Email Link Analysis
Where Can I Use
This? | What Do I Need? |
Prisma Access (Managed by Strata Cloud Manager) Prisma Access (Managed by Panorama) NGFW (Managed by Strata Cloud Manager) NGFW (Managed by PAN-OS or Panorama) VM-Series CN-Series
|
Advanced WildFire License For Prisma Access, this is usually included with your
Prisma Access license.
|
A Palo Alto Networks firewall can extract HTTP/HTTPS links contained
in SMTP and POP3 email messages and forward the links for WildFire analysis.
The firewall only extracts links and associated session information
(sender, recipient, and subject) from email messages; it does not receive,
store, forward, or view the email message.
WildFire visits submitted links to determine if the corresponding
web page hosts any exploits or displays phishing activity. A link
that WildFire finds to be malicious or phishing is:
Recorded on the firewall as a WildFire Submissions log
entry. The WildFire analysis report that details the behavior and
activity observed for the link is available for each WildFire Submissions
log entry. The log entry also includes the email header information—email
sender, recipient, and subject—so that you can identify the message
and delete it from the mail server, or mitigate the threat if the
email has been delivered or opened.
Added to PAN-DB and the URL is categorized as malware.
The firewall forwards email links in batches of 100 email links
or every two minutes (depending on which limit is hit first). Each
batch upload to WildFire counts as one upload toward the upload
per-minute capacity for the given firewall
Firewall File-Forwarding Capacity by Model. If a link
included in an email corresponds to a file download instead of a
URL, the firewall forwards the file only if the corresponding file
type is enabled for WildFire analysis.
To enable the firewall to forward links included in emails for
WildFire analysis, see
Forward Files for Advanced WildFire Analysis. With a Advanced
URL Filtering license, you can also block user access to malicious
and phishing sites.