WildFire

The WildFire dashboard in Activity shows you how WildFire is protecting you from net new malware that’s concealed in files, executables, and email links.
The WildFire dashboard in Activity shows you how WildFire is protecting you from net new malware that’s concealed in files, executables, and email links.
Go to
Activity
WildFire
to get started; here are some examples of the data this dashboard provides:
WildFire Session Trends
  • Go to WildFire > Summary
    Examine trends for the net new samples that WildFire detected on your network. Toggle between the WildFire verdicts for unknown samples and policy actions taken on samples.
Interesting Insights
  • Go to WildFire > Summary
Get insights into the unique WildFire samples seen in your network and signatures generated.
  • Unique Samples
    - Number of WildFire samples unique to your environment and unavailable in other public or private feeds.
  • Unique Signatures
    - Number of signatures generated from samples unique to your environment.
  • New Signatures
    - Number of new signatures created by WildFire from all your uploaded samples.
Verdict Distribution
  • Go to WildFire > Summary
    Learn more about the verdicts for net new samples that WildFire detected for the first time in your network. Focus in on the sample types that are most frequently concealing malware.
Tags
  • Go to WildFire > Summary
    Tags show you when an individual sample is part of a larger threat—like a malware family or a threat campaign—or is a trademark of a malicious actor. Tags can help you gain a larger context surrounding malicious activity.
    See the threat families, campaigns, or actors that are most actively targeting your network.
Samples
  • Go to WildFire > Samples
    Review a record of all the unknown samples that WildFire detected in your network and sent for WildFire analysis. You can view samples details and also jump to the log viewer, to see all the log activity related to the sample.
Applications
  • Go to WildFire > Summary
    Review the details of the applications that delivered the most malicious samples in your network. Click the malicious samples count to know more about the samples.
Users
  • Go to WildFire > Summary
    This shows the user accounts that are most frequently used to deliver malicious samples in your network. Click the user name to investigate the user activity patterns in the User Activity dashboard.
Regions
  • Go to WildFire > Summary
    View the sample details for the locations that sent or received the most malicious samples in your network. You can view the sample count for source and destination regions in a map or table format.
Firewalls
AIOps for NGFW
  • Go to WildFire > Summary
    You can view the firewalls that are contributing to the most malicious samples in your network.
Share, Download, and Schedule Reports for a Dashboard
For all dashboards, you can download or share covering the data a dashboard displays. Find these icons in the top right of the dashboard:

Recommended For You