Document toolboxDocument toolbox

Configuring Combination Threat Feeds

Infoblox has a large and robust offering of threat intelligence feeds that allow you to tailor your security to your needs. In an effort to simplify the process, Infoblox has created “combination feeds” to group sets of threat intelligence feeds in order to reduce the number of choices and make the process more intuitive. As no two users have the same requirements, threat intelligence feeds have been narrowed to a small number of “sets”. The set you choose depends on the sensitivity your environment has to protection of potential threats as compared to the sensitivity your environment has to blocking potentially benign sites.

Aside from simplifying the choice from more than twenty individual feeds to a single set, there are other benefits to these feeds as well. These feeds will continue to be curated over time. As new feeds that qualify for inclusion are introduced, new classes of indicators will be added automatically and do not require a major change to your policy rules. Similarly, as some feeds are deprecated, they can be removed from the combination feed automatically, thus not requiring maintenance of your policy rules. As these feeds are enhanced and maintained, you will be updated about any substantive changes to their contents. 

Infoblox provides four sets of combination feeds:

  • Low: Blocks the fewest number of threats but also minimizes the potential of blocking benign sites.   Examples of these environments may be universities, service providers, and public wifi access points.

  • Medium: An ideal balance between detection while minimizing the potential for  positives. The “Medium” set has been designed to be appropriate for most enterprise organizations.  If you are unsure of which set to use, “Medium” is probably the best fit for your organization

  • High: Designed for environments where security is the most important factor. These feeds are most appropriate for environments where communication is well understood and security of the devices is critical.  Examples of environments where “High” is most appropriate include server farms, networks with IoT devices or Point-of-Sale terminals.  It is not recommended for networks in which users typically surf the web or check their email.

  • Extreme: Created to provide the greatest degree of security, but these sets are not recommended for most users as the potential for  positives is much higher than normal. Use this feed at your own risk.

Each set includes two separate feeds that must be deployed together and without any other set:

  • Block: Deploy this file with the policy action of “Block”. This should be one of the first actions in the policy list, possibly following a global allow list.

  • Log: Deploy this file with the policy action of “Allow” (preferably with log). This should be one of the last actions in the policy list.  

For example, this is what a minimal policy should look like if the “Medium” set best describes your organization.

Order

Object

Action

Order

Object

Action

1

Local RPZ: Allowlist

Passthru

2

RPZ: ib-med-block

Block

3

RPZ: ib-med-log

Log Only (Disabled)

Contents of Combination Feeds

Combination feeds are combinations of existing feeds.  If you deploy either the Low, Medium, High, or Extreme combination feed set, these feeds are already combinations of one or more of the following existing feeds:

  • AntiMalware

  • AntiMalware_IP

  • Base Hostnames

  • Bogon

  • Cryptocurrency hostnames and domains

  • DoH Public Hostnames

  • DoH Public IPs

  • Exploit Kit IPs

  • Extended Base & anti-malware Hostnames

  • Extended Exploit Kits IPs

  • Extended malware IPs

  • Extended Ransomware IPs

  • Extended TOR Exit Node IPs

  • Malware DGA hostnames

  • Malware IPs

  • Ransomware

  • SURBL Fresh domains

  • SURBL Multi domains

  • SURBL Multi Lite domains

  • TOR Exit Node IPs

This means that if you use one of the combination feed sets, you must not:

  • Use it in combination with any other set. That is, do not deploy Low, Medium, and High together.  Each is completely self-contained, and deploying them together will almost certainly not provide the results you are looking for. 

  • Use it in combination with any of the other above feeds, as these feeds are already reselected in the contents of the combination feed. Therefore, deploying them together will at minimum cause your NIOS appliance to expend more resources than necessary, and may also result in undesired actions if there are conflicting policies.  

Current Contents of Each of the Combination Threat Feeds

Feeds

Extreme Block

Extreme Log

High Block

High Log

Med Block

Med Log

Low Block

Low Log

AntiMalware

✔️

 

✔️

 

 

✔️

 

✔️

AntiMalware_IP

✔️

 

✔️

 

 

✔️

 

 

Base Hostnames

✔️

 

✔️

 

✔️

 

✔️

 

Bogon

✔️

 

✔️

 

✔️

 

 

✔️

Cryptocurrency hostnames and domains

✔️

 

✔️

 

 

✔️

 

✔️

DoH Public Hostnames

✔️

 

✔️

 

 

✔️

 

✔️

DoH Public IPs

 

✔️

 

✔️

 

✔️

✔️

✔️

Extended Base & anti-malware Hostnames

✔️

 

✔️

 

✔️

 

✔️

 

Extended malware IPs

✔️

 

 

✔️

 

✔️

 

✔️

Extended Ransomware IPs

✔️

 

 

✔️

 

✔️

 

✔️

Extended TOR Exit Node IPs

✔️

 

✔️

 

 

✔️

 

✔️

Malware DGA hostnames

✔️

 

✔️

 

✔️

 

✔️

 

Malware IPs

✔️

 

 

✔️

 

✔️

 

✔️

Ransomware

✔️

 

✔️

 

✔️

 

✔️