<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildfire feedback in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8455#M6243</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As many of you guys, we have downloaded and installed the latest version of PAN OS - 4.1.0&lt;/P&gt;&lt;P&gt;Do you have by any chance first feedbacks about the new wildfire feature ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although the configuration is pretty straight &amp;amp; easy, we notice some strange behaviours: &lt;/P&gt;&lt;P&gt;For example, a EXE file is seen as a virus (Trojan/Win32.autohk.bd) by the threat prevention. However, when this very same file is sent to wildfire, and after a short analysis, this file is noted as "benign".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do other people notice the same thing ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, can we find somewhere a documentation about the meaning of all counters shown in the "show wildfire statistics" ?&lt;/P&gt;&lt;P&gt;For example, "FWD_CNT_LOCAL_FILE", etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We'll be happy to hear about your first feedbacks about this new feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Nov 2011 15:41:41 GMT</pubDate>
    <dc:creator>alliance</dc:creator>
    <dc:date>2011-11-09T15:41:41Z</dc:date>
    <item>
      <title>Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8455#M6243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As many of you guys, we have downloaded and installed the latest version of PAN OS - 4.1.0&lt;/P&gt;&lt;P&gt;Do you have by any chance first feedbacks about the new wildfire feature ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although the configuration is pretty straight &amp;amp; easy, we notice some strange behaviours: &lt;/P&gt;&lt;P&gt;For example, a EXE file is seen as a virus (Trojan/Win32.autohk.bd) by the threat prevention. However, when this very same file is sent to wildfire, and after a short analysis, this file is noted as "benign".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do other people notice the same thing ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, can we find somewhere a documentation about the meaning of all counters shown in the "show wildfire statistics" ?&lt;/P&gt;&lt;P&gt;For example, "FWD_CNT_LOCAL_FILE", etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We'll be happy to hear about your first feedbacks about this new feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 15:41:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8455#M6243</guid>
      <dc:creator>alliance</dc:creator>
      <dc:date>2011-11-09T15:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8456#M6244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The short answer would be files moving on the wire look different once they are on the system and running. I'm guessing Wildfire allows Palo Alto to bridge the gap between false positives and the real deal in their signatures. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 17:51:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8456#M6244</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-11-09T17:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8457#M6245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have yet to download and install 4.1, but it was my understanding that Wildfire was not on by default... Is that correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 18:40:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8457#M6245</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-11-09T18:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8458#M6246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/people/umphmharding" id="jive-210732 627 748 229 512 334"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Umphmahardingu &amp;gt; Do you mean that if Wildfire ran the EXE and found the file as "begnin" and if the Threat Prevention of PAN device based on signatures considered the EXE as a trojan, the reality is that the EXE is indeed a trojan but harmless for hosts ? In other words in this particular case, does it mean that the trojan detected by the threat prevention is a false positive one... ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;prince.mcdonald &amp;gt; It is correct: You have to configure first a file blocking profile with the action "forward" or "continue-and-forward' (if you want the drive-by-download feature as well). Then, you will apply this FB profile on the FW rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 19:49:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8458#M6246</guid>
      <dc:creator>alliance</dc:creator>
      <dc:date>2011-11-09T19:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8459#M6247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are several reasons that a file caught by an AV signature might not&lt;/P&gt;&lt;P&gt;be categorized as malicious by WildFire.&amp;nbsp; WildFire does not use&lt;/P&gt;&lt;P&gt;signatures, but instead actually runs the sample in a virtual sandbox and&lt;/P&gt;&lt;P&gt;analyzes its behavior for potentially malicious actions.&amp;nbsp; It is possible&lt;/P&gt;&lt;P&gt;that the actions performed by the sample were not by themselves&lt;/P&gt;&lt;P&gt;sufficiently malicious for WildFire to automatically call it malware,&lt;/P&gt;&lt;P&gt;whereas the sample may have also been analyzed manually by the AV&lt;/P&gt;&lt;P&gt;community, which labeled it a virus based on a variety of factors.&amp;nbsp; For&lt;/P&gt;&lt;P&gt;example, virus signatures are often created for "potentially unwanted"&lt;/P&gt;&lt;P&gt;software that might not perform blatantly malicious actions by itself.&amp;nbsp; It&lt;/P&gt;&lt;P&gt;is also possible that the AV signature hit is a false positive.&amp;nbsp; Feel free&lt;/P&gt;&lt;P&gt;to send samples of suspected false positives or false negatives our way&lt;/P&gt;&lt;P&gt;for analysis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using Palo Alto Networks in-line antivirus protection together with&lt;/P&gt;&lt;P&gt;WildFire behavioral analysis provides a layered defense-in-depth approach&lt;/P&gt;&lt;P&gt;to protecting networks from the modern malware threat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 19:53:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8459#M6247</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2011-11-09T19:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8460#M6248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct. To allow your device to use WildFire, you need to create or edit&lt;/P&gt;&lt;P&gt;a file blocking profile by setting an action of "forward" or&lt;/P&gt;&lt;P&gt;"continue-and-forward" for Portable Executable (PE) files types, and apply&lt;/P&gt;&lt;P&gt;this profile to a security policy that matches the traffic you wish to&lt;/P&gt;&lt;P&gt;analyze (inbound Internet traffic, typically).&amp;nbsp; You can also manually&lt;/P&gt;&lt;P&gt;upload files for analysis through your web browser at the WildFire web&lt;/P&gt;&lt;P&gt;portal (wildfire.paloaltonetworks.com) by clicking the Upload button.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 19:53:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8460#M6248</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2011-11-09T19:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8461#M6249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wich kind of policy do you use? from "outside or untrust" any to "inside or trust" any etc... with profile file blocking with a file blocking policy who check exe and dll files, in direction download or both direction with action continue and forward? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 20:54:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8461#M6249</guid>
      <dc:creator>fcellini</dc:creator>
      <dc:date>2012-01-10T20:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8462#M6250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Speaking of wildfire... I assume that "bening" means that "file ok"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because I have manually uploaded a file thats anything but "bening" but wildfire still draws the conclusion that the file is bening (even if the report detected that the file tries to drop stuff at c:\sample.exe and modify registry and other kind of dirty work).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there perhaps some document who better describes why wildfire thinks stuff is bening while it obviously isnt (at least from my point of view &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 22:18:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8462#M6250</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-01-10T22:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8463#M6251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="active_link" href="http://en.wiktionary.org/wiki/benign"&gt;http://en.wiktionary.org/wiki/benign&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Presumably the wildfire system isn't as thorough as you are assuming.&amp;nbsp; Plus, just because an exe tries to create another exe in c:\ doesn't necessarily mean it is bad - this is effectively what installers do.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 22:41:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8463#M6251</guid>
      <dc:creator>bradenmcg</dc:creator>
      <dc:date>2012-01-10T22:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire feedback</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8464#M6252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size:10pt;padding-top:8px;padding-right:8px;padding-bottom:8px;padding-left:8px"&gt;WildFire categorizes files as "benign" or "malicious" based on analysis of actions the sample performs as it runs in a virtualized environment.&amp;nbsp; This system is very effective at finding previously unknown "zero-day malware", but it can never be 100% fool proof.&amp;nbsp; It is possible for malware to not perform anything overtly malicious while it is under analysis.&amp;nbsp; It is also possible for the behaviors performed by the malware to not be sufficiently malicious for WildFire to label it malware.&amp;nbsp; If you have a sample you think should be categorized as malware but was categorized as benign, feel free to send it our way and we'll take a look.&amp;nbsp; We are constantly adding behaviors for WildFire to look for in order to correctly categorize malware.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jan 2012 22:48:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-feedback/m-p/8464#M6252</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2012-01-10T22:48:14Z</dc:date>
    </item>
  </channel>
</rss>

