Document toolboxDocument toolbox

DNS Source

The Source tab provides information on the sources of all DNS activity in your network. To export the Source table data in csv format, click Export. The default file name is dns-activity_source.csv. The downloaded csv contains a maximum of 10,000 records.

Performing Search Queries

The search feature supports using queries to perform searches using the integrated search query language. Using the search query language, you can search all records in the Security Events report with customized queries. Using the search query options available in the DNS Source report, you can:

  • Run a search on any of the following fields:
    • DEVICE NAME
    • DHCP FINGERPRINT
    • DNS VIEW
    • MAC ADDRESS
    • OS VERSION
    • QUERY
    • QUERY TYPE
    • RESPONSE
    • SOURCE
    • USER
  • The = and the NOT (!=) operators
  • Use the AND and the OR operators.
  • Use single and double quoted to enter values with spaces. 
  • Use parentheses to group search parts.
  • Use the wildcard symbol (*) as the last character of the search value for a partial match.
  • Use the ENTER key to apply search.
  • Use the TAB key to autocomplete search with the first available suggestion.

Sample Search Queries

The following are search query examples:

  • query=domain.*AND device=52.123*
  • device=office1.domain OR device=office2.domain.com
  • dns_view=example-view AND query_type=A
  • (source=‘Infoblox Endpoint’ OR source=“example 1”) AND device=52.123*

    Search by the query fields matches values by subdomains. E.g. query = domain.com
    matches
    'domain.com', 'office.domain.com', 'space.office.domain.com

Note

All search values are case sensitive. A maximum of five operators can be used when constructing a query search.

Filtering the Source Tab

To filter Source events by specific criteria, select the applicable objects from the following drop-down menus located below the top action menu:

  • Source: The location of the device within the network infrastructure. For example, the device can be an on-prem appliance or an endpoint device. You can select which records to view by selecting or deselecting from among the options available. When filtering by source, the filter drop-down is limited to showing 10 sources.
  • Show: Security and activity events can be filtered by choosing an option from the Show drop-down menu. 

    Note

    Depending on the availability of data records, not all filter options may be displayed.

The Source table displays the following information by specific criteria, where you can select the applicable objects from the following column drop-down menus: 

  • SOURCE: The location of the device within the network infrastructure. For example, the device can be an on-prem appliance or an endpoint device. 
  • REQUESTS: The request type. Clicking the number of requests in the REQUESTS column associated with a source displays all requests associated with the source. 
  • DEVICES: The number of devices that are used to access the corresponding internet content. Clicking the number of requests in the DEVICES column associated with a source displays all requests associated with the source.

    Note

    You can add and remove custom fields by clicking on the icon located in the top, right-hand corner of the table, and selecting or deselecting which custom fields you want to view. All fields can be selected or deselected, or they can be returned to the default configuration by clicking Restore to default GRID setting.

Export Records

Click Export to download a CSV file of report records. The maximum number of exported DNS Source report records is 10,000.