<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DNS sinkhole in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222865#M123526</link>
    <description>&lt;P&gt;Hello everybody,&lt;/P&gt;
&lt;P&gt;How many policy we need for block and review source of infected hosts?&lt;/P&gt;
&lt;P&gt;One or two?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Internal dns is using but we can not see source of users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Mar 2025 09:12:06 GMT</pubDate>
    <dc:creator>valizada</dc:creator>
    <dc:date>2025-03-06T09:12:06Z</dc:date>
    <item>
      <title>DNS sinkhole</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222865#M123526</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;
&lt;P&gt;How many policy we need for block and review source of infected hosts?&lt;/P&gt;
&lt;P&gt;One or two?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Internal dns is using but we can not see source of users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 09:12:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222865#M123526</guid>
      <dc:creator>valizada</dc:creator>
      <dc:date>2025-03-06T09:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222907#M123531</link>
      <description>&lt;P&gt;Enable DNS Security in Anti-Spyware profile.&lt;/P&gt;
&lt;P&gt;Attach Anti-Spyware to all policies that apply for traffic where you need to identify infected hosts (ideally all).&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 14:01:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222907#M123531</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-03-06T14:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222909#M123532</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/701721699"&gt;@valizada&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only one security policy rule is needed to identify infected hosts.&amp;nbsp; Please see #3 in this document -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For those not familiar with this practice, most outbound DNS requests will come from the company's internal DNS server.&amp;nbsp; To identify the infected hosts, you can create a security policy rule to match traffic to the sinkhole FQDN.&amp;nbsp; The traffic that matches this rule will have the source IP addresses of the hosts that initially requested the suspect domain.&amp;nbsp; The Day 1 Configuration includes an example rule.&amp;nbsp; The BPA also recommends this rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 14:20:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222909#M123532</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-03-06T14:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: DNS sinkhole</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222917#M123533</link>
      <description>&lt;P&gt;For DNS Sinkhole to work it is enough to have it configured only on 1 rule - domain controller to Internet.&lt;/P&gt;
&lt;P&gt;But in this case also make sure that all devices actually have domain controller set as DNS server.&lt;/P&gt;
&lt;P&gt;Not having Anti-Spyware configured for all outgoing policies you will loose DNS Security protection for devices that connect to Internet hosted DNS servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best would be to also use DNS Proxy to make sure infected internal device is not trying to bypass URL categorization by having hardcoded IPs.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 14:56:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dns-sinkhole/m-p/1222917#M123533</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-03-06T14:56:33Z</dc:date>
    </item>
  </channel>
</rss>

