Threat insight stops DNS exfiltration but part of the document goes through, can this be stopped?
If I have a client using a http/https explicit proxy, can we do the local RPZ rules by client IP?
For RPZ policy actions, are there real life use examples for each?
Would the option for Add client IP to outgoing recursive queries work for on premise forwarded too?
Security Implications Exposed Join Token
If I have a client using a http/https explicit proxy, can we do the local RPZ rules by client IP?
For RPZ policy actions, are there real life use examples for each?
Would the option for Add client IP to outgoing recursive queries work for on premise forwarded too?
Security Implications Exposed Join Token
Top Posters
|
|
|
|
|
|
|
|
|
|
Infoblox Blog Posts