Dear Team,
 
Thank you for the Heads up!
 
As per my understanding, 
 
For the DNS Tunneling, first the endpoint should be compromised for DNS Tunneling.
 
Protection Type: DNS Trap , where the Checkpoint will give the Bogus IP and responds to the client as it is DNS server.
 
My query is here in this case,
 
1) The Protection Type: DNS Reputation, what does this protection type does?
 
2) Here is the endpoints is trying to access Malicious sites?
 
From the logs,
 
3) In the Forensics Details,
          Resource: info-update.org 
          Action Details: Bypass
Is the Resource is the site that the endpoint is try to access? If yes, as the action details mentioned  "bypass " is it succeeded to access the site?
 
4) Action: Detect, what does this Detect log means?
 
Form the logs, I observed some bytes of data has been transferred
    Sent Bytes:286.7M
    Received Bytes:652.2M 
 
As per my knowledge some data has been transferred when we query for any DNS query.
 
Is there any limitation for Sent and received data bytes, because I observe some of the other logs have Sent and Received Bytes is Gigabytes, is it abnormal?
 
Please assist me in this, if I am wrong in my understanding please guide me.
 
Regards,
Saranya