Monitor WildFire Submissions and Analysis Reports

Samples that firewalls submit for WildFire analysis are displayed as entries in the WildFire Submissions log on the firewall web interface. For each WildFire entry, you can open an expanded log view which displays log details and the WildFire analysis report for the sample.
  1. Forward Files for WildFire Analysis.
  2. Configure WildFire Submissions Log Settings.
  3. To view samples submitted by a firewall to a WildFire public, private, or hybrid cloud, select MonitorLogsWildFire Submissions. When WildFire analysis of a sample is complete, the results are sent back to the firewall that submitted the sample and are accessible in the WildFire Submissions logs. The submission logs include details about a given sample, including the following information:
    • The Verdict column indicates whether the sample is benign, malicious, phishing, or grayware.
    • The Action column indicates whether the firewall allowed or blocked the sample.
    • The Severity column indicates how much of a threat a sample poses to an organization using the following values: critical, high, medium, low, and informational.
      The values for the following severity levels are determined by a combination of verdict and action values.
      • Low—Grayware samples with the action set to allow.
      • High—Malicious samples with the action set to allow.
      • Informational:
        • Benign samples with the action set to allow.
        • Samples with any verdict with the action set to block.
    wf-submissions-log.png
  4. For any entry, select the Log Details icon to open a detailed log view for each entry:
    wf-submissions-detailed-log.png
    The detailed log view displays Log Info and the WildFire Analysis Report for the entry. If the firewall has packet captures (PCAPs) enabled, the sample PCAPs are also displayed.
    wf-submissions-log-info.png
    For all samples, the WildFire analysis report displays file and session details. For malware samples, the WildFire analysis report is extended to include details on the file attributes and behavior that indicated the file was malicious.
    wf-submissions-wf-analysis-report.png
  5. (Optional) Download PDF of the WildFire Analysis Report.

Related Documentation