Enable Local Signature and URL Category Generation

The WildFire appliance can generate signatures locally based on the samples received from connected firewalls and the WildFire API, as an alternative to sending malware to the public cloud for signature generation. The appliance can generate the following types of signatures for the firewalls to use to block malware and any associated command and control traffic:
  • Antivirus signatures
    —Detect and block malicious files. WildFire adds these signatures to WildFire and Antivirus content updates.
  • DNS signatures
    —Detect and block callback domains for command and control traffic associated with malware. WildFire adds these signatures to WildFire and Antivirus content updates.
  • URL categories
    —Categorizes callback domains as malware and updates the URL category in PAN-DB.
Configure the firewalls to retrieve the signatures generated by the WildFire appliance as frequently as every five minutes. You can also send the malware sample to the WildFire public cloud, in order to enable the signature to be distributed globally through Palo Alto Networks content releases.
Even if you’re using the WildFire appliance for local file analysis, you can also enable connected firewalls to receive the latestsignatures distributed by the WildFire public cloud.
  1. This allows the WildFire appliance to receive the latest threat intelligence from Palo Alto Networks.
  2. Enable signature and URL category generation.
    1. Log in to the appliance and type
      configure
      to enter configuration mode.
    2. Enable all threat prevention options:
      admin@WF-500#
      set deviceconfig setting wildfire signature-generation av yes dns yes url yes
    3. Commit the configuration:
      admin@WF-500#
      commit
      You can display the status of a signature for signatures generated in the WildFire 8.0.1 or later environment using the command:
      admin@WF-500#
      show wildfire global signature-status sha256 equal
      <sha-256 value>
      WildFire appliances cannot display the status for signatures generated before the upgrade to WildFire 8.0.1.
  3. Set the schedule for connected firewalls to retrieve the signatures and URL categories the WildFire appliance generates.
    It is a best practice to configure your firewalls to retrieve content updates from both the WildFire public cloud and WildFire appliance. This ensures that your firewalls receive signatures based on threats detected worldwide, in addition to the signatures generated by the local appliance.
    • For multiple firewalls managed by Panorama:
      Launch Panorama and select
      Panorama
      Device Deployment
      Dynamic Updates
      , click
      Schedules
      , and
      Add
      scheduled content updates for managed devices.
      For details on using Panorama to set up managed firewalls to receive signatures and URL categories from a WildFire appliance, see Schedule Content Updates to Devices Using Panorama.
    • For a single firewall:
      1. Log in to the firewall web interface and select
        Device
        Dynamic Updates
        .
        For firewalls configured to forward files to a WildFire appliance (in either a WildFire private cloud or hybrid cloud deployment), the WF-Private section is displayed.
      2. Set the
        Schedule
        for the firewall to download and install content updates from the WildFire appliance.

Related Documentation