What is the simplest way to block all users from visiting a TLD? This seems like a basic functionality but I haven't found a good answer.
This thread was automatically locked due to age.
This definition of "Criminal Activities" doesn't seem to like-up with the advice of using this category for malware domains, etc:
Includes sites for advocating, instructing, or giving advice on performing illegal acts; tips on evading law enforcement; and lock-picking and burglary techniques.
The User Activity called Criminal Activity contains 7 categories.
One of the categories is also called Criminal Activity. The description may not be ideal - I know that child porn and other illegal to browse to things are categorized as Criminal Activity.
The other most important category is Spyware and Malware. This is where a lot of the bad computer security stuff is.
Blocking the entire User Activity is what I recommend.
I will not comment on the decision of naming a User Activity the same as a Category. :)
Ugh! Just went and looked at some of the backend and mapping. Again, I will not comment on decisions for naming and inclusion. :)
Consider blocking User Activity Suspicious. This is a mix of bad stuff (spam) and not bad stuff (advertising). Maybe look at the categories inside and make a decision.
I would also personally block these:
Command and Control (if you are using Advanced Threat Protection then this is already blocked. If you are not then this category takes effect.)
Spam URLs (also part of the User Activity Suspicious)
Hacking
I suspect GEOIP blocking makes more sense in blocking incoming connection from certain countries. Or incoming/outgoing for certain ports (we should block any ssh access from internal to Russia).
For outgoing Web traffic it makes less sense, however I just brought it up for Web as additional thing for a paranoid admin to lock-down.
This is miss leading, the US is the leader because hackers from other countries know they cannot create their links in their own country due to country blocking, essentially this is a product of the country blocking technique used by many admins. I have a black hole setup, the list started with 1 or 2 IP's a year or so ago, I think it is now at 200, I actually send out a lot of abuse emails to hosting companies, most are pretty good about it and I usually check a few days later from a test setup I have and the link or page is gone.
The real issue here is cloud platform or web hosting companies not doing their due diligence when letting users sign up, they just kick out a trial server to anyone with an email, I mean what do they expect, here ya go have a virtual linux server to use for 2 weeks at no cost, no worries you seem like a good person. I should sign up for one for fun as-
First Name: Malicious
Last Name: Hacker
Company: Your Checking Account
Phone Number: 666-666-6666
Email: stole_this_from_someone@ransomeware.com
Confirmed Michael Dunn's suggestion on page 1.
"a URL Group just containing "ru" will do it" - tested and working.
Some TLDs worth blocking below
https://www.spamhaus.org/statistics/tlds/
https://medium.com/alphasoc/a-deeper-look-at-dangerous-tlds-19f9e3e77926
https://www.symantec.com/blogs/feature-stories/top-20-shady-top-level-domains