End-of-Life (EoL)

Set Up Alerts for Malware

You can configure a Palo Alto Networks firewall to send an alert when WildFire identifies a malicious or phishing sample. You can configure alerts for benign and grayware files as well, but not for benign and grayware email links. This example describes how to configure an email alert; however, you could also configure log forwarding to set up alerts to be delivered as syslog messages, SNMP traps, or Panorama alerts.
  1. Configure an email server profile.
    1. Select
      Server Profiles
    2. Click
      and then enter a
      for the profile. For example, WildFire-Email-Profile.
    3. (
      ) Select the virtual system to which this profile applies from the
    4. Click
      to add a new email server entry and enter the information required to connect to the Simple Mail Transport Protocol (SMTP) server and send email (up to four email servers can be added to the profile):
      • Server
        —Name to identify the mail server (1-31 characters). This field is just a label and does not have to be the host name of an existing SMTP server.
      • Display Name
        —The name to show in the From field of the email.
      • From
        —The email address where notification emails are sent from.
      • To
        —The email address to which notification emails are sent.
      • Additional Recipient(s)
        —Enter an email address to send notifications to a second recipient.
      • Gateway
        —The IP address or host name of the SMTP gateway to use to send the emails.
    5. Click
      to save the server profile.
    6. Click
      to save the changes to the running configuration.
  2. Test the email server profile.
    1. Select
      PDF Reports
      Email Scheduler
    2. Click
      and select the new email profile from the
      Email Profile
    3. Click the
      Send test
      email button and a test email should be sent to the recipients defined in the email profile.
  3. Configure a log forwarding profile, to enable WildFire logs to be forwarded to Panorama, an email account, SNMP, and/or a syslog server.
    In this example you will set up email logs for when a sample is determined to be malicious. You can also enable Benign and Grayware logs to be forwarded, which will produce more activity if you are testing.
    The firewall does not forward WildFire logs for blocked files to an email account.
    1. Select
      Log Forwarding
    2. Add
      and name the profile, for example, WildFire-Log-Forwarding.
    3. In
      WildFire Settings
      , choose the email profile from the Email column for
      as shown below.
      To forward logs to Panorama, select the check boxes under the Panorama column for Benign, Grayware, Phishing and/or Malicious. For SNMP and Syslog, select the drop-down and choose the appropriate profile or click
      to configure a new profile.
    4. Click
      to save the changes.
  4. Add the log forwarding profile to a security policy being used for WildFire forwarding (with a WildFire Analysis profile attached).
    The WildFire Analysis profile defines the traffic that the firewall forwards for WildFire analysis. To set up a WildFire analysis profile and attach it to a security policy rule, see Forward Files for WildFire Analysis.
    1. Select
      and click on the policy that is used for WildFire forwarding.
    2. In the
      Log Setting
      section, select the
      Log Forwarding
      profile you configured.
    3. Click
      to save the changes and then
      the configuration.

Recommended For You