<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wildfire options in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10441#M7697</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I'm sure most of us are, I'm seeing a huge string of issues related to Cryptolocker lately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've reviewed the several articles floating around on how Palo Alto units deal with this, the fact is I'm seeing spam emails get through encouraging users to download executables which always come up as clean as far as PA's build in AV goes. Wildfire does appear to have a very successful history for us of identifying these infections. However, an alert is often proceeded immediately with an outbreak, at which point it's too late.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What options may exist here? Given the recent scale of damage, most users would be happy wait a minute while a download is sandboxed before being made available to them, in fact there are competing products already doing that just to run traditional AV. I'm sure this has already been considered, but given the huge scale of the threat, I'd like to around regarding whether I'm missing something, or whether there's any possible way of scripting this to produce the desired effect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Dec 2014 05:02:32 GMT</pubDate>
    <dc:creator>daraco</dc:creator>
    <dc:date>2014-12-01T05:02:32Z</dc:date>
    <item>
      <title>Wildfire options</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10441#M7697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I'm sure most of us are, I'm seeing a huge string of issues related to Cryptolocker lately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've reviewed the several articles floating around on how Palo Alto units deal with this, the fact is I'm seeing spam emails get through encouraging users to download executables which always come up as clean as far as PA's build in AV goes. Wildfire does appear to have a very successful history for us of identifying these infections. However, an alert is often proceeded immediately with an outbreak, at which point it's too late.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What options may exist here? Given the recent scale of damage, most users would be happy wait a minute while a download is sandboxed before being made available to them, in fact there are competing products already doing that just to run traditional AV. I'm sure this has already been considered, but given the huge scale of the threat, I'd like to around regarding whether I'm missing something, or whether there's any possible way of scripting this to produce the desired effect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 05:02:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10441#M7697</guid>
      <dc:creator>daraco</dc:creator>
      <dc:date>2014-12-01T05:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire options</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10442#M7698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this cannot be done with a script I think.Solution is, use TRAPS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 07:11:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10442#M7698</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-12-01T07:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire options</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10443#M7699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/people/panos"&gt;panos&lt;/A&gt;, that TRAPS could be your answer. Not knowing your environment but you may want to consider users not being able to download .exes (have AD group for exceptions to the rule) or blocking .exes with a spam gateway.But at the end of the day TRAPS might be your answer. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 13:54:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10443#M7699</guid>
      <dc:creator>lewis</dc:creator>
      <dc:date>2014-12-01T13:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire options</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10444#M7700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;6.1 has URL inspection in WF so smtp messages with malicous URL links should be identified. &lt;A href="https://www.paloaltonetworks.com/documentation/61/pan-os/newfeaturesguide/section_4/chapter_4.html#46158" title="https://www.paloaltonetworks.com/documentation/61/pan-os/newfeaturesguide/section_4/chapter_4.html#46158"&gt;WildFire Email Link Analysis&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition block outbound to URL category Malware if you haven't done so already enable fwding of 'email-link'. Not all but most of the domains that WF picks up gets added to the malware category. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another brute force approach would be to limit downloads of PE's with a captive portal. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also think defense in depth so don't rely 100% on the peremieter fw's and yes TRAPS may help you here as well. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Dec 2014 16:25:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-options/m-p/10444#M7700</guid>
      <dc:creator>jkim2</dc:creator>
      <dc:date>2014-12-01T16:25:33Z</dc:date>
    </item>
  </channel>
</rss>

