PAN-OS: WildFire Supported File Types & Size Limits

Introduction: What WildFire Analyzes

The WildFire cloud analysis service is designed to inspect a wide variety of file types commonly used to deliver malware or conduct malicious activity. The firewall uses WildFire Analysis Profiles to determine which specific file types, seen traversing allowed sessions, should be forwarded for analysis if their verdict is unknown.

Furthermore, there are limits on the maximum size of files that can be submitted for analysis, both configurable on the firewall and inherent to the WildFire cloud/appliance infrastructure. Understanding these supported types and size limits is crucial for effective WildFire configuration.

Supported File Types for WildFire Analysis

WildFire supports analysis for a broad range of file types known to be vectors for threats. The specific list evolves, but key categories commonly configured for submission in WildFire Analysis Profiles ( Objects > Security Profiles > WildFire Analysis ) include:

File Type Category Examples & Description Common Threat Vector?
PE Windows Portable Executables (.exe, .dll, .sys, .scr, etc.) Very High (Primary malware delivery)
PDF Adobe Portable Document Format (.pdf) High (Can contain exploits, malicious scripts, phishing links)
MS-Office Microsoft Office documents (.doc/x, .xls/x, .ppt/x, .rtf, etc.) High (Commonly use macros or embedded exploits)
APK Android Application Package (.apk) High (Mobile malware delivery)
Script Various script types (e.g., PowerShell .ps1, JavaScript .js, VBScript .vbs, HTML Application .hta) High (Used for droppers, fileless malware, exploits)
Archive Compressed files (.zip, .rar, .7z, .jar, etc.). WildFire attempts to analyze *contents* if not password-protected. Medium/High (Often used to package malware)
jar Java Archive (.jar). Subset of Archive, often listed separately. Medium (Java exploits or malicious applets)
Flash Adobe Flash files (.swf) Medium (Historically high, decreasing as Flash is deprecated, but exploits still exist)
MacOSX macOS specific executables and file types (.dmg, Mach-O files, etc.) Medium (Increasing macOS malware)
Linux ELF executables and potentially other Linux-specific formats. Medium (Increasing Linux malware/IoT threats)
Email Link Analyzes URLs found within email bodies (requires firewall visibility into email protocols like SMTP, IMAP, POP). Very High (Primary phishing vector)
any Forwards *all* unrecognized file types encountered. Variable (Includes benign types. Generally NOT Recommended ).

This is not exhaustive and specific options may vary slightly by PAN-OS version. Always refer to the firewall GUI ( Objects > Security Profiles > WildFire Analysis > Add > Analysis Tab > File Types ) for the definitive list applicable to your version.

WildFire File Size Limits

Configurable Limits on the Firewall

You can configure the maximum size for *each file type* that the firewall will attempt to forward to WildFire.

WildFire Cloud/Appliance Limits

The WildFire service itself (both public cloud and private appliance) has maximum file sizes it can accept and analyze. These limits may be higher than the firewall's default forwarding limits.

The effective maximum size for submission is the lower of the limit configured on the firewall and the limit supported by the WildFire destination (cloud or appliance).

Default vs. Recommended Maximums (Example based on provided text)

The provided text highlights that while defaults are generally good, increasing limits can catch uncommon, larger malware files, but at the cost of potentially higher bandwidth usage and forwarding load.

File Type Typical Default Limit (Approx.)* Example Recommended Max (PAN-OS 9.0+)*
pe ~10-16MB 16MB
apk ~10MB 10MB
pdf ~1-3MB 3MB (3,072KB)
ms-office ~2-16MB 16MB (16,384KB)
jar ~5MB 5MB
flash ~5MB 5MB
MacOSX ~1-10MB 10MB
archive ~10-50MB 50MB
linux ~10-50MB 50MB
script ~20KB 20KB

*Note: These values are illustrative based on the text provided and official documentation for specific PAN-OS versions should always be consulted for exact defaults and maximums. Default values can change between versions.

WildFire File Submission Limits

While you don't configure a specific "maximum number of files per day" limit directly on the firewall for automatic WildFire submissions, several factors effectively limit the volume:

  1. Firewall Forwarding Capacity (Rate Limit):

    • What it is: Each firewall model has a finite capacity for processing and forwarding unknown files to WildFire. This limit is based on the firewall's hardware resources (CPU, memory, internal queuing space). It's essentially a rate limit rather than a daily counter.
    • Impact: If the firewall receives unknown files (matching the WildFire Analysis Profile) faster than it can forward them (due to high traffic volume, large file sizes, or network latency to WildFire), its internal queue may fill up.
    • Result of Exceeding Capacity: When the forwarding queue is full, the firewall will start skipping the submission of subsequent unknown files until capacity becomes available. Skipped files will not be analyzed by WildFire unless encountered again later.
    • Monitoring: You can monitor for skipped files using CLI commands (e.g., checking specific system counters or WildFire statistics) or potentially via SNMP, though direct "skipped count" visibility can vary by PAN-OS version. High skip counts indicate the firewall is potentially undersized for the submission load or that submission criteria (file types/sizes) are too broad.
  2. Per-File Size Limits:

    • What it is: As discussed previously, limits exist for the maximum size of individual files that can be forwarded. This is configured on the firewall ( Device > Setup > WildFire > General Settings ) and also limited by the WildFire cloud/appliance infrastructure.
    • Impact: Files larger than the configured or supported limit for their type will not be submitted, regardless of daily volume.
  3. Manual Portal Submission Limits:

    • What it is: This applies when administrators or users manually upload files directly via the WildFire web portal ( wildfire.paloaltonetworks.com ).
    • Limit: There *is* a defined daily limit per user account for manual submissions. For standard support accounts, this is typically 5 files per day . Premium WildFire subscriptions may offer higher manual submission limits.
    • Impact: This limit restricts ad-hoc analysis via the portal but does *not* affect the automatic submissions from configured firewalls.
  4. WildFire Subscription/Cloud Capacity:

    • While not usually presented as a hard daily limit to the end-user firewall, the WildFire cloud infrastructure itself has enormous but ultimately finite processing capacity. In extremely widespread, high-volume submission events (like a massive global outbreak of a new variant), there could theoretically be processing delays, though the system is designed for high scale. Private WildFire appliances have capacity limits based on their model.

In summary: For automatic firewall submissions, the primary constraint is the firewall's forwarding rate capacity , not a fixed daily number. Monitor for skipped submissions if you suspect high volume is an issue. Manual portal submissions *do* have a defined daily limit per user account.

Best Practices

Caveats and Considerations

PCNSE Exam Focus

For the PCNSE exam, understand:

WildFire File Types & Sizes Quiz

1. In which PAN-OS configuration object do you primarily select the specific *file types* (e.g., PE, PDF, MS-Office) to be forwarded to WildFire?

The WildFire Analysis profile (Objects > Security Profiles > WildFire Analysis) is where you define the criteria for submission, including the specific file types to forward when encountered in allowed traffic.

2. Why is selecting `any` for 'File Types' in a WildFire Analysis Profile generally discouraged?

Forwarding `any` file type results in numerous submissions of harmless files (images, text files, etc.), consuming upload bandwidth and potentially overwhelming the firewall's forwarding queue, possibly causing actually malicious files to be skipped.

3. Where on the PAN-OS firewall are the maximum file size limits *for forwarding* to WildFire configured per file type?

The global settings for WildFire, including the maximum size limits for forwarding different file types, are configured under Device > Setup > WildFire.

4. What is the typical recommendation regarding the default file size limits configured on the firewall for WildFire forwarding?

The default limits are generally optimized to catch the majority of threats without excessive resource consumption. Increasing them should only be done cautiously if there's a specific concern about larger malicious files of a certain type.

5. Can the firewall forward a file to WildFire if it was transferred within an encrypted SSL/TLS session that was NOT decrypted?

Visibility is key. Without SSL decryption (Forward Proxy or Inbound Inspection), the firewall sees only encrypted data and cannot identify or forward the actual file hidden inside the TLS tunnel to WildFire.