PAN-OS: Understanding WildFire Submissions and Verdicts

Introduction: The WildFire Cycle

Palo Alto Networks WildFire service provides protection against unknown threats by analyzing suspicious files and links in a cloud-based or on-premises sandbox environment. This process involves two key phases relevant to the firewall's operation:

Understanding how submissions are triggered and how verdicts are generated and utilized is crucial for leveraging WildFire effectively.

The Submission Process

Triggering a Submission

A submission occurs when all the following conditions are met:

  1. A file or web link traverses the firewall.
  2. The traffic matches a Security Policy rule with an Action of `Allow` .
  3. That Security Policy rule has a WildFire Analysis Profile attached.
  4. The firewall checks its local cache and potentially the WildFire cloud for a pre-existing verdict for the file's hash or URL. No known verdict exists (the sample is unknown).
  5. The file type, application context, and traffic direction ( upload/download/both ) match the criteria defined within the attached WildFire Analysis Profile.

Role of the WildFire Analysis Profile

This profile ( Objects > Security Profiles > WildFire Analysis ) acts as the filter determining *what gets submitted*:

SSL/TLS Decryption is necessary to identify and submit files transferred within encrypted sessions.

Forwarding Mechanism

The Verdict Process

Analysis in WildFire

Once a sample is received by the WildFire cloud or appliance, it undergoes multiple stages of analysis:

Generating and Delivering Verdicts

Firewalls can also be configured for real-time cloud lookups for unknown hashes, getting verdicts faster than waiting for content updates, provided the sample has been analyzed previously by WildFire from any source.

Monitoring Submissions and Verdicts

WildFire Submissions Log

Threat Log

Best Practices Summary

Caveats and Considerations

PCNSE Exam Focus

For the PCNSE exam, understand:

WildFire Submissions & Verdicts Quiz

1. What triggers a file submission to WildFire from a PAN-OS firewall?

Submission is specifically for *unknown* files (no existing verdict). It requires the traffic to be allowed by Security Policy and match the criteria (file type, app, direction) in an attached WildFire Analysis Profile.

2. Which profile type defines *which* file types and applications are eligible for WildFire submission?

The WildFire Analysis Profile (Objects > Security Profiles > WildFire Analysis) contains the rules specifying which applications, file types, and directions trigger a submission for unknown samples.

3. Which WildFire verdict indicates potentially unwanted software, like adware, but is not necessarily classified as overtly malicious?

Grayware is the verdict category used for applications that might exhibit undesirable behavior (like displaying ads) but don't meet the threshold for actively malicious code.

4. How does a firewall typically receive protections (signatures) generated by WildFire after analyzing a new threat?

WildFire-generated signatures (AV, C2, DNS, etc.) are incorporated into the standard Palo Alto Networks Content Updates, which firewalls download periodically to stay protected against the latest threats.

5. What is the most significant limitation preventing WildFire submission for files downloaded over HTTPS?

If the HTTPS session is not decrypted by the firewall using SSL Forward Proxy, the firewall cannot extract the file from the encrypted stream to check its verdict or submit it if unknown. Decryption is essential.

6. Where are actions based on known WildFire verdicts (e.g., block file if verdict is 'Malware') configured?

Actions based on the verdicts returned by WildFire (Malware, Grayware, Phishing, Benign) are configured within the Antivirus Security Profile.

7. What is the primary difference between submitting to the WildFire Public Cloud vs. a Private WildFire Appliance?

The main reason organizations choose a Private Appliance is data control – keeping potentially sensitive unknown files within their own network for analysis, addressing privacy or data residency requirements. Both perform similar analysis.

8. Where would an administrator look to confirm if a specific file was submitted to WildFire and what verdict was returned?

The WildFire Submissions log (Monitor > Logs > WildFire Submissions) is specifically designed to track the forwarding of samples and the verdicts received from the analysis service.

9. What is a key prerequisite for enabling WildFire functionality on a PAN-OS firewall?

Using the WildFire service (either public cloud or private appliance) requires a specific WildFire subscription license activated on the firewall.

10. What does a 'Benign' verdict from WildFire indicate?

A 'Benign' verdict means WildFire successfully analyzed the file and found no evidence of malicious or grayware behavior, concluding it is safe.

References