection info: &lt;/P&gt;&lt;P&gt;Wildfire cloud: default cloud &lt;/P&gt;&lt;P&gt;Status: Idle &lt;/P&gt;&lt;P&gt;Best server: va-s1.wildfire.paloaltonetworks.com &lt;/P&gt;&lt;P&gt;Device registered: yes &lt;/P&gt;&lt;P&gt;Service route IP address: 192.168.1.1 &lt;/P&gt;&lt;P&gt;Signature verification: enable &lt;/P&gt;&lt;P&gt;Server selection: enable &lt;/P&gt;&lt;P&gt;Through a proxy: no &lt;/P&gt;&lt;P&gt;Forwarding info: &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;file&lt;/SPAN&gt; size limit (MB): 2 &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;file&lt;/SPAN&gt; idle time out (second): 90 &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;total&lt;/SPAN&gt; file forwarded: 0 &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;forwarding&lt;/SPAN&gt; rate (per minute): 0 &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;concurrent&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;files&lt;/SPAN&gt;: 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The total file forwarded counter will provide the number of files being forwarded to the server. Data filtering logs can be used to check the status of the file. Here are the three actions available: &lt;/P&gt;&lt;P&gt;Action-1: Forward but no wildfire-upload-success or wildfire-upload-skip, means the file is either signed by a trusted file signer, or it is a benign sample that the cloud has already seen. Below is an explanation of the different status possibilities. &lt;/P&gt;&lt;P&gt;Forward - Data plane detected a PE (Potentially Executable) file on a WildFire-enabled policy. The PE file is buffered in the management plane. &lt;/P&gt;&lt;P&gt;If only forward is displayed for a specific file, it is either signed by a trusted file signer, or it is a benign sample that the cloud has already seen. In either case, no further action is performed on the file, and no further information is sent to the cloud (not even session information is sent &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;for&lt;/SPAN&gt; previously seen benign files). There will not be an entry in the WildFire Web portal for these files. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 15:58:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5622#M4114</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-18T15:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5623#M4115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But doesn't the hash change if the file name changes?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 16:18:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5623#M4115</guid>
      <dc:creator>mrsold</dc:creator>
      <dc:date>2014-06-18T16:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5624#M4116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mrsold,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN firewall will check the content of the file to calculate hash, not the file name. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; That is the reason, even if you will change the file name/extension still PAN firewall will be identify the same threat. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 16:41:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5624#M4116</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-18T16:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5625#M4117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the same context, can anybody explain this behavior:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sometimes receiving 3 WildFire analysis reports for exactly the same file, same URL the file is residing on, same source and destination, but 3 different hashes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Oct 2014 16:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5625#M4117</guid>
      <dc:creator>MMCiobanu</dc:creator>
      <dc:date>2014-10-08T16:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire Question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5626#M4118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They're repacking their malware file so it avoids signature matching security engines?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Oct 2014 10:57:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-question/m-p/5626#M4118</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2014-10-22T10:57:09Z</dc:date>
    </item>
  </channel>
</rss>

