This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

What do you do when an attempt to communicate with a botnet is detected?

I'm curious about what the best course of action is. One of the XG Firewalls we manage detected an attempt to communicate with a botnet. The policy is set to Log and Drop and the alert itself says "no further action is needed", but why not? I don't think we just want to log and drop this, do we?

Don't we also want to find out what's going on with the device that triggered this?

What are other people doing when they get these alerts?

I can run an additional virus scan with Malwarebytes. I can run a manual scan with Sophos Endpoint protection. I can check to see what programs are installed...

Does anyone have any other recommendations? Ideally I can come up with a procedure to follow whenever we get one of these alerts.



This thread was automatically locked due to age.
Parents Reply
  • The logs should be there at the firewall and be available through log viewer. In fact it is a bit opposite to what you said Lucar Toni: the ATP reports (something that I would expect as a Central Cloud Feature) are available on the XG but not the logs.

    : please go to Reports > Network & Threats

    and select ATP and the correct time frame.

    I can still find the event from 2021 04 22 on our XG there. In our case it was the DNS server resolving a request to this FQDN which was blocked by XG ATP.

Children