- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- Traffic blocked by AV and Anti-Bot blades
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Traffic blocked by AV and Anti-Bot blades
Hello, everybody.
I have a ClusterXL with R81.10 version.
Currently, we have 1 IP from a server in our LAN, which seems to be having "malware problems, or some virus", because in the AV and Anti-Bot blades from the SmartConsole, the following is observed.
We want to be "sure" that ClusterXL is "blocking" this traffic from this server.
The "PREVENT" action can "give us that peace of mind" that the traffic is being blocked, or do we need to check something else in the Firewall?
These are some reference images.
I hope you can help me with any comments.
Thank you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The listed connections have been prevented (blocked) as outlined in sk74060.
You should investigate the actual endpoint itself further in addition to other traffic logs for this host.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i'm left with a bigger question based on your comment and the SK.
According to the logs I have shared, in my scenario, the traffic is being "blocked", or "allowed"????
Because I have assumed, by seeing "PREVENT", that the traffic from that IP in my DMZ, is being blocked, when it tries to reach that destination.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Logs are showing that attempts to resolve C&C IPs are blocked.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The profile I am using for this type of scenario is as follows:
Can we have the "peace of mind" that we have well configured the profile to prevent the server from attempting this type of connection?
Thank you for your comments.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You need to define "Peace of mind" first. In this profile, DNS requests to known and suspected C&Cs will be trapped and blocked. This does not give you 100% protection from malware. You still need to clean up the infected hosts.
