Loading

Infoblox Threat Defense

Stack 9.0.0 Serverless Observability Serverless Security

Version 0.1.0 Beta (View all)
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic
Ingestion method(s) Network Protocol

Infoblox Threat Defense is a DNS-based security solution that protects networks from cyber threats by detecting and blocking malicious domain activity in real time. It uses threat intelligence, DNS firewalling, and behavioral analytics to identify threats like malware, phishing, and data exfiltration at the DNS layer — often before they reach endpoints or firewalls. Available as a cloud-native platform (BloxOne Threat Defense), it integrates with security tools (like SIEMs and firewalls) and supports both on-prem and hybrid deployments.

This integration supports CEF-formatted logs transmitted through a syslog server over TCP, UDP, or TLS protocols.

The Infoblox Threat Defense integration collects the following types of events.

  • Audit: - The audit log reports all administrative activities performed by specific user accounts.

  • Service: - The Service Log reports all service events.

  • Atlas Notifications: - Atlas Notifications reports all internal notification events.

  • SOC Insights: - The SOC Insights log reports information about SOC Insights security events.

  • Threat Defense Query/Response (TD DNS): - The Threat Defense Query/Response Log reports DNS query requests and responses in Infoblox Threat Defense.

  • Threat Defense Threat Feeds Hit (TD RPZ): - The Threat Defense Threat Feeds Hit Log reports Infoblox Threat Defense feeds hit information.

  • DDI DHCP Lease (DDI DHCP): - The DDI DHCP Lease Log reports information about Dynamic Host Configuration Protocol (DHCP) lease assignments and terminations.

  • DDI Query/Response (DDI DNS): - The DDI Query/Response Log reports DNS query requests and responses in Universal DDI.

Note

While the Infoblox Threat Defense integration collects logs for various event types, we have consolidated them into a single data stream named event.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions.

  1. To collect logs through the syslog server, you need to deploy a Data Connector VM by following the instructions provided here.
  2. Once the Data Connector is successfully deployed, you need to configure the traffic flow to forward logs to your syslog server. Refer to this link for guidance.
  1. In Kibana navigate to Management > Integrations.
  2. In "Search for integrations" top bar, search for Infoblox Threat Defense.
  3. Select "Infoblox Threat Defense" integration from the search results.
  4. Click on the "Add Infoblox Threat Defense" button to add the integration.
  5. Enable the data collection mode from the following: TCP, or UDP.
  6. Add all the required configuration parameters, such as listen address and listen port for the TCP and UDP, and ssl for the TLS.
  7. Click on "Save and Continue" to save the integration.

This is the Event dataset.

Note

The InfobloxDHCPOptions field will not be populated because it contains a special pattern with special characters that decode_cef cannot parse. As a result, this field will be dropped.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.