Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

What do you do when an attempt to communicate with a botnet is detected?

I'm curious about what the best course of action is. One of the XG Firewalls we manage detected an attempt to communicate with a botnet. The policy is set to Log and Drop and the alert itself says "no further action is needed", but why not? I don't think we just want to log and drop this, do we?

Don't we also want to find out what's going on with the device that triggered this?

What are other people doing when they get these alerts?

I can run an additional virus scan with Malwarebytes. I can run a manual scan with Sophos Endpoint protection. I can check to see what programs are installed...

Does anyone have any other recommendations? Ideally I can come up with a procedure to follow whenever we get one of these alerts.



This thread was automatically locked due to age.
Parents Reply
  • I am talking about the future of Threat Hunting. That is the main goal of a security product to begin with. You want to address complex attack scenarios and want to fight back. Looking at a firewall log only is only a small field of actual "what happen here?". 

    Looking at the current state of attacks (See MITRE), you can easily spot the issue, only on relaying on a firewall. The firewall can only give you a small view of the actual attack, while getting more intel of your entire network is the key to fight back. 

    I am not saying, the current state of logging is the best, it still get more detail to it (Logviewer improvements etc.). What i am saying is, reporting is not logging. Central is a reporting platform. Its about getting intel of what is going on. 

    Just some thoughts for the future. 

Children