Enable Local Signature and URL Category Generation

The WildFire appliance can generate signatures locally based on the samples received from connected firewalls and the WildFire API, as an alternative to sending malware to the public cloud for signature generation. The appliance can generate the following types of signatures for the firewalls to use to block malware and any associated command and control traffic:
  • Antivirus signatures—Detect and block malicious files. WildFire adds these signatures to WildFire and Antivirus content updates.
  • DNS signatures—Detect and block callback domains for command and control traffic associated with malware. WildFire adds these signatures to WildFire and Antivirus content updates.
  • URL categories—Categorizes callback domains as malware and updates the URL category in PAN-DB.
Configure the firewalls to retrieve the signatures generated by the WildFire appliance as frequently as every five minutes. You can also send the malware sample to the WildFire public cloud, in order to enable the signature to be distributed globally through Palo Alto Networks content releases.
Even if you’re using the WildFire appliance for local file analysis, you can also enable connected firewalls to receive the latest signatures distributed by the WildFire public cloud.
  1. Set Up WildFire Appliance Content Updates.
    This allows the WildFire appliance to receive the latest threat intelligence from Palo Alto Networks.
  2. Enable signature and URL category generation.
    1. Log in to the appliance and type configure to enter configuration mode.
    2. Enable all threat prevention options:
      admin@WF-500# set
      deviceconfig setting wildfire signature-generation av yes dns yes
      url yes
    3. Commit the configuration:
      admin@WF-500# commit
      You can display the status of a signature for signatures generated in the WildFire 8.0.1 or later environment using the command:
      admin@WF-500# show
      wildfire global signature-status sha256 equal <sha-256
      value>
      WildFire appliances cannot display the status for signatures generated before the upgrade to WildFire 8.0.1.
  3. Set the schedule for connected firewalls to retrieve the signatures and URL categories the WildFire appliance generates.
    It is a best practice to configure your firewalls to retrieve content updates from both the WildFire public cloud and WildFire appliance. This ensures that your firewalls receive signatures based on threats detected worldwide, in addition to the signatures generated by the local appliance.
    • For multiple firewalls managed by Panorama:
      Launch Panorama and select PanoramaDevice DeploymentDynamic Updates, click Schedules, and Add scheduled content updates for managed devices.
      For details on using Panorama to set up managed firewalls to receive signatures and URL categories from a WildFire appliance, see Schedule Content Updates to Devices Using Panorama.
    • For a single firewall:
      1. Log in to the firewall web interface and select DeviceDynamic Updates.
        For firewalls configured to forward files to a WildFire appliance (in either a WildFire private cloud or hybrid cloud deployment), the WF-Private section is displayed.
      2. Set the Schedule for the firewall to download and install content updates from the WildFire appliance.

Related Documentation