Dave, A bit of clarification on the wildfire subscription service - you can set it up to automatically check and download new wildfire generated signatures every 15 minutes but it could take as long as 30 minutes to get a signature for malware your firewall detected and uploaded for analysis. Based on traffic in the wild, stopping this stuff within the first hour (let alone the first 30 minutes) should provide a huge improvement in protection - thus the for-fee subscription service. Your SE can definitely cover off what we're seeing in our Wildfire servers. Also, and forgive me if you already know this, you can configure a file blocking object that does trigger on any .exe download (matching the base security rule, or object specific applications) that forces the user to hit a continue button and acknowledge the download - all of this is without wildfire. Wildfire PE files types include Win32 Portable Executable (PE) files (e.g. exe, dll, and scr), so you could use this continue configuration to force users to stop and validate the download of other file types mentioned here on Live: .pif, .lnk, . com, .bat and .vbs . Alternatively you can configure wildfire to "continue and forward" which does the same thing - forces the user to acknowledge and accept a download prior to the firewall allowing the transaction AND sending off a file hash to the wildfire cloud servers to see if the file should be uploaded for analysis. Again, this would be for the subset of file types within the PE category today. Bear in mind that should the encrypted email get through, any potential executables that may be initiated when the user clicks on a link will still be detected by the firewall configured with a file blocking policy - this is also true of links embedded in PDF files. HTH
... View more