WildFire Reporting. WildFire Administrator s Guide. Version 6.1



Similar documents
WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

WildFire Cloud File Analysis

WildFire Cloud File Analysis

WildFire Features. Palo Alto Networks. PAN-OS New Features Guide Version 6.1. Copyright Palo Alto Networks

Content Inspection Features

Manage Log Collection. Panorama Administrator s Guide. Version 7.0

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Manage Firewalls and Log Collection. Panorama Administrator s Guide. Version 6.0

WF-500 Appliance File Analysis

WF-500 File Analysis

Manage Licenses and Updates

About the VM-Series Firewall

Quality of Service. PAN-OS Administrator s Guide. Version 6.0

Content Filtering Client Policy & Reporting Administrator s Guide

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks


Monitor Network Activity

Steps for Basic Configuration

Configuring Trend Micro Content Security

Device Management. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

About the VM-Series Firewall

Installing and Configuring vcloud Connector

Reports and Logging. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Sophos for Microsoft SharePoint startup guide

Novell ZENworks Asset Management 7.5

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright Palo Alto Networks

SonicWALL Security Quick Start Guide. Version 4.6

Reports and Logging. PAN-OS Administrator s Guide. Version 6.1

Software Version 1.0 ConnectKey TM Share to Cloud April Xerox ConnectKey Share to Cloud User / Administrator s Guide

Configuration Information

How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)

Configuring PA Firewalls for a Layer 3 Deployment

Monitor Network Activity

Deploying Layered Security. What is Layered Security?

Smart Card Authentication. Administrator's Guide

Palo Alto Networks Users Group. February 2014

Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright Palo Alto Networks

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

TRITON Unified Security Center Help

Panorama High Availability

F-Secure Messaging Security Gateway. Deployment Guide

PAN-OS Syslog Integration

Troubleshooting. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright Palo Alto Networks

HP IMC User Behavior Auditor

Deploying NetScaler Gateway in ICA Proxy Mode

Ciphermail Gateway PDF Encryption Setup Guide

Managing Identities and Admin Access

NETWRIX EVENT LOG MANAGER

QliqDIRECT Active Directory Guide

Preparing for GO!Enterprise MDM On-Demand Service

VMware Identity Manager Administration

NETWRIX EVENT LOG MANAGER

Netwrix Auditor for Exchange

Manage Firewalls and Log Collection

HP A-IMC Firewall Manager

Okta/Dropbox Active Directory Integration Guide

vcloud Director User's Guide

Chapter 10 Encryption Service

Certificate Management

Setting Up Scan to SMB on TaskALFA series MFP s.

WatchDox Administrator's Guide. Application Version 3.7.5

FileMaker Server 11. FileMaker Server Help

Configuration Information

System Administration Training Guide. S100 Installation and Site Management

How To Install & Use Metascan With Policy Patrol

qliqdirect Active Directory Guide

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright Palo Alto Networks

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Web DLP Quick Start. To get started with your Web DLP policy

STARTER KIT. Infoblox DNS Firewall for FireEye

Deltek Touch Time & Expense for Vision 1.3. Release Notes

MultiSite Manager. Setup Guide

Sonian Getting Started Guide October 2008

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

TOSHIBA GA Printing from Windows

Deployment Guide: Transparent Mode

Networking Guide Redwood Manager 3.0 August 2013

escan SBS 2008 Installation Guide

Network FAX Driver. Operation Guide

IBM Information Server

User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Chapter 7 Managing Users, Authentication, and Certificates

Installing and Configuring vcloud Connector

Cloud Director User's Guide

SyncThru TM Web Admin Service Administrator Manual

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

Protected Trust Directory Sync Guide

Chapter 9 Monitoring System Performance

SolarWinds Log & Event Manager

VMware Identity Manager Administration

WildFire. Preparing for Modern Network Attacks

Manage Firewalls. Palo Alto Networks. Panorama Administrator s Guide Version 6.1. Copyright Palo Alto Networks

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

GlobalProtect Agent User Guide for Windows

Jobs Guide Identity Manager February 10, 2012

OneLogin Integration User Guide

Web Interface Reference Guide Version 6.1

Transcription:

WildFire Reporting WildFire Administrator s Guide Version 6.1

Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact us About this Guide This guide describes how to configure your Palo Alto Networks firewalls to submit samples to the WildFire cloud and how to manage a WF 500 appliance: For information on how to configure other components in the Palo Alto Networks Next Generation Security Platform, go to the Technical Documentation portal: https://www.paloaltonetworks.com/documentation or search the documentation. For access to the knowledge base, complete documentation set, discussion forums, and videos, refer to https://live.paloaltonetworks.com. For contacting support, for information on support programs, to manage your account or devices, or to open a support case, refer to https://www.paloaltonetworks.com/support/tabs/overview.html. For the most current PAN OS and WildFire 6.1 release notes, go to https://www.paloaltonetworks.com/documentation/61/pan os/pan os release notes.html. To provide feedback on the documentation, please write to us at: documentation@paloaltonetworks.com. Palo Alto Networks, Inc. www.paloaltonetworks.com 2016 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. Revision Date: July 22, 2016 2 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent propagation to other systems on your network. To ensure immediate alerts for malware discovered on your network, configure your firewalls to send email notifications, SNMP Traps, and/or syslogs whenever WildFire returns a malware verdict on a sample. This allows you to quickly view the WildFire analysis report and identify the user who downloaded the malware, determine if the user ran the infected file or accessed a malicious email link, and assess whether the malware attempted to spread itself to other hosts. If you determine that the user has accessed the malicious content, you can quickly disconnect the computer from the network to prevent the malware from spreading and follow incident response and remediation processes as required. The following topics describe the WildFire reporting and logging system and describes how to use this information to track down threats and to identify users who have been targeted by malware. WildFire Logs Enable Email Header Information in WildFire Logs Monitor Submissions Using the WildFire Portal Customize WildFire Portal Settings Add WildFire Portal User Accounts View WildFire Reports WildFire Report Contents Set Up Alerts for Detected Malware WildFire in Action Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 67

WildFire Logs WildFire Reporting WildFire Logs Each firewall that you configure to forward samples to WildFire will log the forward action in the data filtering logs. After WildFire analyzes the sample, if the verdict is malware, WildFire sends the results back to the WildFire Submission log on the firewall. You can also configure the firewall to log email header information for files delivered over email or HTTP/HTTPS links contains in SMTP and POP3 messages. For more information, see Enable Email Header Information in WildFire Logs. The detailed analysis report for each file or email link that WildFire analyzes is located in the detailed view of the WildFire Submissions log. You can also view analysis reports on the WildFire Portal. If you configure your firewalls to forward samples to a WF 500 appliance, you can only view analysis results on the firewall that forwarded the file to the appliance or by using the WildFire XML API to retrieve the report from the appliance. Forwarding Action Logs The data filtering logs located in Monitor > Logs > Data Filtering will show the files that were blocked/forwarded based on the file blocking profile. To determine which files were forwarded to WildFire, look for the following values in the Action column of the log: Action wildfire-upload-success wildfire-upload-skip wildfire-upload-fail Description The firewall forwarded the sample to the WildFire cloud or WF 500 appliance. This means that a trusted signer did not sign the file and it has not been previously analyzed by WildFire. Displayed for all files identified as eligible to be sent to WildFire by a file blocking profile/security policy, but did not need to be analyzed by WildFire because it has already been analyzed previously. In this case, the forward action will appear in the Data Filtering log because it was a valid forward action, but it was not sent to WildFire and analyzed because the file has already been sent to the WildFire cloud or WildFire appliance from another session, possibly from another firewall. This action will not occur for email link forwarding. The sample could not be uploaded to WildFire. This is typically caused by network communication issues between the firewall and the WildFire cloud. Verify connectivity and check DNS. WildFire Logs The analysis results for the samples scanned by WildFire are sent back to the firewall logs after the analysis completes. These logs are written to the firewall that forwarded the sample in Monitor > Logs > WildFire Submissions. If logs are forwarded from the firewall to Panorama, the logs are written to the Panorama server in Monitor > Logs > WildFire Submissions. The Category column for the WildFire logs will either show benign (benign email links are not logged); meaning that the file is safe, or malicious, indicating that WildFire determined that the sample contains malicious code. If the sample is determined to be malicious, a signature is generated by the WildFire signature generator. If your firewall is configured to forward files to a WF 500 appliance, you can configure the appliance to forward samples to the WildFire cloud for signature generation or you can Enable Signature/URL Generation on the WF 500 Appliance. By default, firewalls with a WildFire subscription will only retrieve analysis results from the WildFire cloud or WF 500 appliance if the sample is identified as malware. To generate logs for benign files, select Device > Setup > WildFire and edit General Settings and then click the Report Benign Files check box. You can also run the following CLI command: admin@pa-200# set deviceconfig setting wildfire report-benign-file. 68 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting WildFire Logs Benign verdicts for email links are not logged. To view the detailed report for a sample that has been analyzed by WildFire, locate the log entry in Monitor > WildFire Submissions, click the icon to the left of the log entry to show log details and then click the WildFire Analysis Report tab. A login prompt will appear to access the report and after entering the correct credentials the report is retrieved from the WildFire system and is displayed in your browser. For information on portal accounts to access the WildFire cloud, see Add WildFire Portal User Accounts. For information on the admin account that is used to retrieve reports from a WildFire appliance, see Integrate the WF 500 Appliance into a Network and the refer to the step that describes the portal admin account. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 69

Enable Email Header Information in WildFire Logs WildFire Reporting Enable Email Header Information in WildFire Logs The firewall can capture email header information email sender, recipient(s), and subject and sends it along with the corresponding email attachments and email links that it forwards to WildFire. If WildFire determines that the email attachment or link is malicious, it includes the email header information in the WildFire Submissions log that it returns to the firewall. This information can help you to quickly track down and remediate threats that are detected in emails received by your users. Note that neither the firewall nor WildFire receive, store, or view the actual email contents. The following workflow describes how to enable the email header options, how to set the User ID attribute, and how to locate log information to help you identify recipients who have downloaded malicious attachments or received an email containing a malicious links. Configure the Email Header Option for WildFire Logs Step 1 Step 2 Enable the email header option on the firewall that will forward samples to the WildFire. (Optional) Configure the User ID option to enable the firewall to match User ID information with email header information identified in email links and email attachments forwarded to WildFire. When a match occurs, the user name in the WildFire log email header section will contain a link that when clicked, will bring up the ACC filtered by the user or group of users. 1. Select Device > Setup > WildFire. 2. Edit the Session Information Settings section and enable one or more of the options (Email sender, Email recipient, and Email subject). 3. Click OK to save. 1. Select Device > User Identification > Group Mapping Settings. 2. Select the desired group mapping profile to modify it. 3. In the Server Profile tab in the Mail Domains section, populate the Domain List field: Mail Attributes This field is automatically populated after you fill in the Domain List field and click OK. The attributes are based on your LDAP server type (Sun/RFC, Active Directory, and Novell). Domain List Enter the list of email domains in your organization using a comma separated list up to 256 characters. 70 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting Enable Email Header Information in WildFire Logs Configure the Email Header Option for WildFire Logs (Continued) Step 3 Confirm that email header information is appearing in the WildFire reports. Within approximately 15 minutes after the file or link is forwarded, WildFire generates a log. Benign email links are not logged. 1. Select Monitor > Logs > Data Filtering from the firewall and locate a log with the Action wildfire upload success. The date/time should be after the date/time in which you enabled this option. 2. View the log and analysis report by selecting Monitor > Logs > WildFire Submissions and locate the corresponding log for the link or file attachment. 3. Click the log details icon in the first column. In the Log Info tab, you will see the new email information in the Email Headers section. If User ID is configured on the firewall, the domain and user name collected by User ID are displayed in the Recipient User-ID field. Use the email header and User ID information to track down the message on the mail server to delete it or use the information to locate the recipient to remove the threat if the email has already been opened. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 71

Monitor Submissions Using the WildFire Portal WildFire Reporting Monitor Submissions Using the WildFire Portal Browse to the Palo Alto Networks WildFire Portal and log in using your Palo Alto Networks support credentials or your WildFire account. The portal opens to display the dashboard, which lists summary report information for all of the firewalls associated with the specific WildFire subscription or support account. For each device listed, the portal displays statistics for the number of malware files that have been detected, benign samples that have been analyzed, and the number of pending files that are waiting to be analyzed. If your firewalls are configured to forward samples to a WF 500 appliance, log results can only be viewed from the firewall that forwarded the file or by using the WildFire XML API. For information on configuring additional WildFire accounts that can be used to review report information, see Add WildFire Portal User Accounts. 72 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting Customize WildFire Portal Settings Customize WildFire Portal Settings This section describes the settings that can be customized for a portal account, such as time zone and email notifications for each firewall. You can also delete logs stored on the portal for each firewall that forwards samples to the WildFire cloud. Customize the WildFire Portal Settings Step 1 Step 2 Step 3 Configure the time zone for the portal account. Delete WildFire logs for specific firewalls. This will delete all logs and notifications for the selected firewall. Configure email notifications that the portal will generate based on the results of files submitted to WildFire. The email notifications are sent to the email account registered in the support account. 1. Log in to the WildFire Portal using your Palo Alto Networks support login credentials or your WildFire user account. 2. Click the Settings link located at the upper right of the portal window. 3. Select the time zone from the drop down and then click Update Time Zone to save the change. The time stamp that will appear on the WildFire detailed report is based on the time zone set in your portal account. 1. In the Delete WildFire Logs drop down, select the firewall (by serial number). 2. Click the Delete Logs button. 3. Click OK to proceed with the deletion. 1. From the portal settings page, a table is displayed with the column headings Device, Malware, and Benign. Check Malware and/or Benign for each firewall to which you would like to receive notifications. Click the Update Notification to enable notifications for the selected firewalls. 2. The first row item will show Manual. Select Malware and/or Benign to receive a notification for files that are manually uploaded to the WildFire cloud, or that are submitted using the WildFire API and click Update Notification to save. Select the check boxes directly below the column headings Malware and Benign to select all of the check boxes for the listed devices. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 73

Add WildFire Portal User Accounts WildFire Reporting Add WildFire Portal User Accounts WildFire portal accounts are created by a super user (or the registered owner of a Palo Alto Networks device) to give additional users the ability to log in to the WildFire web portal and view WildFire data for devices specifically granted by the super user or registered owner. A super user is the person who registered a Palo Alto Networks firewall and has the main support account for the device(s). The WildFire user can be an existing support site user that belongs to any account (including the sub account, parent account, or any other account in the system), or they may not have a Palo Alto Networks support account at all and can be granted access to just the WildFire portal and a specific set of firewalls. If your firewall forwards files to a WF 500 appliance, you cannot view reports for those samples on the WildFire portal, even when enabling cloud intelligence on the appliance to submit files to the cloud. The purpose of sending samples from an appliance to the WildFire cloud is so the cloud will generate signatures for detected malware. Palo Alto Networks will then distribute these signatures to customer firewalls that have a Threat Prevention or WildFire subscription. Add WildFire User Accounts Step 1 Access the manage users and accounts section on the support site and select an account. 1. Log in to the Palo Alto Networks Support site. 2. Under Manage Account click on Users and Accounts. 3. Select an existing account or sub account. Step 2 Add a WildFire user. 1. Click the Add WildFire User button. 2. Enter the email address for the user recipient would like to add. The user can be an existing support site user that belongs to any account (including the sub account, parent account, Palo Alto Networks, or any other account in the system), as well as any email address that does not have a support account at all. The only restriction is that the email address cannot be from a free web based email account (Gmail, Hotmail, Yahoo, and so on). If an email address is entered for a domain that is not supported, a pop up warning appears. Step 3 Assign firewalls to the new user account and access the WildFire portal. 1. Select the firewall(s) by S/N that you want to grant access to and fill out the optional account details. An email will then be sent to the user. Users with an existing support account will receive an email with a list of the firewalls that are now available for WildFire report viewing. If the user does not have a support account, the portal sends an email with instructions on how to access the portal and how to set a new password. 2. The new user can now log in to the WildFire Portal and view WildFire reports for the firewalls to which they have been granted access. Users can also configure automatic email alerts for these devices in order to receive alerts on files analyzed. They can choose to receive reports on malicious and/or benign files. 74 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting View WildFire Reports View WildFire Reports The primary method used to view a WildFire reports sent to the WildFire cloud or to a WildFire appliance is to access the firewall that forwarded the file to WildFire and then select Monitor > Logs > WildFire Submissions and select the WildFire Analysis Report tab. From here you can view the report directly or download the report by clicking the Download PDF icon located at the upper right of the report. If the firewall is forwarding logs to Panorama, the logs can also be accessed from the Panorama logs. You can also retrieve reports from the WildFire portal or a WF 500 appliance by using WildFire XML API. For more information, see Query for a WildFire PDF or XML Report. When submitting files to the WildFire cloud (by firewall forwarding, manual upload, or the WildFire API), you can access reports from the firewall as well as from the WildFire portal. To access the reports from the portal, log in to the WildFire portal and click the Reports button at the top of the WildFire portal page. The portal displays a list showing the date the file was received, the firewall serial number that forwarded the file, the filename or URL, and the verdict (Malware or Benign). Search is also available at the top of the page and can be used to search by file name or hash value. To view an individual report from the portal, click the Reports icon to the left of the report name. To save the detailed report, click the Download as PDF button on the upper right of the report page. The following shows a list of sample files submitted by a firewall: Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 75

WildFire Report Contents WildFire Reporting WildFire Report Contents The WildFire reports will show detailed behavioral information for the sample that was analyzed by WildFire as well as information on the user who was targeted, email header information (if enabled), the application that delivered the file, and all URLs involved in the delivery or phone home activity of the file. The organization of the report may differ depending on the WildFire system (WildFire Cloud or WF 500 appliance) that analyzed the sample. The report will contain some or all of the information described in the following table based on the session information configured on the firewall that forwarded the file and depending on the observed behavior. When viewing a WildFire report for a file that was manually uploaded to the WildFire portal or by using the WildFire API, the report will not show session information because the traffic did not traverse the firewall. For example, the report would not show the Attacker/Source and Victim/Destination. Report Heading Download PDF File Information Description Click the Download PDF icon (located in the upper right) to have the firewall generate a PDF version of the WildFire report. File Type Flash, PE, PDF, APK, JAR/Class, or MS Office. This field is named URL for HTTP/HTTPS email link reports and will display the URL that was analyzed. File Signer The entity that signed the file for authenticity purposes. Hash Value A file hash is much like a fingerprint that uniquely identifies a file to ensure that the file has not been modified in any way. The following lists the hash versions that WildFire generates for each file analyzed: SHA 1 Displays the SHA 1 value for the file. SHA 256 Displays the SHA 256 value for the file. MD5 Displays the MD5 information for the file. File Size The size (in bytes) of the file that WildFire analyzed. First Seen Timestamp If the WildFire system has analyzed the file previously, this is the date/time that it was first observed. Verdict Displays the analysis verdict: Benign The file is safe and does not exhibit malicious behavior. Malware WildFire identified the file as malware and generates a signature to protect against future exposure. Sample File Click the Download File link to download the sample file to your local system. Note that you can only download files with the malware verdict, not benign. 76 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting WildFire Report Contents Report Heading Coverage Status Description Click the Virus Total link to view endpoint antivirus coverage information for samples that have already been identified by other vendors. If the file has never been seen by any of the listed vendors, file not found appears. In addition, when the report is rendered on the firewall, up to date information about what signature and URL filtering coverage that Palo Alto Networks currently provides to protect against the threat will also be displayed in this section. Because this information is retrieved dynamically, it will not appear in the PDF report. The following screen capture shows coverage status that appears after rendering the report on the firewall: The following coverage information is provided for active signatures: Coverage Type The type of protection provided by Palo Alto Networks (virus, DNS, WildFire, or malware URL). Signature ID A unique ID number assigned to each signature that Palo Alto Networks provides. Detail The well known name of the virus. Date Released The date that Palo Alto Networks released coverage to protect against the malware. Content Version The version number for the content release that provides protection against the malware. If the firewall is configured to forward files to a WildFire appliance, the firewall will query the appliance and the WildFire cloud to determine if coverage information is available. If Coverage Status is available for both systems (Cloud/Appliance), a separate table will appear for each system. Session Information Contains session information based on the traffic as it traversed the firewall that forwarded the sample. To define the session information that WildFire will include in the reports, select Device > Setup > WildFire> Session Information Settings. The following options are available: Source IP Source Port Destination IP Destination Port Virtual System (If multi vsys is configured on the firewall) Application User (If User ID is configured on the firewall) URL Filename Email sender Email recipient Email subject Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 77

WildFire Report Contents WildFire Reporting Report Heading Dynamic Analysis Behavior Summary Description If a file is low risk and WildFire can easily determine that it is safe, only a static analysis is performed, instead of a dynamic analysis. When a dynamic analysis is performed, this section contains tabs for each virtual environment that the sample was run in when it was analyzed in the WildFire cloud. For example, Virtual Machine 1 tab may have Windows XP, Adobe Reader 9.3.3, and Office 2003 and Virtual Machine 2 may have similar attributes, but with Office 2007. When a file goes through a full dynamic analysis, it is run in each virtual machine and the results of each environment can be viewed by clicking any of the Virtual Machine tabs. On the WF 500 appliance, only one virtual machine is used for the analysis, which you select based on virtual environment attributes that best match your local environment. For example, if most users have Windows 7 32 bit, that virtual machine would be selected. Each Virtual Machine tab summarizes the behavior of the sample file in the specific environment. Examples include whether the sample created or modified files, started a process, spawned new processes, modified the registry, or installed browser helper objects. The Severity column indicates the severity of each behavior. The severity gauge will show one bar for low severity and additional bars for higher severity levels. This information is also added to the dynamic and static analysis sections. The following describes the various behaviors that are analyzed: Network Activity Shows network activity performed by the sample, such as accessing other hosts on the network, DNS queries, and phone home activity. A link is provided to download the packet capture. Host Activity (by process) Lists activities performed on the host, such as registry keys that were set, modified, or deleted. Process Activity Lists files that started a parent process, the process name, and the action the process performed. File Lists files that started a child processes, the process name, and the action the process performed. Mutex If the sample file generates other program threads, the mutex name and parent process is logged in this field. Activity Timeline Provides a play by play list of all recorded activity of the sample. This will help in understanding the sequence of events that occurred during the analysis. The activity timeline information is only available in the PDF export of the WildFire reports. 78 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting WildFire Report Contents Report Heading Submit Malware Report Incorrect Verdict Description Use this option to manually submit the sample to Palo Alto Networks. The WildFire cloud will then re analyze the sample and generate a signatures if it determines that the sample is malicious. This is useful on a WF 500 appliance that does not have signature generation or cloud intelligence enabled, which is used to forward malware from the appliance to the WildFire cloud. Click this link to submit the sample to the Palo Alto Networks threat team if you feel the verdict is a false positive or false negative. The threat team will perform further analysis on the sample to determine if it should be reclassified. If a malware sample is determined to be safe, the signature for the file is disabled in an upcoming antivirus signature update or if a benign file is determined to be malicious, a new signature is generated. After the investigation is complete, you will receive an email describing the action that was taken. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 79

Set Up Alerts for Detected Malware WildFire Reporting Set Up Alerts for Detected Malware This section describes the steps required to configure a Palo Alto Networks firewall to send an alert each time WildFire identifies a malicious file or email link. You can configure alerts for benign files as well, but not benign email links. Alerts can also be configured from the WildFire portal, see Monitor Submissions Using the WildFire Portal. This example describes how to configure an email alert; however, you could also configure log forwarding to receive alerts via syslog, SNMP traps, and/or Panorama. Set Up Email Alerts for Malware Step 1 Configure an email server profile if one is not configured. 1. Select Device > Server Profiles > Email. 2. Click Add and then enter a Name for the profile. For example, WildFire-Email-Profile. 3. (Optional) Select the virtual system to which this profile applies from the Location drop down. 4. Click Add to add a new email server entry and enter the information required to connect to the Simple Mail Transport Protocol (SMTP) server and send email (up to four email servers can be added to the profile): Server Name to identify the mail server (1 31 characters). This field is just a label and does not have to be the host name of an existing SMTP server. Display Name The name to show in the From field of the email. From The email address where notification emails are sent from. To The email address to which notification emails are sent. Additional Recipient(s) Enter an email address to send notifications to a second recipient. Gateway The IP address or host name of the SMTP gateway to use to send the emails. 5. Click OK to save the server profile. 6. Click Commit to save the changes to the running configuration. Step 2 Test the email server profile. 1. Select Monitor > PDF Reports > Email Scheduler. 2. Click Add and select the new email profile from the Email Profile drop down. 3. Click the Send test email button and a test email should be sent to the recipients defined in the email profile. 80 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting Set Up Alerts for Detected Malware Set Up Email Alerts for Malware (Continued) Step 3 Configure a log forwarding profile to forward WildFire logs to Panorama, an email account, SNMP, and/or a syslog server. In this example you will forward WildFire logs to an email account when the WildFire verdict is Malicious. You can also enable Benign, which will produce more activity if you are testing. 1. Select Objects > Log Forwarding. 2. Click Add and name the profile. For example, WildFire-Log-Forwarding. 3. In the WildFire Settings section, choose the email profile from the Email column for Malicious as shown in the screen capture. Step 4 Apply the log forwarding profile to the security profile that contains the file blocking profile. To forward logs to Panorama, select the check boxes under the Panorama column for Benign and/or Malicious. For SNMP and Syslog, select the drop down and choose the appropriate profile or click New to configure a new profile. 4. Click OK to save the changes. 1. Select Policies > Security and click on the policy that is used for WildFire forwarding. 2. In the Actions tab Log Setting section, click the Log Forwarding drop down and select the new log forwarding profile. In this example, the profile is named WildFire-Log-Forwarding. 3. Click OK to save the changes and then Commit the configuration. WildFire logs will now be forwarded to the email address( s) defined in the email profile. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 81

Set Up Alerts for Detected Malware WildFire Reporting Set Up Email Alerts for Malware (Continued) Step 5 (PA 7050 only) If you are configuring log forwarding on a PA 7050 firewall, you must configure a data port on one of the NPCs with the interface type Log Card. This is due to the traffic/logging capabilities of the PA 7050 to avoid overwhelming the MGT port. The log card (LPC) will use this port directly and the port will act as a log forwarding port for syslog, email, and SNMP. The firewall will forward the following log types through this port: traffic, HIP match, threat, and WildFire logs. The firewall also uses this port to forward files/emails links to WildFire for analysis. If the port is not configured, a commit error is displayed. Note that only one data port can be configured with the Log Card type. The MGT port cannot be used for forwarding samples to WildFire, even if you configure a service route. The PA 7050 does not forward logs to Panorama. Panorama will only query the PA 7050 log card for log information. 1. Select Network > Interfaces and locate an available port on an NPC. 2. Select the port and change the Interface Type to Log Card. 3. In the Log Card Forwarding tab, enter IP information (IPv4 and/or IPv6) that will enable the firewall to communicate with your syslog servers and your email servers to enable the firewall to logs and email alerts. The port will also need to reach the WildFire cloud or your WildFire appliance to enable file forwarding. 4. Connect the newly configured port to a switch or router. There is no other configuration needed. The PA 7050 firewall will automatically use this port as soon as it is activated. 5. Commit the configuration. 82 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting WildFire in Action WildFire in Action The following example scenario summarizes the full WildFire lifecycle. In this example, a sales representative from Palo Alto Networks downloads a new software sales tool that a sales partner uploaded to Dropbox. The sales partner unknowingly uploaded an infected version of the sales tool install file and the sales rep then downloads the infected file. This example will demonstrate how a Palo Alto Networks firewall in conjunction with WildFire can discover zero day malware downloaded by an end user; even if the traffic is SSL encrypted. After WildFire identifies the malware a log is sent to the firewall and the firewall alerts the administrator who then contacts the user to eradicate the malware. WildFire then generates a new signature for the malware and firewalls with a Threat Prevention or WildFire subscription automatically downloads the signature to protect against future exposure. Although some file sharing web sites have an antivirus feature that checks files as they are uploaded, they can only protect against known malware. For more information on configuring WildFire, see Forward Samples to the WildFire Cloud or Forward Files to a WF 500 Appliance. This example uses a web site that uses SSL encryption, so the firewall must have decryption and Allow forwarding of decrypted content enabled. For information on enabling forwarding of decrypted content, see Forward Samples to the WildFire Cloud or Forward Files to a WF 500 Appliance. \ WildFire Example Scenario Step 1 Step 2 The sales person from the partner company uploads a sales tool file named sales tool.exe to his Dropbox account and then sends an email to the Palo Alto Networks sales person with a link to the file. The Palo Alto sales person receives the email from the sales partner and clicks the download link, which takes her to the Dropbox site. She then clicks Download to save the file to her desktop. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 83

WildFire in Action WildFire Reporting WildFire Example Scenario Step 3 The firewall that is protecting the Palo Alto sales rep has a file blocking profile attached to a security policy that will look for files in any application that is used to download or upload any of the supported file type (Flash, PE, PDF, APK, JAR/Class, or MS Office). Note that the firewall can also be configured to forward the email link file type, which enables the firewall to extract HTTP/HTTPS links contained in SMTP and POP3 email messages. As soon as the sales rep clicks download, the firewall policy forwards the sales toole.exe file to WildFire, where the file is analyzed for zero day malware. Even though the sales rep is using Dropbox, which is SSL encrypted, the firewall is configured to decrypt traffic, so all traffic can be inspected. The following screen shots show the File Blocking Profile, the Security Policy configured with the File Blocking profile, and the option to allow forwarding of decrypted content. 84 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting WildFire in Action WildFire Example Scenario Step 4 At this point, WildFire has received the file and is analyzing it for more than 200 different malicious behaviors. To see that the file was forwarded successfully, view Monitor > Logs > Data Filtering on the firewall. Step 5 Within approximately five minutes, WildFire has completed the file analysis and then sends a WildFire log back to the firewall with the analysis results. In this example, the WildFire log shows that the file is malicious. Step 6 The firewall is configured with a log forwarding profile that will send WildFire alerts to the security administrator when malware is discovered. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 85

WildFire in Action WildFire Reporting WildFire Example Scenario Step 7 The security administrator identifies the user by name (if User ID is configured), or by IP address if User ID is not enabled. At this point, the administrator can shut down the network or VPN connection that the sales representative is using and will then contact the desktop support group to work with the user to check and clean the system. By using the WildFire detailed analysis report, the desktop support person can determine if the user system is infected with malware by looking at the files, processes, and registry information detailed in the WildFire analysis report. If the user runs the malware, the support person can attempt to clean the system manually or re image it. For details on the WildFire report fields, see WildFire Report Contents. Figure: Partial View of the WildFire Analysis Report in PDF Step 8 Now that the administrator has identified the malware and the user system is being checked, how do you protect from future exposure? Answer: In this example, the administrator set a schedule on the firewall to download and install WildFire signatures every 15 minutes and to download and install Antivirus updates once per day. In less than an hour and a half after the sales rep downloaded the infected file, WildFire identified the zero day malware, generated a signature, added it to the WildFire update signature database provided by Palo Alto Networks, and the firewall downloaded and installed the new signature. This firewall and any other Palo Alto Networks firewall configured to download WildFire and antivirus signatures is now protected against this newly discovered malware. The following screenshot shows the WildFire update schedule: 86 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.

WildFire Reporting WildFire in Action WildFire Example Scenario All of this occurs well before most antivirus vendors are even aware of the zero day malware. In this example, within a very short period of time, the malware is no longer considered zero day because Palo Alto Networks has already discovered it and has provided protection to customers to prevent future exposure. Palo Alto Networks, Inc. WildFire 6.1 Administrator s Guide 87

WildFire in Action WildFire Reporting 88 WildFire 6.1 Administrator s Guide Palo Alto Networks, Inc.