<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prevent WildFire scanning certain URLs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416983#M93485</link>
    <description>&lt;P&gt;Thanks for the quick response &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually already have something very similar for phising tests, but that is looking for specific content in the Email header. Is there a pattern match "Context" that will search for a string within the email body? I can't find anything that mentions that.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jul 2021 15:47:59 GMT</pubDate>
    <dc:creator>Andy123B</dc:creator>
    <dc:date>2021-07-03T15:47:59Z</dc:date>
    <item>
      <title>Prevent WildFire scanning certain URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416974#M93483</link>
      <description>&lt;P&gt;Our external email protection provider (Mimecast) provides safe versions of file attachments on incoming emails. There is also a one time link in the email to request that the original file is sent in case of any formatting issues. When the incoming mails are scanned by WildFire it sometimes follows the link in the email which triggers the release of the email from Mimecast.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to filter out scanning / following of links for certain domain names within Wildfire config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 15:01:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416974#M93483</guid>
      <dc:creator>Andy123B</dc:creator>
      <dc:date>2021-07-03T15:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent WildFire scanning certain URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416979#M93484</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/48472"&gt;@Andy123B&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you scan the smtp traffic by the firewall and on this traffic you also configured a wildfire profile right?&lt;/P&gt;&lt;P&gt;If yes, then unfortunately there isn't really a (simple) solution otherwise than disabling the wildfire protection on that traffic at all. The not so simple solution is to create a custom app that matches for emails containing such an URL. This way you would be able to create a dedicated policy for this traffic where you do not configure a wildfire profile.&lt;/P&gt;&lt;P&gt;(One of our customers had a similar problem when they did a phishing test. All employees received a phishing email to test if they know the danger of if they simply click the URL in the email. Unfortunately wildifre opened all the URLs so the first test result was totally useless)&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 15:23:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416979#M93484</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-07-03T15:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent WildFire scanning certain URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416983#M93485</link>
      <description>&lt;P&gt;Thanks for the quick response &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually already have something very similar for phising tests, but that is looking for specific content in the Email header. Is there a pattern match "Context" that will search for a string within the email body? I can't find anything that mentions that.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 15:47:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416983#M93485</guid>
      <dc:creator>Andy123B</dc:creator>
      <dc:date>2021-07-03T15:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent WildFire scanning certain URLs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416994#M93488</link>
      <description>&lt;P&gt;I didn't test it but "smtp-req-protocol-payload" sounds like it could work in your situation.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 16:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prevent-wildfire-scanning-certain-urls/m-p/416994#M93488</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-07-03T16:29:42Z</dc:date>
    </item>
  </channel>
</rss>

