PaloAlto 101
PaloAlto 101
PaloAlto 101
WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing
and signature-based detection and blocking of malware. WildFire extends the capabilities of Palo Alto Networks
next-generation firewalls to identify and block targeted and unknown malware.
The following topics describe WildFire and how to integrate into your environment:
About WildFire
WildFire Concepts
WildFire Deployments
About WildFire
WildFire Overview
About WildFire
Modern malware is at the heart of many of today's most sophisticated network attacks and is increasingly
customized to avoid traditional security solutions. Palo Alto Networks has developed an integrated approach
that addresses the full malware life cycle, which includes preventing infections, identifying zero-day malware
(that is, malware that has not previously been identified by other antivirus vendors) or targeted malware
(malware targeting a specific industry or corporation), as well as pinpointing and disrupting active infections.
The Palo Alto Networks WildFire engine exposes zero-day and targeted malware through direct observation in
a virtual environment within the WildFire system. The WildFire feature also makes extensive use of the Palo
Alto Networks App-ID technology by identifying file transfers within all applications, not just email
attachments or browser-based file downloads.
For information on Palo Alto Networks WildFire privacy policy, refer to
https://live.paloaltonetworks.com/docs/DOC-2880.
Figure: High-Level WildFire Decision Workflow that follows describes the basic WildFire workflow and
Figure: Detailed WildFire Decision Flow provides a more detailed workflow and shows the decision workflow
from the initial file download by a user through the entire workflow to the point where a signature is generated
if the file is determined to be malicious.
WildFire Overview
About WildFire
About WildFire
WildFire Overview
WildFire Overview
WildFire Concepts
WildFire Concepts
File Forwarding
WildFire Signatures
WildFire Alerts
File Forwarding
With this integrated solution, you configure the firewall with a file blocking profile and attach it to a security
policy rule that instructs the firewall to automatically forward certain file types to the WildFire system for
analysis. Whenever a file is transferred over a session that matches the security rule, the firewall performs a file
hash check with WildFire to see if the file has been previously analyzed. If the file is new, it is forwarded for
analyses, even if it is contained within a ZIP file or over compressed HTTP. The firewall can also be configured
to forward files inside of decrypted SSL sessions. See Forward Files to a WF-500 WildFire Appliance or Forward
Files to the WildFire Cloud.
PEPortable Executable, which includes executable files, object code, DLLs, FON (fonts), and others
Microsoft OfficeIncludes document (doc, docx, rtf), workbook (xls, xlsx), and PowerPoint (ppt, pptx)
WildFire Concepts
WildFire Overview
WildFire engine completes the analysis, it generates a detailed forensics report that summarizes the observed
behaviors and assigns a verdict of malware or benign. WildFire includes sandbox support for the following
operating system environments:
Windows 7 32-bit
WildFire Signatures
The key benefits of the Palo Alto Networks WildFire feature is that it can discover zero-day malware and can
quickly generate signatures to protect against future infections of all of the malware it discovers. For files that
are determined to be malicious, WildFire automatically generates a signature based on the malware payload of
the sample and tests it for accuracy and safety. Because malware evolves rapidly, the signatures that WildFire
generates will address multiple variants of the malware. The new signature is then distributed within 30-60
minutes to all Palo Alto Networks firewalls equipped with a WildFire subscription, or the following day as part
of the antivirus update for firewalls equipped with a Threat Prevention subscription only.
As soon as the firewall is updated with the new signature, any files that contain that malware or a variant of it
will automatically be dropped. Information gathered by WildFire during the analysis of malware is also used to
fortify other Threat Prevention features, such as the PAN-DB malware URL categories, DNS signatures,
antivirus, and anti-spyware signatures. Palo Alto Networks also develops signatures for command and control
traffic, enabling immediate disruption in the communications of any malware inside the network. For details on
signatures and the benefits of having a WildFire subscription, see WildFire Subscription Requirements.
WildFire Alerts
The firewall can provide instant alerts whenever malware is detected on your network by sending email alerts,
syslog, or SNMP traps. This allows you to quickly identify the user who downloaded the malware and eradicate
it before it causes extensive damage or propagates to other users. In addition, every signature generated by
WildFire is automatically propagated to all Palo Alto Networks firewalls protected with a Threat Prevention
and/or WildFire subscription, which provides automatic protection from malware even if it was not found in
your network.
WildFire Overview
WildFire Concepts
Each time the file download link is clicked, a unique file named wildfire-test-pe-file.exe is generated and
downloaded and each file will have a different SHA256 value.
Although a signature is generated for the file, the signature is disabled and will not be distributed.
WildFire Concepts
WildFire Overview
After downloading the file, check the Data Filtering log on the firewall to see if the file was forwarded and after
about five minutes, look for the results in the WildFire Submissions log. For more information, see Verify that the
Firewall Can Forward Files to a WildFire Appliance and Verify Firewall File Forwarding to the WildFire Cloud.
To use the API to retrieve the sample test file, see Use the API to Retrieve a Sample Malware Test File.
WildFire Overview
WildFire Deployments
WildFire Deployments
Palo Alto Networks next-generation firewalls support the following WildFire deployments:
Palo Alto Networks WildFire CloudIn this deployment, the firewall forwards files to the hosted
WildFire environment that is owned and maintained by Palo Alto Networks. As WildFire detects new
malware, it generates new signatures within the hour. Firewalls equipped with a WildFire subscription can
receive the new signatures within 30-60 minutes; firewalls with only a Threat Prevention subscription can
receive the new signatures in the next antivirus signature update within 24-48 hours.
The available WildFire cloud servers are wildfire-public-cloud for the WildFire cloud hosted in
the United States and wildfire.paloaltonetworks.jp for the WildFire cloud hosted in Japan.
You may want to use the Japan server if you do not want benign files forwarded to the U.S. cloud servers. If
a file sent to the Japan cloud is determined to be malicious, it will be forwarded to the U.S. servers where the
file will be analyzed again and signatures will be generated. If you are in the Japan region, you may also
experience faster response time for sample submissions and report generation. Panorama can also be
configured for the Japan cloud. See Forward Files to the WildFire Cloud for more details.
WildFire ApplianceIn this deployment, you install a WF-500 WildFire appliance on your corporate
network and configure your firewalls to forward files to it instead of to the Palo Alto Networks WildFire
cloud (the default). This deployment prevents the firewall from having to send any files outside of your
network for analysis. By default, the appliance will not send any files out of your network unless you explicitly
enable the auto-submit feature, which enables forwarding of any malware it detects to the Palo Alto
Networks WildFire cloud where the files are analyzed to generate antivirus signatures. The antivirus
signatures are then distributed to all Palo Alto Networks firewalls with a threat prevention and/or WildFire
subscription. A single WildFire appliance can receive and analyze files from up to 100 Palo Alto Networks
firewalls.
The main differences between the Palo Alto Networks WildFire cloud and the WildFire appliance are as follows:
The WildFire Appliance enables local sandboxing of malware so that benign files never leave your
network. By default, the WildFire appliance does not forward any files to the WildFire cloud and
therefore signatures are not generated for malware detected by the appliance. If you want WildFire
signatures locally-detected malware, you can enable the auto-submit feature on the appliance to enable
the appliance to send the malware it detects to the WildFire cloud for signature generation.
The WildFire API, which is available with a WildFire subscription, can only be used with the public
cloud, not a private WF-500 appliance.
Manual submission of samples to the public cloud through the WildFire Portal. With the WF-500
appliance, there is no portal, so any logs received from the appliance will contain a link that can be
clicked to manually submit the sample to the public cloud. The sample is then analyzed and a signature
is generated if the sample is found to be malicious. This is useful if auto-submit is not enabled.
Multiple virtual machines run on the WildFire cloud and will represent a variety of operating systems
and applications that are used when running sample files. On the WF-500 appliance, multiple virtual
machines are available, but only one can be chosen for file analysis. When selecting which virtual
machine to use, you can review what is installed and choose the virtual machine that best matches your
environment. For information on viewing and selecting the virtual machine, see Integrate the WF-500
Appliance into the Network.
WildFire Overview
WildFire Advanced File Type SupportIn addition to PE files, a subscription allows the firewall to also
forward the following advanced file types: APK (WildFire cloud only), PDF, Microsoft Office, and Java
Applet.
WildFire APIThe WildFire subscription provides access to the WildFire API, which enables direct
programmatic access to the WildFire service on the Palo Alto Networks WildFire cloud. You can use the
WildFire API to submit files to the WildFire cloud and to retrieve reports for the submitted files. The
WildFire API supports up to 100 file submissions per day and up to 1000 queries per day. Note that you
cannot use the WildFire API to submit files to the WildFire appliance.
WildFire ApplianceOnly firewalls with a valid WildFire subscription can forward files to a WildFire
appliance for analysis. Firewalls that only have a Threat Prevention subscription installed can forward files
to the WildFire cloud, but not to a WildFire appliance.
10
WildFire Overview
AntivirusNew antivirus content updates are released on a daily basis. To get the latest content, schedule
these updates daily at minimum. For a more aggressive schedule, schedule them hourly.
Applications and ThreatsNew App-ID, vulnerability protection, and anti-spyware signatures are
released as weekly content updates (normally on Tuesdays). To receive the latest content, schedule the
updates at least weekly. For a more aggressive schedule to ensure that the firewall receives the latest
content soon after they are released (including occasional off-schedule emergency content releases),
schedule them daily.
WildFireNew WildFire antivirus signatures are published every 30 minutes. Depending on when new
malware is discovered within the release cycle, coverage is provided in the form of a WildFire signature
30-60 minutes after it is first discovered by WildFire. To get the latest WildFire signatures, schedule these
updates every hour or half-hour. For a more aggressive schedule, you may want to schedule the firewall to
check for updates as often as every 15 minutes.
When configuring a WildFire signature update schedule, the number of minutes past the hour can
not be set to zero or the updates will fail. For example, if you set the recurrence to 15 minutes,
the valid values for minutes past the hour is 1-14. For a recurrence of 30 minutes the valid range
is 1-29 and for every hour the valid range is 1-59 minutes.
11
WildFire Overview
Platform
VM-100
100MB
VM-200
10
200MB
VM-300
20
200MB
PA-200
100MB
PA-500
10
200MB
PA-2000 Series
20
200MB
PA-3020
50
200MB
PA-3050
50
500MB
PA-4020
20
200MB
PA-4050/4060
50
500MB
PA-5020/5050
50
500MB
PA-5060
100
500MB
PA-7050
100
1GB
12