Detect Malware and APTs with DNS Firewall Virtual Evaluation

Similar documents
Securing Your Business with DNS Servers That Protect Themselves

STARTER KIT. Infoblox DNS Firewall for FireEye

Securing Your Business with DNS Servers That Protect Themselves

Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

Automated Network Control for

Concierge SIEM Reporting Overview

Infoblox Grid TM. Automated Network Control for. Unifying DNS Management and Extending the Infoblox Grid TM to the F5 Global Traffic Manager

WHITEPAPER. Designing a Secure DNS Architecture

Simplifying Private Cloud Deployments through Network Automation

DNS RPZ in the Swiss NREN

VMware vsphere-6.0 Administration Training

Virtual Web Appliance Setup Guide

Quick Start Guide. for Installing vnios Software on. VMware Platforms

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

Installing and Using the vnios Trial

The Hillstone and Trend Micro Joint Solution

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

TECHNICAL WHITE PAPER. Infoblox and the Relationship between DNS and Active Directory

ThreatSTOP Technology Overview

About the VM-Series Firewall

Virtual Managment Appliance Setup Guide

WildFire. Preparing for Modern Network Attacks

APPLICATION PROGRAMMING INTERFACE

All Information is derived from Mandiant consulting in a non-classified environment.

Enhancing Your Network Security

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server

Designing and Implementing a Server Infrastructure MOC 20413

Challenges in Deploying Public Clouds

Step by Step: vcenter Syslog Collector installation

About the VM-Series Firewall

DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012

MS 20413A: Designing and Implementing a Server Infrastructure

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

VMsources Group Inc

Reliable DNS and DHCP for Microsoft Active Directory

VMware vcenter Log Insight Getting Started Guide

WHITE PAPER. Creating a Best-of-Breed DDI Solution in a Microsoft Environment

STEALTHWATCH MANAGEMENT CONSOLE

SolarWinds Log & Event Manager

Designing and Implementing a Server Infrastructure

F-Secure Internet Gatekeeper Virtual Appliance

Installing and Configuring vcloud Connector

VMware vsphere: [V5.5] Admin Training

Adaptive Intelligent Firewall - der nächste Entwicklungssprung der NGFW. Jürgen Seitz Systems Engineering Manager

VMware vsphere 5.1 Advanced Administration

VMware vsphere 5.0 Evaluation Guide

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN

ClearPass Policy Manager 6.3

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Migrating to ESXi: How To

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

End-user Security Analytics Strengthens Protection with ArcSight

VMware vsphere: Fast Track [V5.0]

SolarWinds Virtualization Manager

Infoblox Education Services Course Catalog

Vmware VSphere 6.0 Private Cloud Administration

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

VMware vsphere 5.0 Boot Camp

EMC Data Domain Management Center

Configuring User Identification via Active Directory

Technical Note. vsphere Deployment Worksheet on page 2. Express Configuration on page 3. Single VLAN Configuration on page 5

WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

Agenda , Palo Alto Networks. Confidential and Proprietary.

GRAVITYZONE HERE. Deployment Guide VLE Environment

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Network Metrics Content Pack for VMware vrealize Log Insight

Designing and Implementing a Server Infrastructure

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Designing and Implementing a Server Infrastructure

WatchGuard Training. Introduction to WatchGuard Dimension

AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM FOR VMWARE VCLOUD AIR

vsphere Private Cloud RAZR s Edge Virtualization and Private Cloud Administration

Automate PCI Compliance Monitoring, Investigation & Reporting

Next Generation IPS and Reputation Services

Configuring iscsi Multipath

EXAM Installing and Configuring Windows Server Buy Full Product.

VirtualclientTechnology 2011 July

Data Exfiltration and DNS

Designing and Implementing a Server Infrastructure

NexentaConnect for VMware Virtual SAN

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

NexentaConnect for VMware Virtual SAN

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:

Thinspace deskcloud. Quick Start Guide

Transcription:

Summary: Infoblox DNS Firewall provides the industry s first true DNS security solution for protection against malware and advanced persistent threats (APTs). Infoblox DNS Firewall can detect DNS-based malware and APTs inside the network and disrupt the ability of infected clients to communicate with botnets. The DNS Firewall Virtual Evaluation is a trial version that can detect malware/apt activity in your network through detailed logging and reports. Hidden in Your Network According to recent research on malware, nearly every business network has suspicious traffic going to websites that host malware. In spite of using the latest firewall and intrusion prevention devices, many organizations have malware or APTs in their networks and don t even know it. Moreover, every six minutes a known type of malware is being downloaded You can find out what malware and APTs are hiding in your network with the 60-day DNS Firewall Virtual Evaluation. The evaluation: Shows DNS-based malware/apt activity and provides detailed logging and reports Isn t deployed in line and hence doesn t disrupt the production network Is fully automated and easy to install System Requirements The evaluation software is a VMware-based vapp. The system requirements are: VMware ESX/ESXi 5.0 or above with DAS (Direct Attached Storage) or iscsi (Internet Small Computer System Interface) or FC (Fibre Channel) SAN (Storage Area Network) attached Management system with vsphere client To manage multiple hosts, the vsphere client must be connected to vcenter (5.0 or above) DNS Firewall VM: 4 CPUs, 8G RAM, 160G virtual drive Reporting VM: 2 CPUs, 8G RAM Internet connectivity to access Infoblox security feed (threat intelligence service) There are two deployment options: 1. Traffic mirroring using a switch span port for monitoring real-world traffic. 2. All-in-one standalone on a virtual server that doesn t require any switch configuration changes. You simply input log files (PCAP, BIND traffic logs) into the Guide VM, which also serves as the management user interface (GUI) to the DNS Firewall and Reporting. Detailed deployment instructions are available with the download kit. 1

Reports That Clearly Display Malware/APT Activity Once the DNS Firewall evaluation is installed and running, it might take a few minutes to a few hours, depending on your DNS traffic, for malware or APT activity to show up in the logs and reports. The RPZ statistics widget in the Infoblox UI records the malware or APT activity and shows it visually. Figure 1: Response Policy Zone (RPZ) statistics widget Communications going out to malicious domains, either to download more malicious software or to exfiltrate data, are logged. The DNS Firewall Virtual Evaluation also receives regular automatic updates from Infoblox to provide ongoing protection against existing and new types of malware and APTs. The reporting server bundled with this evaluation helps pinpoint actual infected clients for cleanup. You will need to select the security-related reports. There are five reports related to DNS Firewall, as follows: The DNS Top RPZ Hits report identifies domains in the RPZ that have the most hits qualified as malicious domains. This report is designed to shorten the time to identify malware impacts by tracking when attempts are made to reach domains on the RPZ list, including number of hits and time. Selecting Client ID will display the lease history for the client when information is available in the lease history (provided the client received a lease from Infoblox DHCP), and will display the user history for the client, provided the user logged in or authenticated on any Active Directory services captured by Infoblox. The DNS Top RPZ Hits by Client report tracks when client IDs attempt to reach domains on the RPZ list, including number of hits and time. This report is designed to shorten the time to identify clients impacted by malware by identifying which ones may be infected. Selecting Client ID will display the lease history for the client when information is available in the lease history, provided the client received a lease from Infoblox DHCP, and will display the user history for the client, provided the user logged in or authenticated on any Active Directory services captured by Infoblox. 2

The Top Infected Clients report identifies clients which have the most hits to known malicious hosts/domains. This report is designed to shorten the time to identifying clients that might be the riskiest points for data exfiltration and helps reduce time to remediation. The Top Malicious Activity by Client report provides information on the malicious destinations that are being contacted by the infected clients. This report is designed to shorten the time to identifying types of malware that clients are susceptible to and shorten time to remediation and protection against future infection of other clients in the network. The Top DNS Firewall Hits report identifies distribution of traffic between various malicious domains and provides contextual information on those domains. This report is designed to shorten time to remediation. Figure 2: DNS Top RPZ Hits report 3

Figure 3: DNS Top RPZ Hits report Figure 4: DNS Top RPZ Hits by Client report 4

Figure 5: Top Malicious Activity by Client report Figure 6: Top Malicious Activity by Client report 5

Figure 7: Top DNS Firewall Hits report The Sooner You Know How Infected You Are, the Sooner You Can Take Action Detecting malware and APTs before they cause damage is key. Download your free evaluation now, and then contact us to find out how the full-blown version of DNS Firewall can take you beyond detection and enable you to block communications from infected clients to botnet controllers. About Infoblox Infoblox (NYSE:BLOX), headquartered in Santa Clara, California, delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable more than 7,000 enterprises and service providers around the world to transform, secure, and scale complex networks. Infoblox (www.infoblox.com) helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Corporate Headquarters: +1.408.986.4000 1.866.463.6256 (toll-free, U.S. and Canada) info@infoblox.com www.infoblox.com 6