Configuring Anti-Bot & Advanced DNS Settings

Watch the Video

In the profile settings, go to Anti-Bot & Advanced DNS Settings.

In the General section, configure the Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT. UserCheck Settings:

Configure Advanced DNS Settings

Enable/Disable Advanced DNS features:

  • DGA (Domain Generation Algorithm) - This feature detects domains generated by a DGA, mainly used for C&C communication of malware.

  • DNS Tunneling (domain name based) - The feature detects DNS tunnels that use domain names to transfer data.

  • NXNS Attack Detection - This feature detects whether the DNS replies exhibit behavior consistent with NXNS Attack.

Protocol related features:

Configuring a Malware DNS Trap

The Malware DNS trap works by configuring the Security Gateway to return a false (fabricated) IP address for known malicious hosts and domains. You can use the Security Gateway external IP address as the DNS trap address but:

  • Do not use a gateway address that leads to the internal network.

  • Do not use the gateway internal management address.

  • If the gateway external IP address is also the management address, select a different address for the DNS trap.

You can also add internal DNS servers to better identify the origin of malicious DNS requests.

Using the Malware DNS Trap, you can detect compromised clients by checking logs with connection attempts to the false IP address.

At the Security Gateway level, you can configure the DNS Trap according to the profile settings or as a specific IP address for all profiles on the specific gateway.

Malware DNS Trap supports only IPv4.