The effectiveness of WildFire and Threat Prevention relies heavily on the firewall having access to the latest threat intelligence and signatures. Palo Alto Networks constantly updates its signature databases based on analysis from the WildFire cloud and other threat research.
These updates are delivered to PAN-OS firewalls through various Dynamic Content Update packages. Configuring an appropriate schedule for downloading and installing these updates is crucial for maintaining optimal security posture and leveraging the protections generated by WildFire in a timely manner.
Several Content Update types contain protections derived directly or indirectly from WildFire analysis:
Update Type | WildFire-Related Content | Typical Frequency / License Notes |
---|---|---|
WildFire | Malware and Antivirus signatures generated by the WildFire public cloud. | Requires WildFire License . Can be scheduled as frequently as every 1 minute for near real-time signature delivery. |
WF-Private | Malware and Antivirus signatures generated by an on-premise WildFire appliance (WF-500/VM). | Requires Private WildFire appliance. Schedule configured similarly to public WildFire updates. |
Antivirus | Includes WildFire malware signatures (if no WildFire license, these are delivered ~24-48 hours after generation). Includes auto-generated C2 signatures, EDL updates, local DNS signatures (Requires Threat Prevention license for C2/EDL/DNS). | Released approx. every 24 hours. Base AV requires support; additional content requires Threat Prevention. |
Applications and Threats | Includes everything in the Antivirus update PLUS new/updated App-IDs and other Threat Signatures (VP, AS C2 beyond auto-generated). | Requires Threat Prevention License . Threat updates released frequently (multiple times per week/daily). New App-IDs typically monthly. This package essentially replaces the separate Antivirus update if you have Threat Prevention. |
The WildFire Update package provides the *fastest* access to new malware signatures derived from WildFire analysis.
Device > Dynamic Updates
download-only
: Downloads the update but requires manual installation.
download-and-install
(Recommended for WildFire/Threats):
Automatically downloads and installs the update package at the scheduled interval.
disable
: Turns off automatic checking for this update type.
Ensure the firewall has reliable internet connectivity, DNS resolution, and appropriate Security Policy rules allowing it to reach the Palo Alto Networks update servers (Service Route might be needed).
For the PCNSE exam, understand:
1. Which Dynamic Content Update package provides the *fastest* delivery of newly generated WildFire malware signatures to the firewall?
2. What license is required to receive the near real-time WildFire signature updates (via the 'WildFire' dynamic content update)?
3. If a firewall only has a Threat Prevention license (but NO WildFire license), how does it typically receive malware signatures generated by WildFire?
4. Where in the PAN-OS GUI are the schedules for Dynamic Content Updates configured?
5. What is the recommended 'Action' setting when scheduling WildFire or Applications and Threats updates for maximum protection?
6. What potential impact can an "Applications and Threats" content update have on existing Security Policies?
7. Which license is generally required to receive updates containing C2 signatures, built-in EDL IPs, and DNS signatures within the Antivirus or Apps & Threats packages?
8. What prerequisite must be met for the firewall to successfully download any dynamic content update?
9. What is the recommended frequency for scheduling the 'WildFire' content update type if the license is active?
10. If an organization uses an on-premise WF-500 appliance, which dynamic update type should they configure firewalls to retrieve signatures from it?