The WildFire cloud analysis service is designed to inspect a wide variety of file types commonly used to deliver malware or conduct malicious activity. The firewall uses WildFire Analysis Profiles to determine which specific file types, seen traversing allowed sessions, should be forwarded for analysis if their verdict is unknown.
Furthermore, there are limits on the maximum size of files that can be submitted for analysis, both configurable on the firewall and inherent to the WildFire cloud/appliance infrastructure. Understanding these supported types and size limits is crucial for effective WildFire configuration.
WildFire supports analysis for a broad range of file types known to be vectors for threats. The specific list evolves, but key categories commonly configured for submission in WildFire Analysis Profiles (
Objects > Security Profiles > WildFire Analysis
) include:
File Type Category | Examples & Description | Common Threat Vector? |
---|---|---|
PE
|
Windows Portable Executables (.exe, .dll, .sys, .scr, etc.) | Very High (Primary malware delivery) |
PDF
|
Adobe Portable Document Format (.pdf) | High (Can contain exploits, malicious scripts, phishing links) |
MS-Office
|
Microsoft Office documents (.doc/x, .xls/x, .ppt/x, .rtf, etc.) | High (Commonly use macros or embedded exploits) |
APK
|
Android Application Package (.apk) | High (Mobile malware delivery) |
Script
|
Various script types (e.g., PowerShell .ps1, JavaScript .js, VBScript .vbs, HTML Application .hta) | High (Used for droppers, fileless malware, exploits) |
Archive
|
Compressed files (.zip, .rar, .7z, .jar, etc.). WildFire attempts to analyze *contents* if not password-protected. | Medium/High (Often used to package malware) |
jar
|
Java Archive (.jar). Subset of Archive, often listed separately. | Medium (Java exploits or malicious applets) |
Flash
|
Adobe Flash files (.swf) | Medium (Historically high, decreasing as Flash is deprecated, but exploits still exist) |
MacOSX
|
macOS specific executables and file types (.dmg, Mach-O files, etc.) | Medium (Increasing macOS malware) |
Linux
|
ELF executables and potentially other Linux-specific formats. | Medium (Increasing Linux malware/IoT threats) |
Email Link
|
Analyzes URLs found within email bodies (requires firewall visibility into email protocols like SMTP, IMAP, POP). | Very High (Primary phishing vector) |
any
|
Forwards *all* unrecognized file types encountered. | Variable (Includes benign types. Generally NOT Recommended ). |
This is not exhaustive and specific options may vary slightly by PAN-OS version. Always refer to the firewall GUI (
Objects > Security Profiles > WildFire Analysis > Add > Analysis Tab > File Types
) for the definitive list applicable to your version.
You can configure the maximum size for *each file type* that the firewall will attempt to forward to WildFire.
Device > Setup > WildFire > General Settings
(Edit the 'General Settings')
The WildFire service itself (both public cloud and private appliance) has maximum file sizes it can accept and analyze. These limits may be higher than the firewall's default forwarding limits.
The effective maximum size for submission is the lower of the limit configured on the firewall and the limit supported by the WildFire destination (cloud or appliance).
The provided text highlights that while defaults are generally good, increasing limits can catch uncommon, larger malware files, but at the cost of potentially higher bandwidth usage and forwarding load.
File Type | Typical Default Limit (Approx.)* | Example Recommended Max (PAN-OS 9.0+)* |
---|---|---|
pe | ~10-16MB | 16MB |
apk | ~10MB | 10MB |
~1-3MB | 3MB (3,072KB) | |
ms-office | ~2-16MB | 16MB (16,384KB) |
jar | ~5MB | 5MB |
flash | ~5MB | 5MB |
MacOSX | ~1-10MB | 10MB |
archive | ~10-50MB | 50MB |
linux | ~10-50MB | 50MB |
script | ~20KB | 20KB |
*Note: These values are illustrative based on the text provided and official documentation for specific PAN-OS versions should always be consulted for exact defaults and maximums. Default values can change between versions.
While you don't configure a specific "maximum number of files per day" limit directly on the firewall for automatic WildFire submissions, several factors effectively limit the volume:
Device > Setup > WildFire > General Settings
) and also limited by the WildFire cloud/appliance infrastructure.
wildfire.paloaltonetworks.com
).
In summary: For automatic firewall submissions, the primary constraint is the firewall's forwarding rate capacity , not a fixed daily number. Monitor for skipped submissions if you suspect high volume is an issue. Manual portal submissions *do* have a defined daily limit per user account.
For the PCNSE exam, understand:
Device > Setup > WildFire > General Settings
.
1. In which PAN-OS configuration object do you primarily select the specific *file types* (e.g., PE, PDF, MS-Office) to be forwarded to WildFire?
2. Why is selecting `any` for 'File Types' in a WildFire Analysis Profile generally discouraged?
3. Where on the PAN-OS firewall are the maximum file size limits *for forwarding* to WildFire configured per file type?
4. What is the typical recommendation regarding the default file size limits configured on the firewall for WildFire forwarding?
5. Can the firewall forward a file to WildFire if it was transferred within an encrypted SSL/TLS session that was NOT decrypted?