<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Suspicious DNS Query's in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-s/m-p/27709#M20204</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running version 5.0.6 for a few weeks now and looks very good.&lt;/P&gt;&lt;P&gt;We see now also in our threat detection the following threat "Suspicious DNS Query : ......" and this is blocked.&lt;/P&gt;&lt;P&gt;This is very cool to block at dns level spyware and malware but the disadvantage of this is that the source client ip address is always your DNS server.&lt;/P&gt;&lt;P&gt;So you need to look in to your logs of your DNS Server to find out the infected client.&lt;/P&gt;&lt;P&gt;But if you have a distributed DNS infrastructure and many DNS Servers spread over several location in Europe then this a hard job to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is it not possible to redirect Suspicious DNS Query's to a honeypot IP address so you can then detect the real client's ip address?&lt;/P&gt;&lt;P&gt;Maybe a future request!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or does someone have a better idea how to deal with this issue?&lt;/P&gt;&lt;P&gt;maFor us monitoring all the DNS servers log is not a option because we have so many DNS Servers spread over many locations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;O. Bor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Aug 2013 10:37:38 GMT</pubDate>
    <dc:creator>obor</dc:creator>
    <dc:date>2013-08-01T10:37:38Z</dc:date>
    <item>
      <title>Suspicious DNS Query's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-s/m-p/27709#M20204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running version 5.0.6 for a few weeks now and looks very good.&lt;/P&gt;&lt;P&gt;We see now also in our threat detection the following threat "Suspicious DNS Query : ......" and this is blocked.&lt;/P&gt;&lt;P&gt;This is very cool to block at dns level spyware and malware but the disadvantage of this is that the source client ip address is always your DNS server.&lt;/P&gt;&lt;P&gt;So you need to look in to your logs of your DNS Server to find out the infected client.&lt;/P&gt;&lt;P&gt;But if you have a distributed DNS infrastructure and many DNS Servers spread over several location in Europe then this a hard job to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is it not possible to redirect Suspicious DNS Query's to a honeypot IP address so you can then detect the real client's ip address?&lt;/P&gt;&lt;P&gt;Maybe a future request!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or does someone have a better idea how to deal with this issue?&lt;/P&gt;&lt;P&gt;maFor us monitoring all the DNS servers log is not a option because we have so many DNS Servers spread over many locations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;O. Bor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 10:37:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-s/m-p/27709#M20204</guid>
      <dc:creator>obor</dc:creator>
      <dc:date>2013-08-01T10:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious DNS Query's</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-s/m-p/27710#M20205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to take a look at &lt;A href="https://live.paloaltonetworks.com/message/25901"&gt;Re: Suspicious DNS Query - how to find source computer?&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 12:05:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/suspicious-dns-query-s/m-p/27710#M20205</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-08-01T12:05:38Z</dc:date>
    </item>
  </channel>
</rss>

