The following feed policy configuration is recommended after the SURBL feeds deprecation in mid-August.
New feed recommendations: It is recommended that you do the following regarding the new feeds:
The following table includes the list of feeds that we will be retiring:
As these feeds are being retired, NIOS platforms will no longer be able to download them. This may present itself as a problem with the Zone transfer. To avoid this issue, these feeds should be removed as soon as possible. As they have been empty for a long time, there will be no negative effect on the organization’s security posture. This only affects NIOS platforms using these RPZ feeds, as cloud-based configurations are updated automatically. For information on adding and removing feeds from a security policy, see the following: |
|
The following table lists the default actions and precedence for the feeds and Threat Insight in the Default Global Policy:
Feed Name | Default Action | Default Precedence |
---|---|---|
Base | Block – No Redirect | 1 |
AntiMalware | Block – No Redirect | 2 |
Malware_DGA | Block – No Redirect | 3 |
Ransomware | Block – No Redirect | 4 |
Public_DOH | Block – No Redirect | 5 |
Public_DOH_IP | Block – No Redirect | 6 |
Threat | Allow – With Log | 7 |
Threat Insight-Data Exfiltration | Allow – With Log | 8 |
Threat Insight-Fast Flux | Allow – With Log | 9 |
Threat Insight-DNS Messenger | Allow – With Log | 10 |
AntiMalware_IP | Allow – With Log | 11 |
Ext_Base_AntiMalwar | Allow – With Log | 12 |
Ext_Ransomware | Allow – With Log | 13 |
Ext_AntiMalware_IP | Allow – With Log | 14 |
DHS_AIS_Domain | Allow – With Log | 15 |
CryptoCurrency | Allow – With Log | 16 |
TOR_Exit_Node_IP | Allow – With Log | 17 |
For information on adding and removing feeds from a security policy, see the following: