<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildfire Virus detected  on firewall but not on Wildfire Portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-virus-detected-on-firewall-but-not-on-wildfire-portal/m-p/353698#M87350</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/145941"&gt;@FMueller&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'd recommend reaching out to TAC and creating a false-positive report. The generic signatures are exactly that, generic. When you submit a file to WildFire it actually goes through a full sandbox analysis and these generic signatures really aren't used.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 03 Oct 2020 03:54:56 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-10-03T03:54:56Z</dc:date>
    <item>
      <title>Wildfire Virus detected  on firewall but not on Wildfire Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-virus-detected-on-firewall-but-not-on-wildfire-portal/m-p/353683#M87349</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the file t32.exe is considered as wildfire-virus Win32.WPCGeneric.cnp and blocked on the firewall.&lt;/P&gt;&lt;P&gt;But when checking this file on Virustotal and eu.wildfire.paloaltonetworks.com/wildfire/ it is considered as benign.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.virustotal.com/gui/file/352df104254095ddf925514d99bfb5411c95b5386e90caf06557979f82e16844/detection" target="_blank"&gt;https://www.virustotal.com/gui/file/352df104254095ddf925514d99bfb5411c95b5386e90caf06557979f82e16844/detection&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The file is part of the pip wheel &lt;A href="https://pypi.org/project/pip/20.1/#files" target="_blank"&gt;https://pypi.org/project/pip/20.1/#files&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What could&amp;nbsp; cause this behaviour? I have the latest wildfire updates installed on the firewall.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Oct 2020 01:46:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-virus-detected-on-firewall-but-not-on-wildfire-portal/m-p/353683#M87349</guid>
      <dc:creator>FMueller</dc:creator>
      <dc:date>2020-10-03T01:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Wildfire Virus detected  on firewall but not on Wildfire Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/wildfire-virus-detected-on-firewall-but-not-on-wildfire-portal/m-p/353698#M87350</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/145941"&gt;@FMueller&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I'd recommend reaching out to TAC and creating a false-positive report. The generic signatures are exactly that, generic. When you submit a file to WildFire it actually goes through a full sandbox analysis and these generic signatures really aren't used.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Oct 2020 03:54:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/wildfire-virus-detected-on-firewall-but-not-on-wildfire-portal/m-p/353698#M87350</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-10-03T03:54:56Z</dc:date>
    </item>
  </channel>
</rss>

