{"id":1398,"date":"2018-07-12T21:46:59","date_gmt":"2018-07-12T21:46:59","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1398"},"modified":"2020-05-06T10:27:04","modified_gmt":"2020-05-06T17:27:04","slug":"top-security-report-1-dns-top-rpz-hits","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/","title":{"rendered":"Top Security Report #1: DNS Top RPZ Hits"},"content":{"rendered":"<p>This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.<\/p>\n<p>Here are the previous parts:\u00a0<a href=\"\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 1<\/a>, <a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 2<\/a>,\u00a0<a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 3<\/a>,\u00a0<a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 4<\/a>,\u00a0<a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 5<\/a>,\u00a0<a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 6<\/a>,\u00a0<a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 7<\/a>\u00a0<\/p>\n<h2 id=\"toc-hId--1333248585\">DNS Top RPZ Hits<\/h2>\n<p>Similar to top\u00a0<a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">report #2<\/a>, the DNS Top RPZ Hits report helps deliver data protection and malware mitigation by showing which clients have the most malicious activities using threat intel RPZ rules defined through Active Trust.\u00a0\u00a0<strong><em>Network admins<\/em><\/strong>\u00a0need to know which clients are conducting bad DNS network queries, for monitoring and pre-emptive action.\u00a0\u00a0<strong><em>Security admins<\/em><\/strong>\u00a0need to identify malicious real-time and historical clients and domains to cut response time for damage mitigation and resolution.\u00a0A typical security use case occurs when a security admin needs to identify all the\u00a0clients\u00a0that are visiting a known malicious domain or all malicious domains a known infected client is engaging.<\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"488\"><strong>Top Report #1: DNS Top RPZ Hits<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Service Area<\/strong><\/td>\n<td width=\"298\">Data Protection &amp; Malware Mitigation<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Purpose<\/strong><\/td>\n<td width=\"298\">Shows clients with the most malicious activities<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Primary User<\/strong><\/td>\n<td width=\"298\">Network &amp; Security Admins<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Importance<\/strong><\/td>\n<td width=\"298\">Identifies RPZ domains which have the most hits from qualified malicious domains and shortens the time to identify malware impacts by tracking attempts made to reach domains on the RPZ list<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Use Case<\/strong><\/td>\n<td width=\"298\">Enables security admins to identify all clients visiting a known malicious domain or all malicious domains a known infected client is engaging<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Available<\/strong><\/td>\n<td width=\"298\">Out-of-the-box &amp; requires Active Trust\/Active Trust Cloud (AT\/ATC)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This report is located through the security dashboard and utilizes Active Trust\/Active Trust Cloud.\u00a0 Admins can search and sort by time, top Number, client IP, domain name, DNS view, members, mitigation action, RPZ zone, RPZ entry, severity and detailed aggregated hits count.\u00a0 Admins can filter by severity level (all, critical, major, warning and informational) to quickly parse the domains that are of critical or major levels of concern, so they can run a virus scan or send it for further action by the security team.\u00a0 It can also be saved to run automatically at regular intervals, and if rules are violated, it can be programmed to trigger an alert, transfer a raw data file for further processing, run a script, send an SNMP trap to a security system, send an email to the security team, pass the alert to the syslog or other actions.\u00a0 This report can be used to share data with the security ecosystem and other tools on the network, to help identify and stop threats in their tracks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1399\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/top-security-report-1-dns-top-rpz-hits-report.png\" alt=\"Top Security Report #1 - DNS Top RPZ Hits Report\" width=\"600\" height=\"256\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-security-report-1-dns-top-rpz-hits-report.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-security-report-1-dns-top-rpz-hits-report-300x128.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here are the seven (7) security reports that can give you an edge over the bad actors.<\/p>\n<ul>\n<li><a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #6: Threat Protection &#8211; Top Rules by Source<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #5: Top Malware &amp; DNS Tunneling by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #4: Tunneling Traffic by Category<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #3: DNS Top Tunneling Activity<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #2: Malicious Activity by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-1-dns-top-rpz-hits\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #1: DNS Top RPZ Hits<\/a><\/li>\n<\/ul>\n<h2 id=\"toc-hId-1329261589\">Learn more:<\/h2>\n<ul>\n<li>Join the Infoblox Reporting &amp; Analytics Technical Demo Series to continue the discussion in the free webinar on 7\/17, 2018, 9A PDT, 12P EDT, 5P BST.\u00a0<a href=\"https:\/\/infoblox.zoom.us\/meeting\/register\/a4f2cc50de136b83dc2040ba88984b7b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Register<\/a><\/li>\n<li>As an existing Infoblox DDI customer, you can deploy a virtual Infoblox Reporting &amp; Analytics appliance free of charge \u2014 no strings attached.\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__info.infoblox.com_WW-5FFY17-5FOS-5FFR-5FReportingAnalyticsFreeTierDownload-3Futm-5Fsource-3Dblox-2Dcommunity-26utm-5Fcampaign-3Dcommunity-2Dq2&amp;d=DwMGaQ&amp;c=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E&amp;r=GVp6jcnVnuL0Gt3sI2iNDqwbBy_ggT-pLWoFGKRoaBo&amp;m=xZuyCuq7F8uEaK9Dd665WpoPRXMvCdoYGfRiUJijM-c&amp;s=qDnqbSNVyVRYSOGBWT5PePzVe6QhRyEmiqm7M_ymXos&amp;e=&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download<\/a>\u00a0and try the\u00a0<a href=\"http:\/\/info.infoblox.com\/WW_FY17_OS_FR_ReportingAnalyticsFreeTierDownload?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Reporting &amp; Analytics Free Tier today.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts:\u00a0part 1, part 2,\u00a0part 3,\u00a0part 4,\u00a0part 5,\u00a0part 6,\u00a0part 7\u00a0 DNS Top RPZ Hits Similar to top\u00a0report #2, the DNS Top RPZ Hits report helps deliver data protection and malware [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":590,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[64,15],"class_list":{"0":"post-1398","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-reporting-and-analytics","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Security Report #1: DNS Top RPZ Hits<\/title>\n<meta name=\"description\" content=\"This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Security Report #1: DNS Top RPZ Hits\" \/>\n<meta property=\"og:description\" content=\"This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-12T21:46:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Top Security Report #1: DNS Top RPZ Hits\",\"datePublished\":\"2018-07-12T21:46:59+00:00\",\"dateModified\":\"2020-05-06T17:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/\"},\"wordCount\":541,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"keywords\":[\"Reporting and Analytics\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/\",\"name\":\"Top Security Report #1: DNS Top RPZ Hits\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"datePublished\":\"2018-07-12T21:46:59+00:00\",\"dateModified\":\"2020-05-06T17:27:04+00:00\",\"description\":\"This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/good-hygiene-securing-dns.jpeg\",\"width\":600,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-1-dns-top-rpz-hits\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Security Report #1: DNS Top RPZ Hits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Security Report #1: DNS Top RPZ Hits","description":"This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/","og_locale":"en_US","og_type":"article","og_title":"Top Security Report #1: DNS Top RPZ Hits","og_description":"This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/","og_site_name":"Infoblox Blog","article_published_time":"2018-07-12T21:46:59+00:00","article_modified_time":"2020-05-06T17:27:04+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Top Security Report #1: DNS Top RPZ Hits","datePublished":"2018-07-12T21:46:59+00:00","dateModified":"2020-05-06T17:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/"},"wordCount":541,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","keywords":["Reporting and Analytics","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/","url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/","name":"Top Security Report #1: DNS Top RPZ Hits","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","datePublished":"2018-07-12T21:46:59+00:00","dateModified":"2020-05-06T17:27:04+00:00","description":"This blog discusses the report #1 in a series of seven top security reports that can help you defend against bad actors.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/good-hygiene-securing-dns.jpeg","width":600,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-1-dns-top-rpz-hits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Top Security Report #1: DNS Top RPZ Hits"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"predecessor-version":[{"id":3646,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions\/3646"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/590"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}