{"id":1394,"date":"2018-07-12T21:43:23","date_gmt":"2018-07-12T21:43:23","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1394"},"modified":"2020-05-06T10:27:04","modified_gmt":"2020-05-06T17:27:04","slug":"top-security-report-2-malicious-activity-by-client","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/","title":{"rendered":"Top Security Report #2: Malicious Activity by Client"},"content":{"rendered":"<p>This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.<\/p>\n<p>Here are the previous parts:\u00a0<a href=\"\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 1<\/a>, <a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 2<\/a>,\u00a0<a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 3<\/a>,\u00a0<a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 4<\/a>,\u00a0<a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 5<\/a>,\u00a0<a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 6<\/a><\/p>\n<h2 id=\"toc-hId--1333248587\">Malicious Activity by Client<\/h2>\n<p>Our top #2 report drives data protection and malware mitigation by showing which clients have the most malicious activity on the network based on threat intel RPZ rules defined through Active Trust.\u00a0Network<strong><em>\u00a0admins<\/em><\/strong>\u00a0need to know which clients are engaged in network service-impacting behavior, so they can monitor and block them if needed.\u00a0\u00a0<strong><em>Security admins<\/em><\/strong>\u00a0use this report to discover which devices are infected with malware and are leveraging the DNS attack vector so that they can take pre-emptive action.\u00a0 A common security use case occurs when a device is known to have been compromised in the past, so this report is used to determine which real-time and historical malicious activities are linked to the device.\u00a0 It\u2019s especially helpful to see how far back a device has been infected to identify the related impact and take corrective action.<\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"488\"><strong>Top Report #2: Malicious Activity by Client<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Service Area<\/strong><\/td>\n<td width=\"298\">Data Protection &amp; Malware Mitigation<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Purpose<\/strong><\/td>\n<td width=\"298\">Shows clients with the most malicious network activities<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Primary User<\/strong><\/td>\n<td width=\"298\">Network &amp; Security Admins<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Importance<\/strong><\/td>\n<td width=\"298\">Identifies which clients are performing malicious activities within a given timeframe &amp; which clients require corrective action<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Use Case<\/strong><\/td>\n<td width=\"298\">Enables Security admins to investigate compromised devices to determine which malicious real-time and historical activities are linked to it<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Available<\/strong><\/td>\n<td width=\"298\">Out-of-the-box &amp; requires Active Trust\/Active Trust Cloud (AT\/ATC)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This report is found under the security dashboard and requires Active Trust\/Active Trust Cloud.\u00a0 Filters include time, top Number of clients, top Number of domains, hit count and data views by bar chart, table or combined.\u00a0 By selecting the client ID, admins can drill down to see the number of hits, domains impacted and the last active date\/time stamp for deeper forensic insights.\u00a0 Admins can often also identify the malware based on the domains associated with the client, so there is a lot of intel and insights available through the Malicious Activity by Client report.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1395\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/top-security-report-2-malicious-activity-by-client-report.png\" alt=\"Top Security Report #2 - Malicious Activity by Client Report\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-security-report-2-malicious-activity-by-client-report.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-security-report-2-malicious-activity-by-client-report-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here are the seven (7) security reports that can give you an edge over the bad actors.<\/p>\n<ul>\n<li><a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #6: Threat Protection &#8211; Top Rules by Source<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #5: Top Malware &amp; DNS Tunneling by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #4: Tunneling Traffic by Category<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #3: DNS Top Tunneling Activity<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #2: Malicious Activity by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-1-dns-top-rpz-hits\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #1: DNS Top RPZ Hits<\/a><\/li>\n<\/ul>\n<h2 id=\"toc-hId-1329261589\">Learn more:<\/h2>\n<ul>\n<li>Join the Infoblox Reporting &amp; Analytics Technical Demo Series to continue the discussion in the free webinar on 7\/17, 2018, 9A PDT, 12P EDT, 5P BST.\u00a0<a href=\"https:\/\/infoblox.zoom.us\/meeting\/register\/a4f2cc50de136b83dc2040ba88984b7b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Register<\/a><\/li>\n<li>As an existing Infoblox DDI customer, you can deploy a virtual Infoblox Reporting &amp; Analytics appliance free of charge \u2014 no strings attached.\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__info.infoblox.com_WW-5FFY17-5FOS-5FFR-5FReportingAnalyticsFreeTierDownload-3Futm-5Fsource-3Dblox-2Dcommunity-26utm-5Fcampaign-3Dcommunity-2Dq2&amp;d=DwMGaQ&amp;c=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E&amp;r=GVp6jcnVnuL0Gt3sI2iNDqwbBy_ggT-pLWoFGKRoaBo&amp;m=xZuyCuq7F8uEaK9Dd665WpoPRXMvCdoYGfRiUJijM-c&amp;s=qDnqbSNVyVRYSOGBWT5PePzVe6QhRyEmiqm7M_ymXos&amp;e=&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download<\/a>\u00a0and try the\u00a0<a href=\"http:\/\/info.infoblox.com\/WW_FY17_OS_FR_ReportingAnalyticsFreeTierDownload?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Reporting &amp; Analytics Free Tier today.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts:\u00a0part 1, part 2,\u00a0part 3,\u00a0part 4,\u00a0part 5,\u00a0part 6 Malicious Activity by Client Our top #2 report drives data protection and malware mitigation by showing which clients have the most [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":1478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[64,15],"class_list":{"0":"post-1394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-reporting-and-analytics","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Security Report #2: Malicious Activity by Client<\/title>\n<meta name=\"description\" content=\"This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Security Report #2: Malicious Activity by Client\" \/>\n<meta property=\"og:description\" content=\"This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-12T21:43:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Top Security Report #2: Malicious Activity by Client\",\"datePublished\":\"2018-07-12T21:43:23+00:00\",\"dateModified\":\"2020-05-06T17:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/\"},\"wordCount\":481,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"keywords\":[\"Reporting and Analytics\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/\",\"name\":\"Top Security Report #2: Malicious Activity by Client\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"datePublished\":\"2018-07-12T21:43:23+00:00\",\"dateModified\":\"2020-05-06T17:27:04+00:00\",\"description\":\"This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/community-banner-11.jpg\",\"width\":725,\"height\":483,\"caption\":\"Computer crime concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-2-malicious-activity-by-client\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Security Report #2: Malicious Activity by Client\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Security Report #2: Malicious Activity by Client","description":"This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/","og_locale":"en_US","og_type":"article","og_title":"Top Security Report #2: Malicious Activity by Client","og_description":"This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/","og_site_name":"Infoblox Blog","article_published_time":"2018-07-12T21:43:23+00:00","article_modified_time":"2020-05-06T17:27:04+00:00","og_image":[{"width":725,"height":483,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Top Security Report #2: Malicious Activity by Client","datePublished":"2018-07-12T21:43:23+00:00","dateModified":"2020-05-06T17:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/"},"wordCount":481,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","keywords":["Reporting and Analytics","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/","url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/","name":"Top Security Report #2: Malicious Activity by Client","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","datePublished":"2018-07-12T21:43:23+00:00","dateModified":"2020-05-06T17:27:04+00:00","description":"This blog discusses the report #2 in a series of seven top security reports that can help you defend against bad actors.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/community-banner-11.jpg","width":725,"height":483,"caption":"Computer crime concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-2-malicious-activity-by-client\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Top Security Report #2: Malicious Activity by Client"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1394"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1394\/revisions"}],"predecessor-version":[{"id":1446,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1394\/revisions\/1446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1478"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}