<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: File Blocking process in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6924#M5098</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We use signatures to identify the file type. We do not use the extension type. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Sep 2011 23:17:02 GMT</pubDate>
    <dc:creator>skrall</dc:creator>
    <dc:date>2011-09-30T23:17:02Z</dc:date>
    <item>
      <title>File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6923#M5097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How does Palo Alto identify files, such as ".exe" when we have a rule set to block the download?&amp;nbsp; What is the process that Palo Alto uses?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2011 20:37:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6923#M5097</guid>
      <dc:creator>tedjscott</dc:creator>
      <dc:date>2011-09-27T20:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6924#M5098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We use signatures to identify the file type. We do not use the extension type. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Sep 2011 23:17:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6924#M5098</guid>
      <dc:creator>skrall</dc:creator>
      <dc:date>2011-09-30T23:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6925#M5099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are the signatures based upon?&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Oct 2011 17:25:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6925#M5099</guid>
      <dc:creator>tedjscott</dc:creator>
      <dc:date>2011-10-03T17:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6926#M5100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The system is looking at the file header and MIME type which are determined at file creation.&amp;nbsp;&amp;nbsp; This prevents the obfuscation of the the file by changing the extension to .txt. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Oct 2011 18:56:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/6926#M5100</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2011-10-03T18:56:23Z</dc:date>
    </item>
    <item>
      <title>Re: File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/174821#M54851</link>
      <description>&lt;P&gt;Can someone please refer me to an official document (a technical one) by Palo Alto clearly explaining how the file types will be detected (signature in oppose to extension checks). Will greatly help when it comes to cutomers and references.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 11:45:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/174821#M54851</guid>
      <dc:creator>Mass</dc:creator>
      <dc:date>2017-09-12T11:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/175027#M54897</link>
      <description>&lt;P&gt;Binary files have signatures in the beginning of the file.&lt;/P&gt;&lt;P&gt;You can verify if you open file with HEX Editor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Startingpoint might be here:&amp;nbsp;&lt;A title="https://en.wikipedia.org/wiki/List_of_file_signatures" href="https://en.wikipedia.org/wiki/List_of_file_signatures" target="_blank"&gt;https://en.wikipedia.org/wiki/List_of_file_signatures&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2017 21:00:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/175027#M54897</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-05T21:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: File Blocking process</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/176202#M55123</link>
      <description>&lt;P&gt;I haven't seen a highly technical document that really dives into exactly how the file blocking engine works. &amp;nbsp;There's some mention of it in the official documentation. &amp;nbsp;I also found mention of it being based on the content/file type and not just on a file extention in this document:&lt;/P&gt;&lt;P&gt;&amp;nbsp;- &lt;A href="https://www.paloaltonetworks.com/resources/techbriefs/content-id-tech-brief" target="_self"&gt;https://www.paloaltonetworks.com/resources/techbriefs/content-id-tech-brief&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's easy to validate this functionality for yourself. &amp;nbsp;Configure a "file blocking" profile with action=alert for all applications and all file types. &amp;nbsp;Attach that to a security policy that permits a test machine to use FTP. &amp;nbsp;Take a pdf file and change the extension to .exe (or duplicate that file numerous times and also rename it to .bat, .jpg, .doc, .torrent, etc.). &amp;nbsp;Use FTP to transfer these files through the firewall. &amp;nbsp;Finally, look at the data filtering log to see the results. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I took a copy of the PDF file linked above, duplicated it a few times, forged the extension on all but one of the samples, and then transferred it through the firewall using FTP. &amp;nbsp;The first snip is the directory with the duplicated/renamed files (all same date and file size). &amp;nbsp;The 2nd snip shows the firewall logging the forged filename while identifying the file type as actually being Adobe PDF. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="01-directory.png" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11237i008CE50F79154746/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="01-directory.png" alt="01-directory.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="02-logs.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11238i738EFCFDE01A40D5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="02-logs.png" alt="02-logs.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2017 20:56:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/file-blocking-process/m-p/176202#M55123</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-09-12T20:56:49Z</dc:date>
    </item>
  </channel>
</rss>

