PAN-OS: Configuring WildFire Analysis Profiles (Submissions)

Introduction: Analyzing the Unknown

WildFire® is Palo Alto Networks' cloud-based malware analysis service designed to detect and prevent unknown, zero-day threats. Traditional signature-based security relies on previously identified patterns, but advanced threats often use new or polymorphic techniques to evade detection. WildFire addresses this by analyzing unknown files and links in a secure sandbox environment.

When the firewall encounters a file or web link it doesn't recognize (i.e., no existing signature or known verdict), it can be configured to forward a sample to the WildFire cloud (or a private WildFire appliance) for analysis. Based on the analysis, WildFire returns a verdict ( Benign, Grayware, Malware, Phishing ). If malicious, WildFire automatically generates new protections (signatures) that are distributed globally via content updates, protecting all subscribed customers.

WildFire Analysis Profiles are the configuration objects used on the firewall to define *which* unknown files and links should be submitted for analysis.

How WildFire Submission Works

  1. Traffic Inspection: A user downloads a file or clicks a link. The traffic passes through the firewall and matches a Security Policy rule with Action `Allow`.
  2. Security Profile Check: The Security rule has an attached WildFire Analysis Profile.
  3. Forwarding Decision: The firewall checks if it has a known verdict for the file's hash or the link's URL. If the verdict is unknown and the file type, application, and traffic direction match the criteria defined in the WildFire Analysis Profile, the firewall forwards the sample.
  4. WildFire Cloud/Appliance Analysis: The WildFire service receives the sample and performs static analysis, dynamic analysis (detonation in a sandbox), and machine learning analysis.
  5. Verdict Returned: WildFire determines a verdict (Benign, Grayware, Malware, Phishing) and sends it back to the submitting firewall (and globally).
  6. Log Generation: The firewall logs the submission and the verdict in the WildFire Submissions log.
  7. Signature Generation (if Malicious): If the sample is malicious, WildFire generates new C2, DNS, Antivirus, and potentially other signatures.
  8. Content Update Distribution: These new signatures are included in subsequent Content Updates downloaded by subscribed firewalls worldwide.
graph TD
    A[User Downloads Unknown File Link] --> B(Firewall Security Policy Match, Action=Allow);
    B --> C{Apply WildFire Analysis Profile};
    C -- Matches Criteria? --> D{Forward Sample};
    D --> E[WildFire Cloud - Private Appliance Analysis];
    E -- Verdict --> B;
    B --> F[Log Submission & Verdict];
    E -- If Malicious --> G(Generate Signatures);
    G --> H(Distribute via Content Updates);
    H --> AllFWs[Other Subscribed Firewalls];

    style E fill:#eaf2f8,stroke:#aed6f1,stroke-width:2px
    style H fill:#fdebd0,stroke:#f5b041,stroke-width:1px

     
Simplified WildFire Submission and Protection Flow.

Configuring a WildFire Analysis Profile

Location and Parameters

Parameter (Analysis Tab) Description Best Practice Recommendation
Name Descriptive name (e.g., `WildFire-Forward-Executables-Office`). Required
Applications Specify applications for which files/links should be forwarded. Can be `any` or a selection. `any` - Ensures files transferred via any application are analyzed, maximizing visibility.
File Types Select specific file types to forward (e.g., PE, PDF, Office, APK, Scripts) or `any`. Select common threat vectors (PE, PDF, MS Office, Scripts, APK, Flash, Java Archives, etc.). Avoid `any` unless you have specific needs and understand the volume/privacy implications, as it can forward benign file types unnecessarily.
Direction Choose `upload`, `download`, or `both`. `both` - Threats can enter via downloads and data can be exfiltrated via uploads.
Maximum File Size Defines the max size (MB) for submitted files (cloud limits vary but generally up to 100MB or more for PE, lower for others). Leave defaults unless specific reason to change; ensure it's within cloud/appliance limits.
Report Benign Files / Report Grayware Files Forward files even if previously determined benign/grayware by WildFire (e.g., for re-analysis or logging). Usually leave unchecked unless needed for specific forensic or analysis purposes (can increase submission volume).

Cloud Settings Tab:

Applying the Profile

Attaching to Security Policy Rules

A WildFire Analysis Profile only takes effect when applied to Security Policy rules.

Typically, apply WildFire Analysis profiles to rules allowing traffic ingress from untrusted zones (like the internet) and potentially egress to untrusted zones to catch both malicious downloads and uploads/exfiltration attempts.

Best Practices

Caveats and Considerations

WildFire License vs. No License: Antivirus Protection Speed Comparison

Feature With WildFire License Without WildFire License
Signature Update Frequency Real-time updates as soon as signatures are generated Every 24–48 hours via standard antivirus updates
File Analysis Capabilities Supports advanced file types including PE, APK, PDF, Office documents, and scripts Limited to basic PE file analysis
Inline Machine Learning (ML) Enabled for real-time detection of unknown threats Not available
API Access Full access to submit files and retrieve analysis reports Not available
Hold Mode for Real-Time Signature Lookup Available to delay file delivery until signature verdict is received Not available

For more detailed information, refer to the official Palo Alto Networks documentation on Advanced WildFire Subscription .

PCNSE Exam Focus

For the PCNSE exam, regarding WildFire Submissions:

WildFire Submission Quiz

1. What is the primary purpose of the WildFire service?

WildFire's core function is to analyze previously unseen files and links using sandboxing and machine learning to identify new, unknown threats that traditional signatures would miss.

2. Which PAN-OS object defines the criteria (e.g., file types, applications, direction) for submitting samples to WildFire?

The WildFire Analysis Profile (Objects > Security Profiles > WildFire Analysis) is where you specify which applications, file types, and traffic directions are eligible for submission to the WildFire cloud or appliance.

3. How is a WildFire Analysis Profile applied to inspect traffic?

Like other Security Profiles (AV, AS, VP, etc.), WildFire Analysis profiles are applied within the 'Actions' tab of Security Policy rules that have their Action set to 'Allow'.

4. What is required for WildFire to analyze a malicious file downloaded by a user over an HTTPS connection?

WildFire cannot see inside encrypted traffic. To submit a file transferred over HTTPS, the firewall must first decrypt the SSL/TLS session using SSL Forward Proxy. The WildFire Analysis profile is then applied to the decrypted flow.

5. Which setting in the WildFire Analysis profile is generally recommended for the 'Applications' criteria to maximize visibility?

Threats can be delivered via numerous applications (email, web, file sharing, custom apps). Setting Applications to `any` ensures that unknown files encountered in *any* allowed application flow (matching the profile's file types/direction) are submitted for analysis.

6. What is the primary difference between using the Public WildFire Cloud versus a Private WildFire Appliance?

The main differentiator is data location. Public Cloud submissions leave the organizational boundary. A Private WildFire Appliance (WF-500 or VM) allows analysis to occur entirely within the customer's network, addressing data privacy or residency concerns. Both provide verdicts and signature generation capabilities.

7. After WildFire analyzes a file and determines it is malware, how does the firewall typically receive protection against future encounters with that file?

WildFire automatically generates various signature types (Antivirus, DNS, C2, etc.) for confirmed malicious files/links. These signatures are then distributed globally to all subscribed firewalls through the standard Content Update process.

8. Which log type on the PAN-OS firewall specifically tracks files submitted to WildFire and the verdicts received?

The WildFire Submissions log (Monitor > Logs > WildFire Submissions) provides details about each file or URL forwarded, the session information, and the eventual verdict returned by the WildFire service.

9. What is required on the firewall to use the WildFire analysis service?

A specific WildFire license/subscription is required to enable the forwarding of samples to the WildFire cloud or appliance and to receive the resulting signatures and verdicts.

10. What is a primary reason why configuring 'File Types' to `any` in a WildFire Analysis profile is generally NOT recommended?

Setting file types to `any` means the firewall will forward *every* unknown file type encountered (images, text files, logs, etc.). This drastically increases submission volume, consumes unnecessary bandwidth, and raises the possibility of unintentionally sending sensitive, non-malicious files for analysis. It's better to focus on specific high-risk file types.