After the WildFire cloud service analyzes an unknown file or URL and determines it to be malicious (Malware, Phishing) or unwanted (Grayware), it doesn't just stop at providing a verdict. A key part of the WildFire ecosystem is the automatic generation of new signatures based on this analysis. These signatures provide proactive protection against future encounters with the same or similar threats.
These WildFire-generated signatures are then distributed globally via Content Updates . Once downloaded by a PAN-OS firewall, these signatures are used by the existing security engines (Antivirus, Anti-Spyware, DNS Security, URL Filtering) to detect the threat. The action taken when a WildFire-generated signature matches traffic is configured within the corresponding Security Profile (Antivirus, Anti-Spyware, etc.), just like any other vendor-provided signature.
This topic focuses on configuring the firewall's response when traffic matches a signature that was *created* as a result of WildFire analysis, distinguishing it from the immediate action based on a WildFire *verdict* (configured in the Antivirus profile) or the submission of *unknown* files (configured in the WildFire Analysis profile).
WildFire automatically generates various types of protections based on its analysis:
The key point is that these are standard signature types, delivered via Content Updates, but their *origin* is the WildFire analysis process.
Because WildFire-generated signatures become part of the standard signature databases, the actions taken upon matching them are configured within the standard Security Profiles:
Objects > Security Profiles > Antivirus
Objects > Security Profiles > Anti-Spyware
Objects > Security Profiles > DNS Security
Objects > Security Profiles > URL Filtering
Policies > Security
) that have an Action of `Allow`.
It's crucial to distinguish between actions based on WildFire *signatures* and actions based on WildFire *verdicts*:
Feature | WildFire Verdict Actions | WildFire Signature Actions |
---|---|---|
Trigger | Firewall sees a file hash/URL with a known verdict (from cache or cloud lookup) | Firewall content matches a downloaded signature (AV, AS, DNS, URL) originally generated by WildFire |
Configuration Location |
Antivirus Profile
(WildFire Actions section)
|
Antivirus Profile
,
Anti-Spyware Profile
,
DNS Security Profile
,
URL Filtering Profile
(within standard signature/category actions)
|
Timing of Protection | Near real-time (as soon as verdict is known) | After signature generation and distribution via Content Update |
Primary Purpose | Immediate blocking of known malicious hashes/URLs based on WildFire's database | Broader protection against known threats using standard security engines powered by WildFire intelligence |
Both mechanisms work together. Verdict actions provide faster blocking for items WildFire *already* knows about. Signature actions provide protection once the formal signature is created and distributed.
After WildFire analyzes a sample and confirms it is malicious, a crucial part of the process is the automatic generation and distribution of protective signatures:
This signature generation and distribution process is distinct from the immediate verdict lookup performed by the firewall for known hashes/URLs.
Palo Alto Networks frequently publishes dynamic content updates containing the latest security intelligence, including WildFire-generated signatures. Understanding the different update types and timing is important:
Configuration:
Update schedules are configured under
Device > Dynamic Updates
.
While real-time WildFire updates provide the fastest signature delivery, regular Antivirus and Applications and Threats updates are still essential for comprehensive protection.
Configure Decryption Profiles (
Objects > Decryption > Decryption Profile
) to maximize security posture during decryption:
To ensure visibility for decryption and inspection, it is a best practice to block the QUIC protocol commonly used by Google Chrome and other services.
Policies > Security
) to block traffic:
quic
, Action
Deny
.
Deny
. (Place below legitimate UDP rules).
Palo Alto Networks DNS Security service provides enhanced protection against DNS-based threats, leveraging multiple techniques including signatures derived from WildFire analysis.
DNS Security complements WildFire file/URL analysis by blocking threats at the domain resolution stage.
After analyzing samples and identifying malware, the WildFire cloud automatically generates signatures to protect against the discovered threat and its variants. These signatures are not just for the specific submitted file hash but often cover broader patterns or C2 communication.
This means protection via WildFire-generated signatures relies on both the analysis process *and* the timely download and installation of Content Updates on the firewall.
Palo Alto Networks delivers various dynamic content updates to keep firewalls equipped with the latest protections without requiring PAN-OS upgrades. Key update types relevant to WildFire include:
Update Type | Content Includes (Relevant to WildFire) | Frequency / License Notes |
---|---|---|
Antivirus |
|
Daily default. WildFire malware signatures available every ~5 mins with WildFire License (see Real-time Updates below). Base AV updates included with support. |
Applications and Threats |
|
Requires Threat Prevention License . Threat updates are frequent (multiple times per week); New App-IDs published monthly (3rd Tuesday). |
WildFire |
|
Requires WildFire License . This is the fastest way to get new malware protection. |
WF-Private |
|
Requires Private WildFire appliance deployment and appropriate firewall configuration. |
Configuration:
Update schedules are configured under
Device > Dynamic Updates
.
Device > Setup > WildFire > General Settings
). While defaults cover most malware, increasing limits (especially for PEs) might catch uncommon large threats but can impact forwarding capacity if many large files are seen.
Monitor > Logs > WildFire Submissions
to verify forwarding is occurring and to identify potential custom internal applications being flagged, which might require exclusion or signature development.
Device > Setup > Session / Content-ID
) to prevent evasion techniques.
For the PCNSE exam, regarding WildFire Signatures and Actions:
1. How does a PAN-OS firewall typically receive protections against a specific malware file previously identified by the WildFire cloud?
2. Where would you configure the action (e.g., block, alert, sinkhole) for a DNS signature that was generated based on WildFire analysis?
3. How are actions configured for WildFire-generated Anti-Spyware signatures (e.g., for C2 traffic)?
4. What is the primary mechanism for distributing WildFire-generated signatures to PAN-OS firewalls?
5. For an Antivirus signature generated by WildFire to detect malware inside an HTTPS download, what is typically required?
6. Which Security Profile type handles actions for URLs categorized as `malware` or `phishing` based on WildFire intelligence?
7. What is the main difference between a WildFire *verdict* action and a WildFire *signature* action?
8. To ensure timely protection from new threats identified by WildFire, what firewall maintenance task is crucial?
9. Where would you primarily monitor events where a WildFire-generated Anti-Spyware signature for C2 traffic was matched and blocked?
10. True or False: Configuring WildFire verdict actions in the Antivirus profile is sufficient; you don't need to apply standard Antivirus or Anti-Spyware profiles to security rules if you have WildFire.