<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildfire Signatures vs Threat Prevention Signatures in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7342#M5445</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;I understand what the technology does, that is not what my question was. My question was about identifying which threats have been mitigated by the Wildfire signatures vs the Threat Prevention signatures.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 22 Mar 2014 23:11:31 GMT</pubDate>
    <dc:creator>mike_lutgen</dc:creator>
    <dc:date>2014-03-22T23:11:31Z</dc:date>
    <item>
      <title>Wildfire Signatures vs Threat Prevention Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7340#M5443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Guys, &lt;/P&gt;&lt;P&gt;Looking for a little help here, trying to provide some proof to management of the value that the Wildfire subscription is providing to us vs just having the Threat Prevention subscription.&amp;nbsp; I've looked in the Wildfire logs, but that only shows threats that were uploaded to the Wildfire cloud for investigation and were still allowed through the firewall (basically it's a log of all the stuff that got through and whether or not it was malware). That is helpful for the desktop team, because they can focus a PC cleaning on the machines that are listed in the logs, but I'd like to go to management with a list of threats that were blocked by Wildfire signatures to show all of the stuff that is being prevented from entering our network and therefore proving the value of the Wildfire subscription.&amp;nbsp; The problem with that is, as far as I know, all threats blocked by Wildfire signatures still just go into the Threat log and are indistinguishable from threats blocked by Threat Prevention signatures.&amp;nbsp; Does anyone know of a way to identify one vs the other?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Mar 2014 17:10:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7340#M5443</guid>
      <dc:creator>mike_lutgen</dc:creator>
      <dc:date>2014-03-22T17:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Signatures vs Threat Prevention Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7341#M5444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Wildfire functionality: &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;WildFire&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; combines the abilities &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;of&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; a customer's on-premise firewalls with the scalability and accessibility of the &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;cloud&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; to ensure the best combination of visibility, analysis and enforcement. The next-generation firewall provides &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;full&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; inspection of all traffic across all ports, and can identify unknown files at a rate of up to 10Gbps. When an &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;unknown&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; file is encountered is copied and delivered over an encrypted connection to Palo Alto Networks malware &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;analysis&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; cloud. In the cloud, the suspect sample is executed in a virtual environment and observed for more than &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;100 malicious behaviors to determine if the file is a risk. If the file is determined to be a risk, WildFire automatically &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;generates&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; new protections, which are then delivered back to ALL customer firewalls worldwide. New malware &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;infections&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt; as well as malware communications are blocked by the firewall, again at a rate of up to 10 Gbps. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Mar 2014 18:38:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7341#M5444</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-03-22T18:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Signatures vs Threat Prevention Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7342#M5445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;I understand what the technology does, that is not what my question was. My question was about identifying which threats have been mitigated by the Wildfire signatures vs the Threat Prevention signatures.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Mar 2014 23:11:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7342#M5445</guid>
      <dc:creator>mike_lutgen</dc:creator>
      <dc:date>2014-03-22T23:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Signatures vs Threat Prevention Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7343#M5446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can identify them by the Threat ID. Check these two documents and let me know if that's what you are looking for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-7299"&gt;Threat ID Ranges in the Palo Alto Networks Content Database&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6260"&gt;How to Create a Report on Panorama for WildFire Threats Sent to the Cloud&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Guillermo.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Dec 2014 11:03:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7343#M5446</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-12-25T11:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Signatures vs Threat Prevention Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7344#M5447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also log into your account and visit your Wildfire portal and get a report on the malware that has been detected in the traffic that was uploaded by your firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Dec 2014 14:42:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7344#M5447</guid>
      <dc:creator>parmas</dc:creator>
      <dc:date>2014-12-26T14:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Signatures vs Threat Prevention Signatures</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7345#M5448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;have your SE run a WF coverage report its much more comprehenisve similar to what you can do with a AVR &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jan 2015 15:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-signatures-vs-threat-prevention-signatures/m-p/7345#M5448</guid>
      <dc:creator>jkim2</dc:creator>
      <dc:date>2015-01-08T15:38:13Z</dc:date>
    </item>
  </channel>
</rss>

