DNSFilter high volume of `ANY` requests from a source
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, 
n'hésitez pas à nous contacter.
Goal
Trigger an alert when a high volume of ANY type allowed requests is detected from a source.
Strategy
This rule continuously monitors DNSFilter Traffic logs and triggers an alert when a high volume of allowed ANY-type requests is detected from a source. It helps identify devices that are sending an unusually high number of DNS queries using the ANY request type. A high volume of ANY type DNS requests may indicate DNS amplification attacks, as legitimate clients rarely use ANY queries in large volumes.
Triage and Response
- Review DNSFilter Traffic logs to identify the source associated with generation of the high number of ANY-type DNS queries.
- Analyze domain, user {{@usr.name}}, and policy{{@policy_name}}to understand patterns, user info, and policy related to this behavior.
- If malicious domains are identified, isolate the device, perform a malware scan, and block associated domains or IPs.
- Update DNSFilter blocklists or filtering policies as needed, and continue monitoring for recurring blocked activity.