<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clarification on DNS Reputation Logs in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251795#M42126</link>
    <description>&lt;P&gt;DNS Reputation refers to domains that we've seen significant malicious activity from.&lt;BR /&gt;This is different from URL Filtering, which pulls from a different database than Threat Prevention.&lt;BR /&gt;However, that is&amp;nbsp;also showing the site as malicious:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30826iBD8870DB334225FF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;A "Detect" means the traffic was ultimately allowed to pass because of your configuration.&lt;BR /&gt;Given the amount of data transferred, it seems likely this system has been compromised somehow.&lt;/P&gt;
&lt;P&gt;If it were me, if you haven't already done so, I'd be activating my organization's incident response plan.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jun 2025 16:59:01 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-06-23T16:59:01Z</dc:date>
    <item>
      <title>Clarification on DNS Reputation Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251495#M42089</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;I have obeserved in the Generaloverview tab of Smartview of The Management Server that there are Some critical attacks which werenot prevented by Policy.&lt;/P&gt;&lt;P&gt;When went through the logs most of them wre with&lt;/P&gt;&lt;P&gt;Protection name : "DNS Reputation"&lt;BR /&gt;Description: Connection was allowed because background classification mode was set. See sk74120 for more information&lt;BR /&gt;Action : Detect&lt;/P&gt;&lt;P&gt;When I go through the 74120, as per my understanding if there is no cache information about the resource, as the mode is set to Background and Checkpoint will continue its categorization and connection was allowed.&lt;/P&gt;&lt;P&gt;After the classification was found a detect log was generated.&lt;/P&gt;&lt;P&gt;I want to know was the connection is abnormal and any malicious data was received by endpoint user?&lt;/P&gt;&lt;P&gt;What is mean by Infected hosts in General overview? is the endpoints are infected?&lt;/P&gt;&lt;P&gt;How can I investigate further about these logs?&lt;/P&gt;&lt;P&gt;For reference I have attached the one of the log screenshot.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 06:09:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251495#M42089</guid>
      <dc:creator>Saranya_0305</dc:creator>
      <dc:date>2025-06-18T06:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on DNS Reputation Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251568#M42108</link>
      <description>&lt;P&gt;A DNS query should merely contain the desired FDQN and the IPs they resolve to.&lt;BR /&gt;The FDQN requested&amp;nbsp;&lt;A href="https://www.akamai.com/glossary/what-is-dns-tunneling" target="_self"&gt;might leak a small amount of data&lt;/A&gt;&amp;nbsp;but isolated instances of this don't necessarily indicate an issue (at least not without other indicators being present).&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 22:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251568#M42108</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-18T22:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on DNS Reputation Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251599#M42109</link>
      <description>&lt;DIV&gt;Dear Team,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thank you for the Heads up!&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;As per my understanding,&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;For the DNS Tunneling, first the &lt;STRONG&gt;endpoint should be compromised for DNS Tunneling&lt;/STRONG&gt;.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Protection Type: DNS Trap&lt;/STRONG&gt; , where the Checkpoint will give the Bogus IP and responds to the client as it is DNS server.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;My query is here in this case,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;1) &lt;STRONG&gt;The Protection Type: DNS Reputation&lt;/STRONG&gt;, what does this protection type does?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;2) Here is the endpoints is trying to access &lt;STRONG&gt;Malicious sites&lt;/STRONG&gt;?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;From the logs,&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;3) In the Forensics Details,&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;STRONG&gt;Resource: info-update.org&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Action Details: Bypass&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;Is the Resource is the site that the endpoint is try to access? If yes, as the action details mentioned&amp;nbsp; &lt;STRONG&gt;"bypass "&lt;/STRONG&gt; is it &lt;STRONG&gt;succeeded to access the site?&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;4) &lt;STRONG&gt;Action: Detect&lt;/STRONG&gt;, what does this Detect log means?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Form the logs, I observed some bytes of data has been transferred&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &lt;STRONG&gt;Sent Bytes:286.7M&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; Received Bytes:652.2M&amp;nbsp;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;As per my knowledge some data has been transferred when we query for any DNS query.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Is there &lt;STRONG&gt;any limitation for Sent and received data bytes&lt;/STRONG&gt;, because I observe some of the other logs have &lt;STRONG&gt;Sent and Received Bytes is Gigabytes, is it abnormal?&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Please assist me in this, if I am wrong in my understanding please guide me.&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saranya&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2025 11:01:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251599#M42109</guid>
      <dc:creator>Saranya_0305</dc:creator>
      <dc:date>2025-06-19T11:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on DNS Reputation Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251621#M42111</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;Along with the previous queries,&lt;/P&gt;&lt;P&gt;I have observed that the Source IP in the logs are Firewalls Internal or External IP are replicating.&lt;/P&gt;&lt;P&gt;How the Firewall itself try to access the URL or Destination(Google DNS Server or Internal DNS Server ) ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Source: Firewalls Internal or External Interface IPs&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Destination: Google DNS or Internal DNS Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;My thought on this&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on the description "&lt;SPAN&gt;Connection was allowed because background classification mode was set. See sk74120 for more information"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The firewall has no information about the URL in its cache, it try to get the information from the Cloud, but here the destination is should be Checkpoint Cloud.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If it is not the case I have configured my TP Engine settings as Hold.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For reference I attached the screenshot of the TE profile and TE Engine Settings.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Please correct me if I am wrong.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Saranya&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jun 2025 14:36:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251621#M42111</guid>
      <dc:creator>Saranya_0305</dc:creator>
      <dc:date>2025-06-19T14:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Clarification on DNS Reputation Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251795#M42126</link>
      <description>&lt;P&gt;DNS Reputation refers to domains that we've seen significant malicious activity from.&lt;BR /&gt;This is different from URL Filtering, which pulls from a different database than Threat Prevention.&lt;BR /&gt;However, that is&amp;nbsp;also showing the site as malicious:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30826iBD8870DB334225FF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;A "Detect" means the traffic was ultimately allowed to pass because of your configuration.&lt;BR /&gt;Given the amount of data transferred, it seems likely this system has been compromised somehow.&lt;/P&gt;
&lt;P&gt;If it were me, if you haven't already done so, I'd be activating my organization's incident response plan.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 16:59:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Clarification-on-DNS-Reputation-Logs/m-p/251795#M42126</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-23T16:59:01Z</dc:date>
    </item>
  </channel>
</rss>

