Prisma Access
If you’re using Panorama to manage
Prisma Access:
Toggle over to the
PAN-OS
tab
and follow the guidance there. If you’re using Prisma
Access Cloud Management, continue here.
- Specify the Advanced WildFire cloud to which you want to forward samples.Selectand edit the General Settings based on your WildFire cloud deployment (public, government, private, or hybrid).ManageConfigurationSecurity ServicesWildFire and AntivirusGeneral SettingsThe WildFire U.S. Government Cloud is only available to U.S. Federal agencies as an optional analysis environment.Add theWildFire CloudURL for the cloud environment to forward samples to for analysis.Advanced WildFire Public Cloud options:
- Enter theWildFire Public CloudURL:
- United States:wildfire.paloaltonetworks.com
- Europe:eu.wildfire.paloaltonetworks.com
- Japan:jp.wildfire.paloaltonetworks.com
- Singapore:sg.wildfire.paloaltonetworks.com
- United Kingdom:uk.wildfire.paloaltonetworks.com
- Canada:ca.wildfire.paloaltonetworks.com
- Australia:au.wildfire.paloaltonetworks.com
- Germany:de.wildfire.paloaltonetworks.com
- India:in.wildfire.paloaltonetworks.com
- Switzerland:ch.wildfire.paloaltonetworks.com
- Poland:pl.wildfire.paloaltonetworks.com
- Make sure theWildFire Private Cloudfield is clear.
WildFire U.S. Government Cloud:- Enter theWildFire U.S. Government CloudURL: wildfire.gov.paloaltonetworks.com
- Make sure theWildFire Private Cloudfield is clear.
- Enable Prisma Access to forward decrypted SSL traffic for Advanced WildFire analysis by selectingAllow Forwarding of Decrypted Content. Decrypted traffic is evaluated against security policy rules; if it matches the WildFire analysis profile attached to the security rule, the decrypted traffic is forwarded for analysis before it is re-encrypted.Forwarding decrypted SSL traffic for analysis is an Advanced WildFire Best Practice.
- Define the size limits for samples the Prisma Access forwards for analysis.It is a Advanced WildFire Best Practice to set the file forwarding values to the default setting.
- Configure submission log settings.
- SelectReport Benign Filesto allow logging for files that receive a verdict of benign.
- SelectReport Grayware Filesto allow logging for files that receive a verdict of grayware.
- When finished,Saveyour changes.
- Define traffic to forward for analysis.
- Select, and thenManageConfigurationSecurity ServicesWildFire and AntivirusAdd Profile. Provide aNameandDescriptionfor the profile.
- Add Ruleto define traffic to be forwarded for analysis and give the rule a descriptiveName, such as local-PDF-analysis.
- Define the profile rule to match to unknown traffic and to forward samples for analysis based on:
- Direction of Traffic—Forward files for analysis based the transmission direction of the file (Upload,Download, orUpload and Download). For example, selectUpload and Downloadto forward all unknown PDFs for analysis, regardless of the transmission direction.
- Applications—Forward files for analysis based on the application in use.
- File Types—Forward files for analysis based on file types, including links contained in email messages. For example, selectPDFto forward unknown PDFs detected by the firewall for analysis.
- Select the destination for traffic to be forwarded for Analysis.
- SelectPublic Cloudso that all traffic matched to the rule is forwarded to the Advanced WildFire public cloud for analysis.
- SelectPrivate Cloudso that all traffic matched to the rule is forwarded to the WildFire appliance for analysis.
- Savethe WildFire analysis forwarding rule when finished.
- Savethe WildFire and Antivirus security profile.
- Traffic allowed by the security policy rule is evaluated against the attached WildFire analysis profile; Prisma Access forwards traffic matched to the profile for WildFire analysis.
- Choose what to do next...
- Verify WildFire Submissions to confirm that the firewall is successfully forwarding files for analysis.
- Monitor WildFire Activity to assess alerts and details reported for malware.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.