Dear Team,
Thank you for the Heads up!
As per my understanding,
For the DNS Tunneling, first the endpoint should be compromised for DNS Tunneling.
Protection Type: DNS Trap , where the Checkpoint will give the Bogus IP and responds to the client as it is DNS server.
My query is here in this case,
1) The Protection Type: DNS Reputation, what does this protection type does?
2) Here is the endpoints is trying to access Malicious sites?
From the logs,
3) In the Forensics Details,
Resource: info-update.org
Action Details: Bypass
Is the Resource is the site that the endpoint is try to access? If yes, as the action details mentioned "bypass " is it succeeded to access the site?
4) Action: Detect, what does this Detect log means?
Form the logs, I observed some bytes of data has been transferred
Sent Bytes:286.7M
Received Bytes:652.2M
As per my knowledge some data has been transferred when we query for any DNS query.
Is there any limitation for Sent and received data bytes, because I observe some of the other logs have Sent and Received Bytes is Gigabytes, is it abnormal?
Please assist me in this, if I am wrong in my understanding please guide me.
Regards,
Saranya