<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WildFire phishing emails allowed instead of blocked? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254415#M72209</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following on from what you have said, and so I and perhaps others can understand this a bit better, an example phishing email I have received is as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Receive Time&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;2019/03/18 14:44:58&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;P class="sectionTitle"&gt;WildFire Analysis Summary&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV class=" x-panel list-view"&gt;&lt;DIV class="x-panel-header x-unselectable"&gt;&lt;SPAN class="x-panel-header-text"&gt;Link Information&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="x-panel-bwrap"&gt;&lt;DIV class="x-panel-body"&gt;&lt;DIV class="x-list-wrap"&gt;&lt;DIV class="x-list-body"&gt;&lt;DIV class="x-list-body-inner"&gt;&lt;EM&gt;URL&lt;/EM&gt; &lt;EM&gt;hxxps://remove_me_walimusacco.com//dhlserver/DHL/portal/?email=enquiries@my_domain.co.uk&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;SHA-256&lt;/EM&gt; &lt;EM&gt;691ec4a0d6d24af2fe6f0e2715c11c8bcef7ad72f2d43c859f19a9ac93ecb8dc&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;SHA1&lt;/EM&gt; &lt;EM&gt;4516f515484f4ae98d09de7b1ce309024abf6fe0&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;MD5&lt;/EM&gt; &lt;EM&gt;31aff8cb2eed386d168d700aa0b0bba2&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;First Seen Timestamp&lt;/EM&gt; &lt;EM&gt;2019-03-18 14:45:46 UTC&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;Verdict&lt;/EM&gt; &lt;EM&gt;&lt;STRONG&gt;phishing&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Receive Time&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;2019/03/18 14:48:21&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Details:&lt;/P&gt;&lt;DIV class="x-grid3-row  x-grid3-row-first  x-grid3-row-over"&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Threat/Content Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;wildfire&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;ID&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;1238713750&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Severity&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;high&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Repeat Count&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;File Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;email-link&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;File Name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;&lt;A href="hxxps://remove_me_walimusacco.com//dhlserver/DHL/portal/?email=enquiries" target="_blank" rel="noopener"&gt;hxxps://remove_me_walimusacco.com//dhlserver/DHL/portal/?email=enquiries&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would this sequence of events demonstrate the following was true:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Our Palo Alto firewall recieved the phishing email at 14:44:58 and sent the email to WildFire.&amp;nbsp; As the email phishing URL was not currently known, the email was allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- From the WildFire Analysis Summary, WildFire accepted the email for processing at 14:45:46, and our Palo Alto firewall was the first WildFire Palo Alto to see this particular phishing URL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- After several minutes of processing, at 14:48:21, the email was determined to be a phishing email and set as such in WildFire.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Any other Palo Alto firewall using WildFire would block that phishing email from that point in time onwards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the above a reasonable summary of the events&amp;nbsp;as detailed above?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I further conclude that if I have only seen WildFire phishing verdict as "allow", that all of our detected phishing emails are "first seen" phishing emails, otherwise I would have seen a blocked phishing email?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reason for editing: Obsfucation of malicious URL's&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2019 19:31:48 GMT</pubDate>
    <dc:creator>Steve-Phillips</dc:creator>
    <dc:date>2019-03-20T19:31:48Z</dc:date>
    <item>
      <title>WildFire phishing emails allowed instead of blocked?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254396#M72200</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I note that when I view the &lt;EM&gt;Monitor -&amp;gt; Wildfire Submissions&amp;nbsp;&lt;/EM&gt;activity on my Palo Alto PA-3020 8.1.6, all the detections&amp;nbsp;with a&amp;nbsp;verdict of "phishing"&amp;nbsp;with a&amp;nbsp;Severity of "high" are allowed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However,&amp;nbsp;the other verdict&amp;nbsp;I can see, which is&amp;nbsp;"malicious" with a severity of "Informational" is successfully blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this the behaviour that others see, or have&amp;nbsp;I not configured WildFire correctly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything I can do to set the "phishing" emails to be blocked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 16:24:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254396#M72200</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2019-03-20T16:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire phishing emails allowed instead of blocked?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254412#M72207</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66688"&gt;@Steve-Phillips&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From your description it sounds like already configured it correctly. These events that are allowed are normal because these links were not known as phishing links by wildfire. With that email the url was forwarded to wildfire and the verdict was received by the firewall afterwards. The firewall allows the url/attachment if it is unknown at that time and the reason is that the firewall only does flow-based checks and does not operate in store-and-forward mode like a mailgateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 18:48:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254412#M72207</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-03-20T18:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire phishing emails allowed instead of blocked?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254415#M72209</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following on from what you have said, and so I and perhaps others can understand this a bit better, an example phishing email I have received is as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Receive Time&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;2019/03/18 14:44:58&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;P class="sectionTitle"&gt;WildFire Analysis Summary&lt;/P&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV class=" x-panel list-view"&gt;&lt;DIV class="x-panel-header x-unselectable"&gt;&lt;SPAN class="x-panel-header-text"&gt;Link Information&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="x-panel-bwrap"&gt;&lt;DIV class="x-panel-body"&gt;&lt;DIV class="x-list-wrap"&gt;&lt;DIV class="x-list-body"&gt;&lt;DIV class="x-list-body-inner"&gt;&lt;EM&gt;URL&lt;/EM&gt; &lt;EM&gt;hxxps://remove_me_walimusacco.com//dhlserver/DHL/portal/?email=enquiries@my_domain.co.uk&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;SHA-256&lt;/EM&gt; &lt;EM&gt;691ec4a0d6d24af2fe6f0e2715c11c8bcef7ad72f2d43c859f19a9ac93ecb8dc&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;SHA1&lt;/EM&gt; &lt;EM&gt;4516f515484f4ae98d09de7b1ce309024abf6fe0&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;MD5&lt;/EM&gt; &lt;EM&gt;31aff8cb2eed386d168d700aa0b0bba2&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;First Seen Timestamp&lt;/EM&gt; &lt;EM&gt;2019-03-18 14:45:46 UTC&lt;/EM&gt;&lt;DIV class="x-clear"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;EM&gt;Verdict&lt;/EM&gt; &lt;EM&gt;&lt;STRONG&gt;phishing&lt;/STRONG&gt;&lt;/EM&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Receive Time&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;2019/03/18 14:48:21&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Details:&lt;/P&gt;&lt;DIV class="x-grid3-row  x-grid3-row-first  x-grid3-row-over"&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Threat/Content Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;wildfire&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;ID&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;1238713750&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Severity&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;high&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;Repeat Count&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;1&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;File Type&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;email-link&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV class="x-grid3-row "&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-id2"&gt;File Name&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid3-cell-inner x-grid3-col-3"&gt;&lt;A href="hxxps://remove_me_walimusacco.com//dhlserver/DHL/portal/?email=enquiries" target="_blank" rel="noopener"&gt;hxxps://remove_me_walimusacco.com//dhlserver/DHL/portal/?email=enquiries&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would this sequence of events demonstrate the following was true:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Our Palo Alto firewall recieved the phishing email at 14:44:58 and sent the email to WildFire.&amp;nbsp; As the email phishing URL was not currently known, the email was allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- From the WildFire Analysis Summary, WildFire accepted the email for processing at 14:45:46, and our Palo Alto firewall was the first WildFire Palo Alto to see this particular phishing URL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- After several minutes of processing, at 14:48:21, the email was determined to be a phishing email and set as such in WildFire.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Any other Palo Alto firewall using WildFire would block that phishing email from that point in time onwards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the above a reasonable summary of the events&amp;nbsp;as detailed above?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I further conclude that if I have only seen WildFire phishing verdict as "allow", that all of our detected phishing emails are "first seen" phishing emails, otherwise I would have seen a blocked phishing email?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reason for editing: Obsfucation of malicious URL's&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 19:31:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254415#M72209</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2019-03-20T19:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire phishing emails allowed instead of blocked?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254430#M72212</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66688"&gt;@Steve-Phillips&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Is the above a reasonable summary of the events&amp;nbsp;as detailed above?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, it is. Only one point: the might be a little delay between wildfire setting the verdict until every paloalto firewall receives the update&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66688"&gt;@Steve-Phillips&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Can I further conclude that if I have only seen WildFire phishing verdict as "allow", that all of our detected phishing emails are "first seen" phishing emails, otherwise I would have seen a blocked phishing email?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Exactly (or if another firewall already uploaded the url but wildfire was still processing it when your firewall received the email)&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 20:11:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254430#M72212</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2019-03-20T20:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: WildFire phishing emails allowed instead of blocked?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254432#M72213</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great, many thanks for that explanation, most useful in increasing my knowledge of the Palo Alto firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 20:27:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-phishing-emails-allowed-instead-of-blocked/m-p/254432#M72213</guid>
      <dc:creator>Steve-Phillips</dc:creator>
      <dc:date>2019-03-20T20:27:52Z</dc:date>
    </item>
  </channel>
</rss>

