...
- Use the Cloud Service Portal to define the scope of the networks you would like to protect from malicious attacks:
- For your company's public networks, see Configuring External Networks.
- For roaming end users, see BloxOne Endpoint or BloxOne Mobile Endpoint.
- For on-premise networks (including the NIOS Grid), see Configuring DNS Forwarding Proxy.
- Set up the initial security configuration on the defined network scope. For details on:
- Setting up custom lists, see Creating Custom Lists.
- Applying category or application filters, see Using Filters.
- Viewing the threat intelligence feeds that BloxOne Threat Defense offers based on your subscription level, see Viewing Threat Intelligence Feeds.
- Configure security rules and policies, or point your networks to a redirect page. For details on:
- Applying security policies to the networks you have defined, see Configuring Security Policies.
- Using the default redirect page or configuring custom redirects, see Defining the Redirect Page.
- Use the reports, dashboards, Infoblox Threat Lab, Dossier, and TIDE to analyze your security policies and take appropriate actions. BloxOne Threat Defense uses advanced analytics to provide reports that will help you analyze DNS traffic and monitor the effectiveness of your security configuration. For details on:
- Viewing the reports provided by BloxOne, see Viewing Reports.
- Viewing high-level statistics, see Viewing the Dashboards.
In addition to reporting, you can use Dossier research, active indicators, and Infoblox Threat Lab to investigate suspicious domains and decide what action you might want to take. For more information:
About Dossier, see Infoblox Dossier.
About active indicators, see Active Indicators Search Tool.
About threat lab, see Infoblox Threat Lab.
Optionally, you can do the following to enhance security in your network infrastructure:
...
For more information about BloxOne Threat Defense, see the following:
...