Home
EN
Location
Documentation Home
Palo Alto Networks
Support
Live Community
Knowledge Base
MENU
Home
Advanced WildFire Administration
Prisma Access
Document:
Advanced WildFire Administration
Prisma Access
Last Updated:
Mar 30, 2023
Table of Contents
Filter
Advanced WildFire Overview
Subscription Options
Advanced WildFire Concepts
Samples
Firewall Forwarding
Session Information Sharing
Prisma Access
PAN-OS
Analysis Environment
Advanced WildFire Inline ML
Verdicts
File Analysis
Email Link Analysis
URL Analysis
Compressed and Encoded File Analysis
Advanced WildFire Signatures
Advanced WildFire Deployments
Advanced WildFire Public Cloud
WildFire Private Cloud
WildFire Hybrid Cloud
WildFire: U.S. Government Cloud
File Type Support
Supported File Types (Complete List)
Advanced WildFire Example
Get Started with Advanced WildFire
Advanced WildFire Deployment Best Practices
Advanced WildFire Best Practices
Configure Advanced WildFire Analysis
Forward Files for Advanced WildFire Analysis
Prisma Access
PAN-OS
Manually Upload Files to the WildFire Portal
Forward Decrypted SSL Traffic for Advanced WildFire Analysis
Enable Advanced WildFire Inline ML
Enable Advanced WildFire Inline ML in PAN-OS
Prisma Access
Verify Sample Submissions
Test a Sample Malware File
Verify File Forwarding
Sample Removal Request
Firewall File-Forwarding Capacity by Model
Monitor Activity
About WildFire Logs and Reporting
Advanced WildFire Analysis Reports—Close Up
Configure WildFire Submission Log Settings
Enable Logging for Benign and Grayware Samples
Include Email Header Information in WildFire Logs and Reports
Set Up Alerts for Malware
View WildFire Logs and Analysis Reports
View WildFire Logs and Analysis Reports in PAN-OS
Prisma Access
Use the WildFire Portal to Monitor Malware
Configure WildFire Portal Settings
Add WildFire Portal Users
View Reports on the WildFire Portal
Advanced WildFire Overview
Subscription Options
Advanced WildFire Concepts
Samples
Firewall Forwarding
Session Information Sharing
Analysis Environment
Advanced WildFire Inline ML
Verdicts
File Analysis
Email Link Analysis
URL Analysis
Compressed and Encoded File Analysis
Advanced WildFire Signatures
Advanced WildFire Deployments
Advanced WildFire Public Cloud
WildFire Private Cloud
WildFire Hybrid Cloud
WildFire: U.S. Government Cloud
File Type Support
Supported File Types (Complete List)
Advanced WildFire Example
Get Started with Advanced WildFire
Advanced WildFire Deployment Best Practices
Advanced WildFire Best Practices
Configure Advanced WildFire Analysis
Forward Files for Advanced WildFire Analysis
Manually Upload Files to the WildFire Portal
Forward Decrypted SSL Traffic for Advanced WildFire Analysis
Enable Advanced WildFire Inline ML
Verify Sample Submissions
Test a Sample Malware File
Verify File Forwarding
Sample Removal Request
Firewall File-Forwarding Capacity by Model
Monitor Activity
About WildFire Logs and Reporting
Advanced WildFire Analysis Reports—Close Up
Configure WildFire Submission Log Settings
Enable Logging for Benign and Grayware Samples
Include Email Header Information in WildFire Logs and Reports
Set Up Alerts for Malware
View WildFire Logs and Analysis Reports
Use the WildFire Portal to Monitor Malware
Configure WildFire Portal Settings
Add WildFire Portal Users
View Reports on the WildFire Portal
Previous
Next
Prisma Access
If you’re using Panorama to manage Prisma Access:
Toggle over to the
PAN-OS
tab and follow the guidance there.
If you’re using Prisma Access Cloud Management, continue here.
Use the credentials associated with your Palo Alto Networks support account and log in to the Prisma Access application on the
hub
.
Select
Manage > Configuration > Security Services > WildFire and Antivirus
and configure your
Session Information Settings
options.
Source IP
—Forward the source IP address that sent the unknown file.
Source Port
—Forward the source port that sent the unknown file.
Destination IP
—Forward the destination IP address for the unknown file.
Destination Port
—Forward the destination port for the unknown file.
Virtual System
—Forward the virtual system that detected the unknown file.
Application
—Forward the user application that transmitted the unknown file.
User
—Forward the targeted user.
URL
—Forward the URL associated with the unknown file.
Filename
—Forward the name of the unknown file.
Email sender
—Forward the sender of an unknown email link (the name of the email sender also appears in WildFire logs and reports).
Email recipient
—Forward the recipient of an unknown email link (the name of the email recipient also appears in WildFire logs and reports).
Email subject
—Forward the subject of an unknown email link (the email subject also appears in WildFire logs and reports).
Save
your changes.
Previous
Next
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.