While the WildFire Analysis Profile determines *which* unknown files get submitted to the WildFire cloud for analysis, another crucial part of the configuration determines *what the firewall should do* when it encounters a file for which WildFire has already returned a verdict (e.g., Malware, Phishing, Grayware, Benign).
These actions based on known WildFire verdicts are configured within the Antivirus Security Profile , not in a separate "WildFire Action Profile" object (though older documentation or concepts might sometimes use that term loosely).
Configuring these actions allows the firewall to immediately block known malicious files identified by WildFire, providing much faster protection than waiting for the next signature-based Content Update.
This process leverages the verdict database built by WildFire analysis but acts independently of the initial submission process defined by the WildFire Analysis Profile.
graph TD A[User Downloads File] --> B(Firewall: Security Policy Match, Action=Allow); B --> C{Apply Antivirus Profile}; C --> D{File Hash & Verdict Lookup: Local Cache / Cloud Query}; D -- Verdict Found e.g. Malware --> E{Check Action for 'Malware' in Antivirus Profile}; E -- Action = 'block' --> F[Block File Download]; E -- Action = 'alert' --> G[Allow File, Log Threat]; E -- Action = 'allow' --> H[Allow File, No Threat Log]; F --> I{Log Threat Log - Type: wildfire-virus}; G --> I; D -- Verdict = Benign --> J{Check Action for 'Benign'}; J -- Action = 'allow' --> H; style C fill:#d5f5e3,stroke:#58d68d,stroke-width:1px style E fill:#fdebd0,stroke:#f5b041,stroke-width:1pxSimplified Flow for WildFire Verdict Action Enforcement via Antivirus Profile.
Objects > Security Profiles > Antivirus
Add
or edit an existing Antivirus profile.
Verdict Type | Available Actions | Description & Recommendation |
---|---|---|
Malware |
alert
,
allow
,
drop
,
block
,
reset-client
,
reset-server
,
reset-both
|
Action taken when a file verdict is 'Malware'.
Recommendation:
block
or
drop
(or reset equivalent) to prevent known malware delivery.
|
Phishing |
alert
,
allow
,
drop
,
block
,
reset-client
,
reset-server
,
reset-both
,
sinkhole
|
Action taken for URLs/links with a 'Phishing' verdict (often checked during web access, relies on WildFire URL analysis).
Recommendation:
block
or
sinkhole
(redirects to a safe internal IP/FQDN).
|
Grayware |
alert
,
allow
,
drop
,
block
,
reset-client
,
reset-server
,
reset-both
|
Action for files classified as 'Grayware' (potentially unwanted programs - adware, some utilities).
Recommendation: Depends on policy. Often
alert
(to monitor) or
block
/
drop
if actively prohibited.
|
Benign |
alert
,
allow
|
Action for files confirmed as 'Benign'.
Recommendation:
allow
(default). Setting to
alert
can create excessive logging.
|
The firewall checks for verdicts in its local cache first. If not found, and if configured (
Device > Setup > WildFire > General Settings
), it can perform a real-time cloud lookup for a verdict before applying the action. This provides faster protection than waiting for the next Content Update.
To enforce the WildFire verdict actions, the configured Antivirus Profile must be attached to relevant Security Policy rules:
Policies > Security
Allow
.
Attaching the Antivirus profile enables both standard antivirus scanning AND the enforcement of actions based on WildFire verdicts for files traversing the matching Security Policy rules.
block
(or
drop
/
reset
) files with a 'Malware' verdict and
block
or
sinkhole
URLs with a 'Phishing' verdict. This is the primary security benefit.
alert
for visibility or
block
if it's considered unwanted software.
allow
unless you have a very specific reason to log them (which generates significant noise).
Device > Setup > WildFire
) for unknown files to get verdicts faster than waiting for signature updates (requires WildFire license).
For the PCNSE exam, understand:
Objects > Security Profiles > Antivirus
).
1. What is the primary function of configuring WildFire verdict actions?
2. Where are the actions for different WildFire verdicts (Malware, Grayware, Benign, Phishing) configured in PAN-OS?
3. What is the recommended best practice action in an Antivirus profile for files identified by WildFire with a 'Malware' verdict?
4. How are the WildFire verdict actions defined in an Antivirus profile enforced on network traffic?
5. To enforce WildFire verdict actions on files downloaded over HTTPS, what other feature must typically be enabled?
6. What firewall log type primarily records the actions taken based on WildFire verdicts (e.g., file blocked due to malware verdict)?
7. How does the firewall obtain the WildFire verdicts it uses to enforce actions defined in the Antivirus profile?
8. What action is typically recommended for the 'Grayware' verdict in the Antivirus profile's WildFire Actions?
9. Which PAN-OS component is responsible for generating new signatures AFTER WildFire determines a submitted file is malicious?
10. Does configuring WildFire verdict actions in an Antivirus profile eliminate the need for a WildFire Analysis profile?