顯示具有 Sinkholing 標籤的文章。 顯示所有文章
顯示具有 Sinkholing 標籤的文章。 顯示所有文章

2017年4月12日 星期三

[Paloalto] 名詞解釋: DNS Sinkholing

原文與出處

DNS Sinkholing
The DNS sinkhole action that you can enable in Anti-Spyware profiles enables the firewall to forge a response to a DNS query for a known malicious domain, causing the malicious domain name to resolve to an IP address that you define. This feature can be used to identify infected hosts on the protected network using DNS traffic in situations where the firewall cannot see the infected client's DNS query (that is, the firewall cannot see the originator of the DNS query). In a typical deployment where the firewall is north of the local DNS server, the threat log will identify the local DNS resolver as the source of the traffic rather than the actual infected host. Sinkholing malware DNS queries solves this visibility problem by forging responses to the client host queries directed at malicious domains, so that clients attempting to connect to malicious domains (for command-and- control, for example) will instead attempt to connect to a sinkhole IP address that you define. Infected hosts can then be easily identified in the traffic logs because any hosts that attempt to connect to the sinkhole IP address are most likely infected with malware.
DNS Sinkhole Workflow
The following illustration shows an example of how to identify client hosts that are attempting to communicate with known malicious domains:


來自 <https://www.paloaltonetworks.com/documentation/60/pan-os/newfeaturesguide/content-inspection-features/dns-sinkholing>

[微軟ADDS] Win XP 無法加入 Windows Server 2019 AD 網域問題

[Lab 筆記] Lab: Win XP Join Windows Server 2019 AD Domain Fail.  [Lab 環境] DC OS: Windows Server 2019 Forest / Domain Function Level: windows s...