Why are dated WildFire-virus signatures triggering threat logs when using WildFire Real-time schedule?
10150
Created On 09/15/22 14:13 PM - Last Modified 04/22/24 07:25 AM
Question
Why are dated WildFire-virus signatures triggering threat logs (GUI: Monitor > Logs > Threat) when using WildFire Real-time schedule?
Environment
- PAN-OS 10.0 or Later
- WildFire Real Time signatures
- Threat logs
Answer
- When using the WildFire Real-time signatures sometimes the WildFire signature appears "n/a" when viewed in Threat Vault . Most likely when a WildFire signature has been cycled out to free up space on the device for more current emerging malware signatures.
- If the signature has been cycled out in a normal update schedule (not using Real-time) it won't trigger. However, when using the Real-time WildFire schedule this is expected behavior and a benefit of the Real-time signatures.
- This is one reason why an older signature is triggering WildFire-virus threat logs but showing "n/a" in Threat Vault.
- Real-time signatures has a query component where the firewall is free to request a specific signature pattern out of band based on the traffic activity it sees.
- This is an enormous benefit of the Real-time Signature system wherein a firewall can eventually customize its signature cache by requesting whatever patterns it needs.
- As long as a signature is not disabled/deleted and in a cycled out status on the WildFire public cloud, it will be available for the firewall to query.
GUI: Device > Dynamic updates > WildFire > Schedule Real-time