infoblox_nios:threat_insight
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_nios:threat_insight [2023/05/24 12:13] – [Logs] bstafford | infoblox_nios:threat_insight [2025/07/30 08:41] (current) – bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== NIOS Threat Insight ====== | ====== NIOS Threat Insight ====== | ||
| + | ===== Threat Insight ===== | ||
| + | NOT SUPPORTED ON TE-926 or TE-825 or TE-815 | ||
| Documentation [[https:// | Documentation [[https:// | ||
| + | |||
| + | Add '' | ||
| Line 13: | Line 17: | ||
| To monitor the threat analytics service before actually blocking domains, set Policy Override to Log Only (Disabled). When you are ready to block offending domains, set Policy Override to None (Given). | To monitor the threat analytics service before actually blocking domains, set Policy Override to Log Only (Disabled). When you are ready to block offending domains, set Policy Override to None (Given). | ||
| - | When running Threat Insight and/or ADP on the Grid, to download the latest module updates and whitelist updates or ADP updates , the Grid Master needs to resolve and access '' | + | When running Threat Insight and/or ADP on the Grid, to download the latest module updates and whitelist updates or ADP updates , the Grid Master needs to resolve and access '' |
| Threat Insight requires " | Threat Insight requires " | ||
| Line 35: | Line 39: | ||
| The documentation says that Threat Insight supports BIND only - not Unbound. This is because there was a version of the 40xx series that had an unbound option created for a specific use case. It was removed from the code in NIOS 9.0.0 | The documentation says that Threat Insight supports BIND only - not Unbound. This is because there was a version of the 40xx series that had an unbound option created for a specific use case. It was removed from the code in NIOS 9.0.0 | ||
| + | |||
| + | ===== NIOS Client for Threat Insight ===== | ||
| + | NIOS can access Threat Insight in the BloxOne Cloud using API. | ||
| + | |||
| + | Called " | ||
| + | |||
| + | Documentation [[https:// | ||
| + | |||
| + | The Threat Insight in the Cloud Integration Client will request all detected domains from the Cloud. So you must configure at least one RPZ. You can force a refresh using '' | ||
| + | |||
| + | ===== Notes ===== | ||
| + | Domains in " | ||
| + | |||
| + | Bad domains in the TIDNST feed get removed after 30 days. | ||
| + | |||
| + | BloxOne Cloud Integration (BloxOne Threat Defense Cloud Client) for Threat Insight can use API KEY. | ||
| Line 54: | Line 74: | ||
| k8s-gov-apiuslb-d496fb99ip-i123e9636yhb9iqs.elb.eu-west-1.amazonaws.com | k8s-gov-apiuslb-d496fb99ip-i123e9636yhb9iqs.elb.eu-west-1.amazonaws.com | ||
| k8s-cn-sockjs-435785677p9-9e123c588200ab0f.elb.eu-west-1.amazonaws.com</ | k8s-cn-sockjs-435785677p9-9e123c588200ab0f.elb.eu-west-1.amazonaws.com</ | ||
| + | |||
| + | In the cloud, high profile TLD in FQDN won't block detection. Nameservers are taken into consideration now. | ||
| + | |||
| + | Another NIOS log | ||
| + | * Facility = user | ||
| + | * Level = INFO | ||
| + | * server = analytics[] | ||
| + | * Message = | ||
| + | * DNS Tunneling detected: Domain name *.nw44.domain.com has been detected with tunneling activity. The analytics classification was triggered by 100 queries from client IP: 192.168.1.1 to domain nw44.domain.com. The likelihood of the detection is 0.9954415716903586. Trigger 100 of 100 : | ||
| + | * { | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * } | ||
infoblox_nios/threat_insight.1684930428.txt.gz · Last modified: by bstafford
