Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

BloxOne Infoblox Threat Defense integrates threat intelligence feeds, rules, custom lists, category and application filters, and advanced analytics to strengthen your network’s security and protect you from escalating cyber threats that can adversely affect your business. BloxOne  Infoblox Threat Defense combines secure DNS resolution in the cloud with advanced analytics tools for detecting and preventing a broad range of threats, such as DGA families, data exfiltration, lookalike domains, and fast flux. These tools consist of reports, active indicators, Threat Lab, Dossier research, and TIDE (Threat Intelligence Data Exchange) and are based on machine learning, highly accurate and aggregated threat intelligence, and automation. All these features work together to provide insight into your network’s security and into infected and compromised devices.

To begin protecting your network with BloxOne with Infoblox Threat Defense, use the Cloud Services the Infoblox Portal to define a network scope to which you will apply security configuration. The network scope can include your company's public networks, roaming end users, and on-premise networks (including the NIOS Grid). Next, configure custom lists, add filters, and apply security policies to the network scope. Based on your subscription level, BloxOne  Infoblox Threat Defense will automatically apply threat intelligence feeds to your defined networks.

The following illustration describes the high-level workflow for deploying BloxOne deploying Infoblox Threat Defense:

The high-level workflow for deploying BloxOne Threat Defense includes the initial setup of the system, defining the scope of the network, configuring specific security policies, and concludes with analyzing and researching the outcomes and security data.Image RemovedThe high-level workflow for deploying BloxOne Threat Defense includes the initial setup of the system, defining the scope of the network, configuring specific security policies, and concludes with analyzing and researching the outcomes and security data.Image Added

Diagram: The high-level workflow for deploying BloxOne deploying Infoblox Threat Defense includes the initial setup of the system, defining the scope of the network, configuring specific security policies, and concludes with analyzing and researching the outcomes and security data.

To deploy BloxOne deploy Infoblox Threat Defense, complete the following steps:

  1. Use the Cloud Service the Infoblox Portal to define the scope of the networks you would like to protect from malicious attacks:
  2. Set up the initial security configuration on the defined network scope. For details on:
  3. Configure security rules and policies, or point your networks to a redirect page. For details on:
  4. Use the reports, dashboards, Infoblox Threat Lab, Dossier, and TIDE to analyze your security policies and take appropriate actions. BloxOne  Infoblox Threat Defense uses advanced analytics to provide reports that will help you analyze DNS traffic and monitor the effectiveness of your security configuration. For details on:

Optionally, you can do the following to enhance security in your network infrastructure:

  1. Configure an on-prem DNS firewall for your NIOS Grid to receive feeds from BloxOne Cloudfrom Infoblox Platform. For details, see Configuring On-Prem DNS Firewall.
  2. View threat intelligence feeds that BloxOne that Infoblox Threat Defense offers based on your subscription level. For details, see Viewing Threat Intelligence Feeds.

For more information about BloxOne about Infoblox Threat Defense, see the following:

Excerpt
hiddentrue

Drawio
mVer2
simple0
zoom1
inComment0
custContentId244351421
pageId9083972
diagramDisplayNameB1TDHighLevelSteps
lbox1
contentVer1213
revision1213
baseUrlhttps://infoblox-docs.atlassian.net/wiki
diagramNameUntitled Diagram-1684880996123.drawio
pCenter1
width1002
links
tbstyle
height411.5

...