Error:
An unexpected error occurred. Please click Reload to try again.
Error:
An unexpected error occurred. Please click Reload to try again.
How to Test WildFire with a Fake Malicious File - Knowledge Base - Palo Alto Networks

How to Test WildFire with a Fake Malicious File

75306
Created On 09/26/18 13:47 PM - Last Modified 02/04/25 22:23 PM


Environment


  • Wildfire Appliance
  • Threat


Resolution


  • During the deployment of WildFire or WF-500 customers may want to test the download of malicious files. Since WildFire does not forward files that are known or signed by a trusted file signer, Palo Alto Networks provides a mechanism to easily test this setup.
  • Palo Alto Networks randomly generates a test file and provides it at the following URL:

http://wildfire.paloaltonetworks.com/publicapi/test/pe

  • The purpose of this test file is strictly for testing file forwarding to the WildFire Cloud (public and private WF-500).  
  • Note that there will be no signature created for these test PE files, therefore the test file will never be blocked as virus or wildifre-virus even if Antivirus Profile is configured for the policy. 

 

 



Additional Information


  • We also have other file types than PE. Please refer to the WildFire Administrator's Guide for more details.
  • Make sure DSRI is not checked on the Security Policy rule when testing malware samples from our test malware site.
     


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloTCAS&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language