: Configure WildFire Analysis
Focus
Focus

Configure WildFire Analysis

Table of Contents

Configure WildFire Analysis

Learn how to configure WildFire analysis on which WildFire Report depends.
Data Security leverages a WildFire service to detect known and unknown malware for supported file types. To provide you the visibility you need, Data Security integrates with WildFire by using a predefined data pattern. This process is known as WildFire analysis.
To enable WildFire analysis:
After you configure WildFire analysis, if WildFire detects malware on an asset, WildFire informs Data Security and it flag the asset as a risk. From there, you can track down threats using the WildFire Report on Data Security. Simply configure WildFire analysis to send files to WildFire, then analyze the report.

Enable File Types

Data Security enables you to submit files of specific file type categories to WildFire for analysis, classification, and reporting. However, by default, Data Security does not submit any files for processing: you control which file type categories apply to the WildFire service.
If you have privacy concerns with sharing specific file type categories, don’t select that file category in Data Security. Data Security supports specific file type categories, and the file types listed in parenthesis in the SaaS Security web interface are examples.
  1. Log in to SaaS Security. Go to SettingsScan SettingsWildFire Analysis.
  2. Locate the WildFire Analysis toggle and verify that WildFire is enabled.
    If any of your policies use the WildFire data pattern, you must remove the data pattern from those policies before you can disable WildFire analysis.
    By default, Data Security enables WildFire analysis data pattern, but it’s possible that your organization disabled it previously.
  3. Select the Files to Submit.
  4. After selecting the files, go to ActionEnable.
    Data Security logs any changes to file type changes in the audit logs. If you want your changes to apply retroactively, initiate a rescan.

Enable Contextual Information

In addition to sending files to WildFire, Data Security enables you to send contextual information with the file so that your global administrator has the necessary context to the WildFire verdict, to determine and investigate threats. By default, Data Security does not send contextual information to WildFire.
Palo Alto Networks recommends that you enable all contextual information. Data Security enables you to send your files to WildFire with contextual information.
  1. Before you begin: Enable File Types.
  2. Log in to SaaS Security. Go to SettingsScan SettingsWildFire Analysis.
  3. Specify the Contextual Information.
    • Cloud App—Name of the SaaS application that you specified at the time of onboarding the app. For example, Box - HR or Box - HQ.
    • File URL—the file path in Data Security.
    • Timestamp—the latest update time on the file.
    • File Directory Path—parent folder level.
    • User ID—email address or username of file creator.
  4. After selecting the files, go to ActionEnable.
    Data Security logs any changes to contextual information in the audit logs. If you want your changes to apply retroactively, initiate a rescan.

Configure Policies for WildFire Analysis

Data Security integrates with WildFire by using a predefined data pattern and predefined policy rule (WildFire).
  1. Before you begin: Enable Contextual Information.
  2. Specify the WildFire Data Pattern or Malware Data Profile as match criteria in your policies.
    If you forget to specify the data pattern or data profile, your match results will not be accurate—they will include a large number of false positives.

Monitor Malware Scanning

Data Security enables you to track malware scanning for all file types configured for WildFire analysis. When you View Asset Details for such files, Data Security displays a malware scan status.
  1. Log in to SaaS Security.
  2. To monitor malware scanning, go to Data SecurityIncidents.
  3. Click on the data asset you want to monitor. It is now displayed under the Data Assets tab.
  4. Select the asset you want to monitor. Observe the Malware Verdict in the Details pane.
    1. Observe the Malware Verdict.
      • Pending AnalysisData Security is waiting for WildFire to analyze the file and return a verdict.
      • Analyzed—WildFire analyzed the file and returned a verdict.
      • Not Analyzed—WildFire did not analyze the file and an information icon next to the status displays an explanation. The most common reason for Not Analyzed is the file type is within an unsupported file type category for WildFire analysis.
      • File UnavailableFile unavailable to Data Security. For example, when a file is quarantined by the cloud app.
  5. If WildFire detected malware, Track Down Threats with WildFire Report.