<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildfire SMTP - Malicious objects not blocked in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133763#M47255</link>
    <description>&lt;P&gt;Hi, thanks for the replies so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the screenshot it states "alert" as the action (which it did in the log), I thought that this is expected as this would be passed onto the AV profile would then kick in and "reset-both" based of the WF settings in the AV profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should I expect the action in the below WF analysis to state "reset-both"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When looking at the AV monitoring, I see little activity... :(. We now have new variant of this being spammed at us, I would have thought the email scanning service we have to have started bouncing these by now!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2016 17:34:17 GMT</pubDate>
    <dc:creator>Kuiper</dc:creator>
    <dc:date>2016-12-20T17:34:17Z</dc:date>
    <item>
      <title>Wildfire SMTP - Malicious objects not blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133703#M47245</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We recently had our FW setup by an external security company.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Yesterday we had a malicious email attack which got past our email scanning service. Although Wildfire identified the attachments as malicious, they were sent on to the recipients (around 500). Luckily our AV's heuristics blocked the execution of the powershell script on most clients and I am using the FW to identify those that connected to the compromised site to DL the payload.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked and are Wildfire setup seems to be as per the below How To:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Enable-WildFire-to-Block-File-with-malicious-Verdict/ta-p/54376" target="_blank"&gt;How to Enable WildFire to Block File with 'malicious' Verdict&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The AV profile did have "drop" against WF SMTP which I have now changed to "reset-both" but I am unsure why this didnt stop the files getting through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture3.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6966iB91C1ED25D207EE3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture3.PNG" alt="Capture3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help in identifying where I am going wrong or how to troubleshoot would be greatly appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 12:02:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133703#M47245</guid>
      <dc:creator>Kuiper</dc:creator>
      <dc:date>2016-12-20T12:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire SMTP - Malicious objects not blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133728#M47246</link>
      <description>&lt;P&gt;As long as you are actually setup correctly then I imagine that this was the first sample that wildfire recieved. If you upload something completely new to wildfire it's possible that it already had been recieved by the time wildfire categorized it as malicious.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 15:04:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133728#M47246</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-20T15:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire SMTP - Malicious objects not blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133734#M47249</link>
      <description>&lt;P&gt;To piggy back on&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;just because WF said it was malicious if this was the first time the WF global enviornment it was an "unknown" which means your local appliance didn't have the hash of the file in its local DB and as such the file was passed along.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "malicious" note of the file likely occurred minutes after the file was sent up for analysis. &amp;nbsp;You potentialy were the unfortunate recipient to first send this file by the global WF enivornment, but the rest of us can thank you for now having that hash as a known bad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--edit--&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;err...just looked at your screen shot, there was only a 3 second delta. &amp;nbsp;So all of what I said didn't apply WF already knew the file was malicious.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 15:23:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133734#M47249</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2016-12-20T15:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire SMTP - Malicious objects not blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133763#M47255</link>
      <description>&lt;P&gt;Hi, thanks for the replies so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the screenshot it states "alert" as the action (which it did in the log), I thought that this is expected as this would be passed onto the AV profile would then kick in and "reset-both" based of the WF settings in the AV profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should I expect the action in the below WF analysis to state "reset-both"?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When looking at the AV monitoring, I see little activity... :(. We now have new variant of this being spammed at us, I would have thought the email scanning service we have to have started bouncing these by now!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2016 17:34:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/133763#M47255</guid>
      <dc:creator>Kuiper</dc:creator>
      <dc:date>2016-12-20T17:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire SMTP - Malicious objects not blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/134501#M47349</link>
      <description>&lt;P&gt;check your settings as instructed in this document to insure you have blocking for malicious setup everywhere you want it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Enable-WildFire-to-Block-File-with-malicious-Verdict/ta-p/54376" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Enable-WildFire-to-Block-File-with-malicious-Verdict/ta-p/54376&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Dec 2016 12:01:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/134501#M47349</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-12-24T12:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire SMTP - Malicious objects not blocked</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/134846#M47397</link>
      <description>&lt;P&gt;Hi Pulukas, thanks for taking a look.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, this is the guide I used and linked in my original post. I have everything setup as per the article but we have been having a number of files getting through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have since raised a ticket with Palo regarding this and the engineer I was talking to confirmed the settings were correct and couldn't see why the files were getting through 3 days after the hash had been identified.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It has therefore been escalated and I am now in the process of providing the various logs required for investigation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect that this issue is down to human error and there is some setting/policy somewhere which is causing this headache, I just hope it is sorted soon :).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will let you know if I get a solution, as I noticed in the article you linked, other people were having similar issues.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 10:35:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-smtp-malicious-objects-not-blocked/m-p/134846#M47397</guid>
      <dc:creator>Kuiper</dc:creator>
      <dc:date>2016-12-28T10:35:33Z</dc:date>
    </item>
  </channel>
</rss>

