Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Depending on your subscription level, each feed and Threat Insight policy in the Default Global Policy comes with a default action. 

...

Ensure that you understand the ramification of overriding the default action for any threat feeds and Threat Insight rules before doing so.


Feed NameDefault ActionDefault Precedence
Default AllowAllow - No log1
Default BlockBlock  – No Redirect2
BaseBlock  – No Redirect3
AntiMalwareBlock  – No Redirect4
Malware_DGABlock  – No Redirect5
RansomwareBlock  – No Redirect6
Threat Insight - Zero Day DNSBlock  – No Redirect7
Suspicious_DomainsBlock  – No Redirect8
Suspicious_Block  – No Redirect9
Suspicious_NOEDBlock  – No Redirect10
Public_DOHBlock  – No Redirect
7
11
Public_DOH_IPBlock  – No Redirect
8
12
NOEDAllow – With Log13
Threat Insight - DGAAllow – With Log
9
14
Threat Insight - Data ExfiltrationAllow – With Log
10
15
Threat Insight - Notional Data ExfiltrationAllow – With Log
11
16
Threat Insight - Fast FluxAllow – With Log
12
17
Threat Insight - DNS MessengerAllow – With Log
13
18
AntiMalware_IPAllow – With Log
14
19
Ext_Base_AntiMalware Allow – With Log
15
20
Ext_RansomwareAllow – With Log
16
21
Ext_AntiMalware_IPAllow – With Log
17
22
DHS_AIS_ DomainAllow – With Log
18
23
CryptocurrencyAllow – With Log
19
24
TOR_Exit_Node_IPAllow – With Log
20
25
BlocklistBlock  – No Redirect
21
26


Infoblox recommends adhering to the following best practices when configuring feed precedence. 

...

Note
titleNote
  • Given that IP addresses can be reused over a period of time, blocking IP addresses is riskier than blocking domains or hostnames. So, to avoid false positives, for those external or third-party IP-based feeds like DHS_AIS_IP that are added to policy through voluntary addition (other than what’s provided by default), Infoblox recommends only an Allow-With Log policy action and not a Block policy action.
  • Ensure that the precedence order assigned to the Security Policies are properly configured.
  • Make sure that Geolocation option is enabled in Security Policy to ensure that the ECS supported domains should get DNS response accordingly from the authoritative nameservers. For more information, see Best Practices for Data Connector. 
  • Ensure that the precedence order assigned to the Security Policies are properly configured.
Note
titleAdvisory

For information on the recommended Rule Actions to be applied in preparation of the August 22, 2023 feed changes, see the topic on Recommended Rule Actions in Preparation of the August 2023 Feed Changes

For information on recommended rule actions to be applied to feeds as replacement to the deprecated SURBL feeds, see Recommended Feed Configuration to Replace the SURBL Feeds

...