{"id":1354,"date":"2018-07-11T21:25:46","date_gmt":"2018-07-11T21:25:46","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1354"},"modified":"2020-05-06T10:27:05","modified_gmt":"2020-05-06T17:27:05","slug":"top-security-report-6-threat-protection-top-rules-by-source","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/","title":{"rendered":"Top Security Report #6 &#8211; Threat Protection &#8211; Top Rules by Source"},"content":{"rendered":"<p>This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.<\/p>\n<p>Here are the previous parts:\u00a0<a href=\"\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 1<\/a>, <a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 2<\/a>\u00a0<\/p>\n<h2 id=\"toc-hId--1333248652\">Infoblox\u00a0Out-of-the-Box Report Threat Protection &#8211; Top Rules by Source<\/h2>\n<p>This report lists the top source IP addresses that trip each threat rule as identified through ADP threat intelligence. \u00a0For\u00a0<strong><em>network teams<\/em><\/strong>, this report gives visibility to which devices on the network are doing bad things or impacting network performance, so you can take corrective action like shutting-off the port or removing the device from the network.\u00a0 For\u00a0<strong><em>security teams<\/em><\/strong>, it provides visibility when there is trouble on the network, so the admin can intervene with the system manager, initiate a virus scan, or pursue a variety of other actions.\u00a0 It also enables admins to tune the threat rule thresholds for which traffic they want to allow or block.\u00a0 A typical security use case is when an admin suspects that a client device is infected with malware, and they need to conduct a forensic investigation to determine what the malware is doing within the DNS infrastructure and determine the malware attack methodology and frequency.<\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"488\"><strong>Top Report #6: Threat Protection<\/strong><\/p>\n<p><strong>Top Rules by Source<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Service Area<\/strong><\/td>\n<td width=\"298\">Infrastructure Protection<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Purpose<\/strong><\/td>\n<td width=\"298\">Lists the top source IPs hitting each threat rule<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Primary User<\/strong><\/td>\n<td width=\"298\">Network &amp; Security Admins<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Importance<\/strong><\/td>\n<td width=\"298\">Identifies clients that are attacking the server the most &amp; the rules they trigger, &amp; enables admins to tune rule thresholds better<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Use Case<\/strong><\/td>\n<td width=\"298\">A security admin knows a client is infected by malware, but to drill deeper into malware forensics, this report shows the malware attack methodologies and frequencies<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Available<\/strong><\/td>\n<td width=\"298\">Out-of-the-box &amp; requires Advanced Data Protection (ADP)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This report is accessed through the security dashboard and requires ADP.\u00a0 It includes filters for time, top number of rules, a counter, members, source IP address, rule names, source port and viewing options by bar chart, table or both.\u00a0 The report then displays the source IP, the number of logged events associated to that IP, the top security rules by name that were\u00a0violated, and when they last tripped those rules.\u00a0 This provides the visibility and forensic capability needed to identify bad actors, see what they\u2019re doing, the security rules they\u2019re breaking and the impacts they\u2019ve had on the network, so the admin can modify the rules and take quick, corrective action.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1360\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-threat-protection-report.png\" alt=\"Security Report #6 - Threat Protection Report\" width=\"600\" height=\"253\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-threat-protection-report.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-threat-protection-report-300x127.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here are the seven (7) security reports that can give you an edge over the bad actors.<\/p>\n<ul>\n<li><a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #6: Threat Protection &#8211; Top Rules by Source<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #5: Top Malware &amp; DNS Tunneling by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #4: Tunneling Traffic by Category<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #3: DNS Top Tunneling Activity<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #2: Malicious Activity by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-1-dns-top-rpz-hits\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #1: DNS Top RPZ Hits<\/a><\/li>\n<\/ul>\n<h2 id=\"toc-hId-1329261589\">Learn more:<\/h2>\n<ul>\n<li>Join the Infoblox Reporting &amp; Analytics Technical Demo Series to continue the discussion in the free webinar on 7\/17, 2018, 9A PDT, 12P EDT, 5P BST.\u00a0<a href=\"https:\/\/infoblox.zoom.us\/meeting\/register\/a4f2cc50de136b83dc2040ba88984b7b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Register<\/a><\/li>\n<li>As an existing Infoblox DDI customer, you can deploy a virtual Infoblox Reporting &amp; Analytics appliance free of charge \u2014 no strings attached.\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__info.infoblox.com_WW-5FFY17-5FOS-5FFR-5FReportingAnalyticsFreeTierDownload-3Futm-5Fsource-3Dblox-2Dcommunity-26utm-5Fcampaign-3Dcommunity-2Dq2&amp;d=DwMGaQ&amp;c=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E&amp;r=GVp6jcnVnuL0Gt3sI2iNDqwbBy_ggT-pLWoFGKRoaBo&amp;m=xZuyCuq7F8uEaK9Dd665WpoPRXMvCdoYGfRiUJijM-c&amp;s=qDnqbSNVyVRYSOGBWT5PePzVe6QhRyEmiqm7M_ymXos&amp;e=&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download<\/a>\u00a0and try the\u00a0<a href=\"http:\/\/info.infoblox.com\/WW_FY17_OS_FR_ReportingAnalyticsFreeTierDownload?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Reporting &amp; Analytics Free Tier<\/a>\u00a0today.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts:\u00a0part 1, part 2\u00a0 Infoblox\u00a0Out-of-the-Box Report Threat Protection &#8211; Top Rules by Source This report lists the top source IP addresses that trip each threat rule as identified through [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":566,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[64,15],"class_list":{"0":"post-1354","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-reporting-and-analytics","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR<\/title>\n<meta name=\"description\" content=\"This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Security Report #6 - Threat Protection - Top Rules by Source\" \/>\n<meta property=\"og:description\" content=\"This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-11T21:25:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Top Security Report #6 &#8211; Threat Protection &#8211; Top Rules by Source\",\"datePublished\":\"2018-07-11T21:25:46+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"keywords\":[\"Reporting and Analytics\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/\",\"name\":\"Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"datePublished\":\"2018-07-11T21:25:46+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"description\":\"This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-14.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-6-threat-protection-top-rules-by-source\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Security Report #6 &#8211; Threat Protection &#8211; Top Rules by Source\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR","description":"This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/","og_locale":"en_US","og_type":"article","og_title":"Top Security Report #6 - Threat Protection - Top Rules by Source","og_description":"This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/","og_site_name":"Infoblox Blog","article_published_time":"2018-07-11T21:25:46+00:00","article_modified_time":"2020-05-06T17:27:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Top Security Report #6 &#8211; Threat Protection &#8211; Top Rules by Source","datePublished":"2018-07-11T21:25:46+00:00","dateModified":"2020-05-06T17:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","keywords":["Reporting and Analytics","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/","url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/","name":"Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","datePublished":"2018-07-11T21:25:46+00:00","dateModified":"2020-05-06T17:27:05+00:00","description":"This blog discusses the report #6 in a series of seven top security reports that can help you defend against bad actors.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-14.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-6-threat-protection-top-rules-by-source\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Top Security Report #6 &#8211; Threat Protection &#8211; Top Rules by Source"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1354"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1354\/revisions"}],"predecessor-version":[{"id":1450,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1354\/revisions\/1450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/566"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}