DNSFilter high volume of `ANY` requests from a source
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Trigger an alert when a high volume of ANY type allowed requests is detected from a source.
Strategy
This rule continuously monitors DNSFilter Traffic logs and triggers an alert when a high volume of allowed ANY-type requests is detected from a source. It helps identify devices that are sending an unusually high number of DNS queries using the ANY request type. A high volume of ANY type DNS requests may indicate DNS amplification attacks, as legitimate clients rarely use ANY queries in large volumes.
Triage and Response
- Review DNSFilter Traffic logs to identify the source associated with generation of the high number of ANY-type DNS queries.
- Analyze domain, user
{{@usr.name}}, and policy {{@policy_name}} to understand patterns, user info, and policy related to this behavior. - If malicious domains are identified, isolate the device, perform a malware scan, and block associated domains or IPs.
- Update DNSFilter blocklists or filtering policies as needed, and continue monitoring for recurring blocked activity.