<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: malicious domain in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156823#M51486</link>
    <description>&lt;P&gt;if u block the URL will be blocked ( but resolve to an IP address)&lt;/P&gt;&lt;P&gt;sinkhole - will resolve to the specified address.&lt;/P&gt;</description>
    <pubDate>Tue, 16 May 2017 06:52:33 GMT</pubDate>
    <dc:creator>tac.in</dc:creator>
    <dc:date>2017-05-16T06:52:33Z</dc:date>
    <item>
      <title>malicious domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156623#M51425</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What is the benefit if we use sinkhole instead of just blocking malicious domain resolving&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 10:06:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156623#M51425</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2017-05-15T10:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: malicious domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156650#M51437</link>
      <description>Hi Simsim,&lt;BR /&gt;If the malicious URL is resolved in to an ipaddress , session might be created and your public IP might get blacklisted&lt;BR /&gt;</description>
      <pubDate>Mon, 15 May 2017 14:13:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156650#M51437</guid>
      <dc:creator>tac.in</dc:creator>
      <dc:date>2017-05-15T14:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: malicious domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156670#M51445</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;There are two options&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) block (default )&lt;/P&gt;&lt;P&gt;2) sinkhole&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is why we don't we go for block instead of sinkhole&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 15:27:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156670#M51445</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2017-05-15T15:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: malicious domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156823#M51486</link>
      <description>&lt;P&gt;if u block the URL will be blocked ( but resolve to an IP address)&lt;/P&gt;&lt;P&gt;sinkhole - will resolve to the specified address.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 06:52:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156823#M51486</guid>
      <dc:creator>tac.in</dc:creator>
      <dc:date>2017-05-16T06:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: malicious domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156857#M51491</link>
      <description>&lt;P&gt;block will simply block the connection, end of story&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sinkhole will feed the client a false IP address which can help track which hosts are infected:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Because malicious DNS requests will typically come from the company bind/ActiveDir DNS server instead of the clients directly you will not know which client is requesting malicious domain info&lt;/P&gt;
&lt;P&gt;with sinkhole, the infected client will try to connect to the sinkhole IP and you'll know exactly which clients are infected&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 10:15:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156857#M51491</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-16T10:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: malicious domain</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156873#M51497</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;mentioned it is good to identify infected client.&lt;/P&gt;&lt;P&gt;If your environment is set up correctly and traffic from clients to servers passes through firewall then you can identify client even with block activity.&lt;/P&gt;&lt;P&gt;But too many environments have clients and DNS in same zone so firewall sees only requests sent by DNS server but not clients.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 11:48:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/malicious-domain/m-p/156873#M51497</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-16T11:48:50Z</dc:date>
    </item>
  </channel>
</rss>

