6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in use

Information

Configure DNS sinkholing for all anti-spyware profiles in use. All internal requests to the selected sinkhole IP address must traverse the firewall. Any device attempting to communicate with the DNS sinkhole IP address should be considered infected.
Rationale:
DNS sinkholing helps to identify infected clients by spoofing DNS responses for malware domain queries. Without sinkholing, the DNS server itself may be seen as infected, while the truly infected device remains unidentified. In addition, sinkholing also ensures that DNS queries that might be indicators of compromise do not transit the internet, where they could be potentially used to negatively impact the "ip reputation" of the organization's internet network subnets.

Solution

Navigate to Objects > Security Profiles > Anti-Spyware.
Within the anti-spyware profile, under its DNS Signatures tab, set Action on DNS queries to sinkhole.
Set 'Sinkhole IPv4' to the correct IP address.
Set 'Sinkhole IPv6' to the correct IP address.
Default Value:
Not Configured

See Also

https://workbench.cisecurity.org/files/2104

Item Details

Category: AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AU-3, 800-53|SI-3, 800-53|SI-4, CSCv6|8.5, CSCv6|8.6, CSCv7|8, CSCv7|8.7

Plugin: Palo_Alto

Control ID: 7f173b65af6b7cfe4618fa5aa9412f6a5632b84e700bdc54ec6c65c6089cf7e4