PAN-OS: Configuring Actions for WildFire Signatures

Introduction: Leveraging WildFire-Generated Protections

After the WildFire cloud service analyzes an unknown file or URL and determines it to be malicious (Malware, Phishing) or unwanted (Grayware), it doesn't just stop at providing a verdict. A key part of the WildFire ecosystem is the automatic generation of new signatures based on this analysis. These signatures provide proactive protection against future encounters with the same or similar threats.

These WildFire-generated signatures are then distributed globally via Content Updates . Once downloaded by a PAN-OS firewall, these signatures are used by the existing security engines (Antivirus, Anti-Spyware, DNS Security, URL Filtering) to detect the threat. The action taken when a WildFire-generated signature matches traffic is configured within the corresponding Security Profile (Antivirus, Anti-Spyware, etc.), just like any other vendor-provided signature.

This topic focuses on configuring the firewall's response when traffic matches a signature that was *created* as a result of WildFire analysis, distinguishing it from the immediate action based on a WildFire *verdict* (configured in the Antivirus profile) or the submission of *unknown* files (configured in the WildFire Analysis profile).

Types of WildFire-Generated Signatures

WildFire automatically generates various types of protections based on its analysis:

The key point is that these are standard signature types, delivered via Content Updates, but their *origin* is the WildFire analysis process.

Configuring Actions for WildFire Signatures (via Security Profiles)

Because WildFire-generated signatures become part of the standard signature databases, the actions taken upon matching them are configured within the standard Security Profiles:

  1. Antivirus Profiles:

    • Location: Objects > Security Profiles > Antivirus
    • Mechanism: WildFire-generated AV signatures are treated like any other AV signature.
    • Configuration: Configure the desired action (e.g., `reset-both`, `drop`, `alert`) for specific decoders (like HTTP, SMTP, FTP, SMB) or globally within the profile. The action set for the relevant decoder will apply when a WildFire AV signature matches a file transferred over that protocol.
    • Recommendation: Set actions to `reset-both`, `drop`, or `block` for relevant protocols to prevent malware delivery.
  2. Anti-Spyware Profiles:

    • Location: Objects > Security Profiles > Anti-Spyware
    • Mechanism: WildFire-generated C2 signatures are categorized, typically under spyware types like `command-and-control` or specific malware families, and assigned a severity (Critical, High, Medium, etc.).
    • Configuration: Configure actions based on Severity or create specific rules targeting WildFire-related categories or individual Threat IDs. Actions include `alert`, `drop`, `reset-client`, `reset-server`, `reset-both`, `block-ip`. DNS Security actions (if not using a separate DNS Security profile) are also configured here (e.g., `sinkhole`, `block`).
    • Recommendation: Set actions to `reset-both`, `drop`, or `block-ip` for Critical/High/Medium severity spyware signatures, including those generated by WildFire. Configure DNS Sinkhole or Block for malicious domains.
  3. DNS Security Profiles (If Licensed/Used):

    • Location: Objects > Security Profiles > DNS Security
    • Mechanism: Leverages Palo Alto Networks' DNS signature database, which includes domains identified by WildFire as malicious.
    • Configuration: Define actions (`allow`, `alert`, `block`, `sinkhole`) for various threat categories, including those populated by WildFire intelligence.
    • Recommendation: Use `sinkhole` (preferred) or `block` for known malicious DNS categories.
  4. URL Filtering Profiles:

    • Location: Objects > Security Profiles > URL Filtering
    • Mechanism: WildFire contributes URLs to the `malware` and `phishing` categories within the PAN-DB URL database.
    • Configuration: Configure actions (`alert`, `allow`, `block`, `continue`, `override`) for the `malware` and `phishing` URL categories within the profile.
    • Recommendation: Set action to `block` for both `malware` and `phishing` categories.

Applying the Profiles:

Relationship to WildFire Verdict Actions

It's crucial to distinguish between actions based on WildFire *signatures* and actions based on WildFire *verdicts*:

Feature WildFire Verdict Actions WildFire Signature Actions
Trigger Firewall sees a file hash/URL with a known verdict (from cache or cloud lookup) Firewall content matches a downloaded signature (AV, AS, DNS, URL) originally generated by WildFire
Configuration Location Antivirus Profile (WildFire Actions section) Antivirus Profile , Anti-Spyware Profile , DNS Security Profile , URL Filtering Profile (within standard signature/category actions)
Timing of Protection Near real-time (as soon as verdict is known) After signature generation and distribution via Content Update
Primary Purpose Immediate blocking of known malicious hashes/URLs based on WildFire's database Broader protection against known threats using standard security engines powered by WildFire intelligence

Both mechanisms work together. Verdict actions provide faster blocking for items WildFire *already* knows about. Signature actions provide protection once the formal signature is created and distributed.

Best Practices

WildFire Signature Generation and Distribution

After WildFire analyzes a sample and confirms it is malicious, a crucial part of the process is the automatic generation and distribution of protective signatures:

This signature generation and distribution process is distinct from the immediate verdict lookup performed by the firewall for known hashes/URLs.

Content Updates and WildFire Signature Timing

Palo Alto Networks frequently publishes dynamic content updates containing the latest security intelligence, including WildFire-generated signatures. Understanding the different update types and timing is important:

Configuration: Update schedules are configured under Device > Dynamic Updates .

While real-time WildFire updates provide the fastest signature delivery, regular Antivirus and Applications and Threats updates are still essential for comprehensive protection.

Decryption Profile Best Practices (Related to WildFire/Threats)

Configure Decryption Profiles ( Objects > Decryption > Decryption Profile ) to maximize security posture during decryption:

Best Practice: Block QUIC Protocol

To ensure visibility for decryption and inspection, it is a best practice to block the QUIC protocol commonly used by Google Chrome and other services.

Leveraging DNS Security with WildFire Intelligence

Palo Alto Networks DNS Security service provides enhanced protection against DNS-based threats, leveraging multiple techniques including signatures derived from WildFire analysis.

DNS Security complements WildFire file/URL analysis by blocking threats at the domain resolution stage.

WildFire Signature Generation and Distribution

After analyzing samples and identifying malware, the WildFire cloud automatically generates signatures to protect against the discovered threat and its variants. These signatures are not just for the specific submitted file hash but often cover broader patterns or C2 communication.

This means protection via WildFire-generated signatures relies on both the analysis process *and* the timely download and installation of Content Updates on the firewall.

Dynamic Content Updates and WildFire

Palo Alto Networks delivers various dynamic content updates to keep firewalls equipped with the latest protections without requiring PAN-OS upgrades. Key update types relevant to WildFire include:

Update Type Content Includes (Relevant to WildFire) Frequency / License Notes
Antivirus
  • WildFire malware signatures (Daily default)
  • Auto-generated C2 signatures (Requires Threat Prevention)
  • Built-in EDL updates (Malicious IPs, etc.) (Requires Threat Prevention)
  • Local DNS signature updates (Requires Threat Prevention)
Daily default. WildFire malware signatures available every ~5 mins with WildFire License (see Real-time Updates below). Base AV updates included with support.
Applications and Threats
  • Includes everything in Antivirus updates.
  • Adds new/updated App-IDs.
  • Adds new/updated Threat signatures (beyond WildFire C2).
Requires Threat Prevention License . Threat updates are frequent (multiple times per week); New App-IDs published monthly (3rd Tuesday).
WildFire
  • Provides near real-time access (as fast as every minute) to new malware signatures generated by the WildFire public cloud.
Requires WildFire License . This is the fastest way to get new malware protection.
WF-Private
  • Provides near real-time signatures generated by an on-premise WildFire appliance (WF-500/VM) .
Requires Private WildFire appliance deployment and appropriate firewall configuration.

Configuration: Update schedules are configured under Device > Dynamic Updates .

WildFire Configuration Best Practices Summary

Decryption Profile Best Practices (Summary)

Decryption Policy Best Practices (Summary)

Supporting Best Practices for Decryption & WildFire

Caveats and Considerations

PCNSE Exam Focus

For the PCNSE exam, regarding WildFire Signatures and Actions:

WildFire Signature Actions Quiz

1. How does a PAN-OS firewall typically receive protections against a specific malware file previously identified by the WildFire cloud?

WildFire generates standard Antivirus signatures for files it deems malicious. These signatures are then distributed to firewalls via Content Updates, allowing the Antivirus engine to block the file upon subsequent encounters.

2. Where would you configure the action (e.g., block, alert, sinkhole) for a DNS signature that was generated based on WildFire analysis?

DNS signatures, including those sourced from WildFire intelligence, are actioned upon based on the settings within the DNS Security profile (preferred) or the Anti-Spyware profile applied to the Security Policy rule governing the DNS traffic.

3. How are actions configured for WildFire-generated Anti-Spyware signatures (e.g., for C2 traffic)?

WildFire C2 signatures become part of the Anti-Spyware database. Actions are configured in the Anti-Spyware profile (Objects > Security Profiles > Anti-Spyware), typically by setting default actions for different severity levels (Critical, High, etc.) or creating specific rules.

4. What is the primary mechanism for distributing WildFire-generated signatures to PAN-OS firewalls?

Newly generated WildFire signatures (AV, AS, DNS, etc.) are packaged and distributed globally as part of the standard Palo Alto Networks Content Updates.

5. For an Antivirus signature generated by WildFire to detect malware inside an HTTPS download, what is typically required?

Antivirus signatures match patterns within the file payload. If the file is downloaded over HTTPS, the firewall must first decrypt the session using SSL Forward Proxy to expose the payload to the Antivirus engine for signature matching.

6. Which Security Profile type handles actions for URLs categorized as `malware` or `phishing` based on WildFire intelligence?

WildFire contributes intelligence to the PAN-DB URL database. Actions (like `block`) for specific categories, including `malware` and `phishing`, are configured within the URL Filtering Security Profile.

7. What is the main difference between a WildFire *verdict* action and a WildFire *signature* action?

Verdict actions (in the AV profile) leverage the real-time or cached verdict database for immediate response to known items. Signature actions rely on the firewall downloading and installing the corresponding signature via a Content Update after WildFire generates it.

8. To ensure timely protection from new threats identified by WildFire, what firewall maintenance task is crucial?

Since WildFire-generated signatures are distributed via Content Updates, keeping the firewall updated with the latest content is essential to receive and apply these protections promptly.

9. Where would you primarily monitor events where a WildFire-generated Anti-Spyware signature for C2 traffic was matched and blocked?

Matches against Anti-Spyware signatures, including those generated by WildFire for C2 activity, are recorded as threat events in the Threat log, typically with a subtype of 'spyware' and referencing the specific Threat ID.

10. True or False: Configuring WildFire verdict actions in the Antivirus profile is sufficient; you don't need to apply standard Antivirus or Anti-Spyware profiles to security rules if you have WildFire.

False. WildFire verdict actions (in the AV profile) handle *known* WildFire verdicts. Standard AV/AS profiles handle *signature matching* (including WildFire-generated signatures) and broader threat detection. Both are necessary components of layered security. The actions for WildFire *signatures* are configured within the AV/AS profiles themselves.