<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildfire query in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5739#M4195</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How long will wildfire do the analyze malicious behavior?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Jul 2013 10:30:43 GMT</pubDate>
    <dc:creator>TSPI</dc:creator>
    <dc:date>2013-07-22T10:30:43Z</dc:date>
    <item>
      <title>Wildfire query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5739#M4195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How long will wildfire do the analyze malicious behavior?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 10:30:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5739#M4195</guid>
      <dc:creator>TSPI</dc:creator>
      <dc:date>2013-07-22T10:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5740#M4196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For example, wildfire detected an unusual behavior of application then it send something on the wildfire cloud. If the client have a subscription for 30 to 60 minutes update. How long can wildfire send a patch for that application on the end-user? or i mean how long does wildfire cloud can evaluate the application as malware or threat? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 14:28:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5740#M4196</guid>
      <dc:creator>TSPI</dc:creator>
      <dc:date>2013-07-22T14:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5741#M4197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With Wildfire Subscription on OS-5.0 ,Wildfire Updates can be delivered to all WildFire subscribers within one hour.&lt;/P&gt;&lt;P&gt;To verify ,navigate to Device&amp;gt;Dynamic Updates and check the Release Date timestamp&amp;nbsp; for Wildfire on the WebUI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 15:05:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5741#M4197</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-22T15:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5742#M4198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case, the moment palo alto detect some unusual behavior or suspicious file it sends data&amp;nbsp; to the wildfire cloud. Then client will just wait for 30 to 60 minutes for palo alto to deliver the updates and new signatures. It doesn't matter how difficult for that signatures to be created. Is that correct?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 02:11:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5742#M4198</guid>
      <dc:creator>TSPI</dc:creator>
      <dc:date>2013-07-23T02:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire query</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5743#M4199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PA unit doesnt do any analyse on its own.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You setup firewall rules on which traffic (files) to be sent to wildfire for analyze (allow-and-forward).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a WF-500 appliance the files never leave your datacenter (compared to the cloudbased Wildfire where the files are sent into some Amazon EC2 cloud setup) unless when malware is detected then the malware file is being forwarded to PaloAlto so a signature will be created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the files has been sent the first check (unfortunately) is if the binrary is signed by a trusted CA or not - if its signed it wont be checked (I hope this will change in future looking at cases such as stuxnet and flame who used real CA certs from Realtek (among others) to sign their malware) samt goes if the file has already been investigated previously.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once its being checked and if identified as malware the signature for this file will be available within one hour for those with a wildfire-subscription - the rest will have to wait for the weekly updated of the threat db to get the same signature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 20:00:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-query/m-p/5743#M4199</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2013-07-23T20:00:49Z</dc:date>
    </item>
  </channel>
</rss>

