DNSFilter high volume of `ANY` requests from a source

This rule is part of a beta feature. To learn more, contact Support.
Esta página aún no está disponible en español. Estamos trabajando en su traducción.
Si tienes alguna pregunta o comentario sobre nuestro actual proyecto de traducción, no dudes en ponerte en contacto con nosotros.

Goal

Trigger an alert when a high volume of ANY type allowed requests is detected from a source.

Strategy

This rule continuously monitors DNSFilter Traffic logs and triggers an alert when a high volume of allowed ANY-type requests is detected from a source. It helps identify devices that are sending an unusually high number of DNS queries using the ANY request type. A high volume of ANY type DNS requests may indicate DNS amplification attacks, as legitimate clients rarely use ANY queries in large volumes.

Triage and Response

  1. Review DNSFilter Traffic logs to identify the source associated with generation of the high number of ANY-type DNS queries.
  2. Analyze domain, user {{@usr.name}}, and policy {{@policy_name}} to understand patterns, user info, and policy related to this behavior.
  3. If malicious domains are identified, isolate the device, perform a malware scan, and block associated domains or IPs.
  4. Update DNSFilter blocklists or filtering policies as needed, and continue monitoring for recurring blocked activity.