infoblox_nios:threat_insight
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_nios:threat_insight [2023/10/31 13:13] – bstafford | infoblox_nios:threat_insight [2025/07/30 08:41] (current) – bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== NIOS Threat Insight ====== | ====== NIOS Threat Insight ====== | ||
| + | ===== Threat Insight ===== | ||
| NOT SUPPORTED ON TE-926 or TE-825 or TE-815 | NOT SUPPORTED ON TE-926 or TE-825 or TE-815 | ||
| Line 16: | Line 17: | ||
| To monitor the threat analytics service before actually blocking domains, set Policy Override to Log Only (Disabled). When you are ready to block offending domains, set Policy Override to None (Given). | To monitor the threat analytics service before actually blocking domains, set Policy Override to Log Only (Disabled). When you are ready to block offending domains, set Policy Override to None (Given). | ||
| - | When running Threat Insight and/or ADP on the Grid, to download the latest module updates and whitelist updates or ADP updates , the Grid Master needs to resolve and access '' | + | When running Threat Insight and/or ADP on the Grid, to download the latest module updates and whitelist updates or ADP updates , the Grid Master needs to resolve and access '' |
| Threat Insight requires " | Threat Insight requires " | ||
| Line 39: | Line 40: | ||
| The documentation says that Threat Insight supports BIND only - not Unbound. This is because there was a version of the 40xx series that had an unbound option created for a specific use case. It was removed from the code in NIOS 9.0.0 | The documentation says that Threat Insight supports BIND only - not Unbound. This is because there was a version of the 40xx series that had an unbound option created for a specific use case. It was removed from the code in NIOS 9.0.0 | ||
| + | ===== NIOS Client for Threat Insight ===== | ||
| + | NIOS can access Threat Insight in the BloxOne Cloud using API. | ||
| + | |||
| + | Called " | ||
| + | |||
| + | Documentation [[https:// | ||
| + | |||
| + | The Threat Insight in the Cloud Integration Client will request all detected domains from the Cloud. So you must configure at least one RPZ. You can force a refresh using '' | ||
| ===== Notes ===== | ===== Notes ===== | ||
| - | Domains in " | + | Domains in " |
| Bad domains in the TIDNST feed get removed after 30 days. | Bad domains in the TIDNST feed get removed after 30 days. | ||
| - | BloxOne Cloud Integration for Threat Insight can use API KEY. | + | BloxOne Cloud Integration |
| Line 67: | Line 76: | ||
| In the cloud, high profile TLD in FQDN won't block detection. Nameservers are taken into consideration now. | In the cloud, high profile TLD in FQDN won't block detection. Nameservers are taken into consideration now. | ||
| + | |||
| + | Another NIOS log | ||
| + | * Facility = user | ||
| + | * Level = INFO | ||
| + | * server = analytics[] | ||
| + | * Message = | ||
| + | * DNS Tunneling detected: Domain name *.nw44.domain.com has been detected with tunneling activity. The analytics classification was triggered by 100 queries from client IP: 192.168.1.1 to domain nw44.domain.com. The likelihood of the detection is 0.9954415716903586. Trigger 100 of 100 : | ||
| + | * { | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * " | ||
| + | * } | ||
infoblox_nios/threat_insight.1698758029.txt.gz · Last modified: by bstafford
