Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DNS Sink Holing to identify infected hosts

Are there any plans for Sophos XG to implement DNS sinkholing where malicious DNS requests are resolved to a "Black Holed" IP address and once a host tries to communicate with this IP address, we can identify the infected host. This would save a hugh amount of time examining DNS server logs for the source of malicious DNS requests. Palo Alto have this:

https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/use-dns-queries-to-identify-infected-hosts-on-the-network/dns-sinkholing#idbb4e9a0f-06f1-41eb-98d5-91f4d985b1b7



This thread was automatically locked due to age.
Parents Reply
  • Thanks for the reply. I know ATP can block malicious requests but if you are running an on-Prem DNS server for example, the DNS server will be the source of the malicious request. However, we then have to trawl through DNS logs to see what end host made the initial DNS request. This is very time consuming.

Children