Advanced WildFire Powered by Precision AI™
Enable Advanced WildFire Inline ML (Cloud Management)
Table of Contents
Expand All
|
Collapse All
Advanced WildFire
-
-
- Forward Files for Advanced WildFire Analysis
- Manually Upload Files to the WildFire Portal
- Forward Decrypted SSL Traffic for Advanced WildFire Analysis
- Enable Advanced WildFire Inline Cloud Analysis
- Enable Advanced WildFire Inline ML
- Enable Hold Mode for Real-Time Signature Lookup
- Configure the Content Cloud FQDN Settings
- Sample Removal Request
- Firewall File-Forwarding Capacity by Model
-
-
-
- set deviceconfig cluster
- set deviceconfig high-availability
- set deviceconfig setting management
- set deviceconfig setting wildfire
- set deviceconfig system eth2
- set deviceconfig system eth3
- set deviceconfig system panorama local-panorama panorama-server
- set deviceconfig system panorama local-panorama panorama-server-2
- set deviceconfig system update-schedule
- set deviceconfig system vm-interface
-
- clear high-availability
- create wildfire api-key
- delete high-availability-key
- delete wildfire api-key
- delete wildfire-metadata
- disable wildfire
- edit wildfire api-key
- load wildfire api-key
- request cluster decommission
- request cluster reboot-local-node
- request high-availability state
- request high-availability sync-to-remote
- request system raid
- request wildfire sample redistribution
- request system wildfire-vm-image
- request wf-content
- save wildfire api-key
- set wildfire portal-admin
- show cluster all-peers
- show cluster controller
- show cluster data migration status
- show cluster membership
- show cluster task
- show high-availability all
- show high-availability control-link
- show high-availability state
- show high-availability transitions
- show system raid
- submit wildfire local-verdict-change
- show wildfire
- show wildfire global
- show wildfire local
- test wildfire registration
Enable Advanced WildFire Inline ML (Cloud Management)
If you’re using Panorama to manage Prisma Access:
Toggle over to the PAN-OS tab
and follow the guidance there.
If you’re using Prisma Access Cloud Management, continue here.
- To take advantage of WildFire Inline ML, you must have an active WildFire subscription as part of your Prisma Access subscription.
- Create a new or update your existing WildFire and Antivirus security profile to use the real-time WildFire inline ML models.
- Select an existing WildFire and Antivirus security profile or create a new one (select ManageConfigurationNGFW and Prisma AccessSecurity ServicesWildFire and Antivirus and Add Profile.
- Configure your WildFire and Antivirus profile to forward samples for analysis.
- Select WildFire Inline Machine Learning Models and apply an Action Setting for each WildFire Inline ML model. This enforces the WildFire Inline ML Actions settings configured for each protocol on a per model basis.The following classification engines available:
- Windows Executables
- PowerShell Scripts 1
- PowerShell Scripts 2
- Executable Linked Format
- MSOffice
- Shell Scripts
- enable—WildFire inspects traffic according to your selections in the WildFire Inline ML Action column in the decoders section of the Action tab.
- enable(alert-only)—WildFire inspects traffic according to your selections in the WildFire Inline ML Action column in the decoders section of the Action tab and overrides any action with a severity level higher than alert (drop, reset-client, reset-server, reset-both) alert, which allows traffic to pass while still generating and saving an alert in the threat logs.
- disable—WildFire allows traffic to pass without any policy action.
- Optional Add file exceptions to your WildFire and Antivirus security profile if you encounter false-positives. This is typically done for users who are not forwarding files to WildFire for analysis. You can add the file exception details directly to the exception list or by specifying a file from the threat logs.If your WildFire Analysis security profile is configured to forward the filetypes analyzed using WildFire inline ML, false-positives are automatically corrected as they are received. If you continue to see ml-virus alerts for files that have been classified as benign by WildFire Analysis, please contact Palo Alto Networks Support.
- Add file exceptions directly to the exception list.
- Select Advanced Settings and Add Exception in the File Exceptions pane.
- Add the hash, filename, and description of the file that you want to exclude from enforcement.
- When finished, Save your file exceptions.
- Save your WildFire and Antivirus profile configuration and push configuration changes.