Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Ensure that you have enabled the following on the BloxOne Threat Defense Cloud Client:

    • Credentials to access your BloxOne Threat Defense Cloud Services Portal tenant. An email address and a password of a valid user can be used. The best practice is to use a dedicated service account on the Cloud Services Portal as the email address and its associated API key as the password. Service accounts on the Cloud Services Portal have an auto-generated email address that you can use (for example, user.service.[UUID]@infoblox.invalid). You must use a service account if the interactive user login IDs are restricted with by multi-factor authentication.

    • A Grid member that is online.

  • Ensure that at least one outbound notification rule for DNS RPZ event type is active for outbound settings.

  • Only superusers can update the BloxOne Threat Defense Cloud Client settings.

  • If the timestamp for the data collected by the BloxOne Threat Defense Cloud Client is ahead of the current time in NIOS, then such events are logged in the syslog. In such an instance, the client does not request any data until the current time reaches the timestamp of the data that is collected and it logs a message in the Infoblox.log based on the time interval that you have set.

...