<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall integration with other sandbox. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258760#M73384</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111786"&gt;@ColaNet&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Does wildfire have functionality for checking files on third-party resources besides virus total?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That currently doesn't exist. Palo Alto has formed a lot of partnerships with other companies so that it isn't just using virus total, but you currently can't control this at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111786"&gt;@ColaNet&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;It is necessary that after checking in wildfire the file is delayed until the file information from a third-party resource is received.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's not a functionality of WildFire at all. When the firewall sees a file it will check the files hash against its database of verdicts. IF it has never seen that hash before, the firewall will allow the file and take a copy for analysis; by the time it's being analysed by WildFire the file transfer to the first client has already finished.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Apr 2019 13:04:38 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2019-04-25T13:04:38Z</dc:date>
    <item>
      <title>Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258733#M73375</link>
      <description>&lt;PRE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;Colleagues, good afternoon. There was a question about integrating a firewall with third-party sandboxes to send files for review, such as cuckoosandbox or checkpoint, is there such an opportunity and where can I find documentation or information about similar experiences?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 07:34:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258733#M73375</guid>
      <dc:creator>ColaNet</dc:creator>
      <dc:date>2019-04-25T07:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258741#M73376</link>
      <description>&lt;P&gt;This option currently does not exist&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can always reach out to your local sales team so they can start a Feature Request for you&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 07:44:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258741#M73376</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-04-25T07:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258744#M73377</link>
      <description>&lt;P&gt;Ok, thank you for answer. Does wildfire have functionality for checking files on third-party resources besides virus total? It is necessary that after checking in wildfire the file is delayed until the file information from a third-party resource is received.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 08:03:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258744#M73377</guid>
      <dc:creator>ColaNet</dc:creator>
      <dc:date>2019-04-25T08:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258760#M73384</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111786"&gt;@ColaNet&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Does wildfire have functionality for checking files on third-party resources besides virus total?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That currently doesn't exist. Palo Alto has formed a lot of partnerships with other companies so that it isn't just using virus total, but you currently can't control this at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/111786"&gt;@ColaNet&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;It is necessary that after checking in wildfire the file is delayed until the file information from a third-party resource is received.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's not a functionality of WildFire at all. When the firewall sees a file it will check the files hash against its database of verdicts. IF it has never seen that hash before, the firewall will allow the file and take a copy for analysis; by the time it's being analysed by WildFire the file transfer to the first client has already finished.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2019 13:04:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258760#M73384</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-04-25T13:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258862#M73409</link>
      <description>&lt;P&gt;When you say&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;the firewall will allow the file and take a copy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does this mean that this PC can get infected as PA paases the traffic but remaning users who want to access this&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;file will wait for WF verdict and can be protected if WF finds that file has bad data?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 13:31:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258862#M73409</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-04-26T13:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258865#M73411</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;When you say&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;the firewall will allow the file and take a copy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does this mean that this PC can get infected as PA paases the traffic but remaning users who want to access this&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;file will wait for WF verdict and can be protected if WF finds that file has bad data?&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No, other user would also still receive the file if there isn't a signature.&amp;nbsp; The file is sent to the user (potentially malicious) and the user has potentially received something malicious that you will need to remediate after a WF verdict is reached.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 13:45:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258865#M73411</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-04-26T13:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258874#M73414</link>
      <description>&lt;P&gt;so it means if PA does not have signature for some file still we can get infected?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 14:38:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258874#M73414</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-04-26T14:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258875#M73415</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correct. The advantage there is that WildFire will tell you post-analysis so you can investigate and remediate the issue much faster than waiting for an end-user to actually report a problem.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 14:50:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258875#M73415</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-04-26T14:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall integration with other sandbox.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258888#M73421</link>
      <description>&lt;P&gt;Good to know that.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 15:46:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-integration-with-other-sandbox/m-p/258888#M73421</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-04-26T15:46:59Z</dc:date>
    </item>
  </channel>
</rss>

