{"id":2848,"date":"2016-02-10T17:59:18","date_gmt":"2016-02-10T17:59:18","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2848"},"modified":"2020-05-06T10:30:05","modified_gmt":"2020-05-06T17:30:05","slug":"infoblox-reporting-and-analytics-for-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/","title":{"rendered":"Infoblox Reporting and Analytics for Security"},"content":{"rendered":"<p>Recently Infoblox released a new version of our\u00a0reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d. The solution is based on the Splunk engine and delivers an enhanced reporting interface so now you can create custom dashboards, reports, and alerts. This\u00a0gives you unlimited possibilities to analyze data and mine invaluable knowledge about your network.<\/p>\n<p>In this post I\u2019ll show how to extract information about security events from the reporting database and build custom reports.<\/p>\n<p><strong>In the beginning was the data model\u2026<\/strong><\/p>\n<p>Each dashboard allows to drill downs to the Search tab and explores the raw data. This is the best way to educate yourself about reporting&#8217;s possibilities. Unfortunately, the NIOS 7.3.0 Administrator Guide doesn\u2019t yet provide full details about where and how data are stored in a database so this is why it is very important to review.<\/p>\n<p>There are two types of events stored in the database: raw events and summary\/aggregated events. Raw events can contain low-level aggregated data. Because of the quantity of events that\u00a0can be generated, some events are aggregated (summarized) on the appliance before sending it to the reporting server. These summary events are aggregated on the reporting server and contain less details. Summary events usually are stored in the indexes with \u201c_summary\u201d suffix in the name. E.g. \u201cib_dns\u201d index contains raw events and \u201cib_dns_summary\u201d contains aggregated data. This gives you a possibility of managing database size effectively and do not loose the history.<\/p>\n<p>The table below contains descriptions of the \u201csecurity\u201d events in the database.<\/p>\n<table>\n<thead>\n<tr>\n<td><center>Search string<\/center><\/td>\n<td><center>Field<\/center><\/td>\n<td><center>Description<\/center><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td colspan=\"3\"><center><strong>DNS Firewall and Analytics events<\/strong><\/center><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"9\" style=\"vertical-align:middle;\">Raw events:<\/p>\n<p>index=ib_dns source=&#8221;ib:dns:query:top_rpz_hit&#8221;<\/p>\n<p>Summary events:<\/p>\n<p>index=ib_dns_summary source=&#8221;si-search-dns-rpz-hits&#8221;<\/td>\n<td>host (index=ib_dns)<br \/>\norig_host (index=ib_dns_summary)<\/td>\n<td>Hostname of DNS server<\/td>\n<\/tr>\n<tr>\n<td>CLIENT<\/td>\n<td>Client IP address<\/td>\n<\/tr>\n<tr>\n<td>DOMAIN_NAME<\/td>\n<td>Requested domain name<\/td>\n<\/tr>\n<tr>\n<td>MITIGATION_ACTION<\/td>\n<td>NX &#8211; NXDOMAIN<\/td>\n<\/tr>\n<tr>\n<td>RPZ_QNAME<\/td>\n<td>DNS Firewall rule<\/td>\n<\/tr>\n<tr>\n<td>RPZ_SEVERITY<\/td>\n<td>Severity level<\/td>\n<\/tr>\n<tr>\n<td>TOTAL_COUNT<\/td>\n<td>Count of times the rule was hit<\/td>\n<\/tr>\n<tr>\n<td>VIEW<\/td>\n<td>DNS view internal name<\/td>\n<\/tr>\n<tr>\n<td>display_name<\/td>\n<td>DNS view display name<\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\"><center><strong>External DNS Security\/Advanced DNS Protection (ADP) events<\/strong><\/center><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"10\" style=\"vertical-align:middle;\">index=ib_security source=ib:ddos:ip_rule_stats<\/td>\n<td>host (index=ib_security)<\/td>\n<td>Hostname of DNS server<\/td>\n<\/tr>\n<tr>\n<td>ACTIVE_COUNT<\/td>\n<td>Count of events<\/td>\n<\/tr>\n<tr>\n<td>NAT_STATUS<\/td>\n<td>Indicate if the client is behind NAT activated<\/td>\n<\/tr>\n<tr>\n<td>BLOCK_START<\/td>\n<td>NAT ports start range<\/td>\n<\/tr>\n<tr>\n<td>BLOCK_END<\/td>\n<td>NAT ports end range<\/td>\n<\/tr>\n<tr>\n<td>RULE_DESCRIPTION<\/td>\n<td>Description why the alert was generated or packet was dropped<\/td>\n<\/tr>\n<tr>\n<td>RULE_NAME<\/td>\n<td>Rule name<\/td>\n<\/tr>\n<tr>\n<td>RULE_SID<\/td>\n<td>Rule ID<\/td>\n<\/tr>\n<tr>\n<td>SOURCE_IP<\/td>\n<td>Client IP address<\/td>\n<\/tr>\n<tr>\n<td>SOURCE_PORT<\/td>\n<td>Source port from which the packet(s) was sent<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"7\" style=\"vertical-align:middle;\">index=ib_security source=ib:ddos:events<\/td>\n<td>host<\/td>\n<td>Hostname of DNS server<\/td>\n<\/tr>\n<tr>\n<td>ACOUNT<\/td>\n<td>Count of alerts generated by the rule<\/td>\n<\/tr>\n<tr>\n<td>DCOUNT<\/td>\n<td>Count of the dropped packets by the rule<\/td>\n<\/tr>\n<tr>\n<td>CATEGORY<\/td>\n<td>Category of the rule<\/td>\n<\/tr>\n<tr>\n<td>MESSAGE<\/td>\n<td>Rule name<\/td>\n<\/tr>\n<tr>\n<td>SEVERITY<\/td>\n<td>Severity<\/td>\n<\/tr>\n<tr>\n<td>SID<\/td>\n<td>Rule ID<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The analytics engine utilizes DNS Firewall in order to block communications. This is why events from Analytics are stored with DNS Firewall events.<\/p>\n<p><strong>Let\u2019s create some dashboards<\/strong><\/p>\n<ul>\n<li>ADP and DNS Firewall correlation<\/li>\n<\/ul>\n<p>Since you now know where data are stored and we can start building custom reports. Lets start from the simple search:<\/p>\n<pre>index=ib_dns_summary source=\"si-search-dns-rpz-hits\" | rename CLIENT as SOURCE_IP \r\n| join SOURCE_IP [search index=ib_security source=\"ib:ddos:ip_rule_stats\"] \r\n| table SOURCE_IP,ACTIVE_COUNT,TOTAL_COUNT | stats sum(ACTIVE_COUNT) as ADP, \r\n   sum(TOTAL_COUNT) as DNSFW by SOURCE_IP | sort -ADP, -DNSFW<\/pre>\n<p>This search selects DNS Firewall events and joins ADP events by source IP. A resulting table shows simple events correlation and contains list of the IP addresses and count of events blocked by ADP and DNS Firewall simultaneously (during the search period).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2852\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/adp-dns-fw-correlation.png\" alt=\"ADP DNS FW Correlation\" width=\"2729\" height=\"1156\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/adp-dns-fw-correlation.png 2729w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/adp-dns-fw-correlation-300x127.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/adp-dns-fw-correlation-768x325.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/adp-dns-fw-correlation-1024x434.png 1024w\" sizes=\"auto, (max-width: 2729px) 100vw, 2729px\" \/><\/p>\n<p>The report, which is posted\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Reporting\/ADP-and-DNS-Firewall-correlation-report\/m-p\/5233#U5233\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><u>,<\/u>\u00a0contains drill-down possibilities, so if you click on any number in ADP or DNSFW column a report related to these events will be opened.<\/p>\n<ul>\n<li>L2 domains blocked on DNS Firewall<\/li>\n<\/ul>\n<p>This search shows domains that were blocked on DNS Firewall. Simple regex extracts only L2 domains, so this report can help you quickly identify threats and false positives.<\/p>\n<pre>index=ib_dns_summary source=\"si-search-dns-rpz-hits\" \r\n| rex field=DOMAIN_NAME \"^.*(\\.|^)(?&lt;l2domain&gt;[^\\.]+\\..*)\" \r\n| table l2domain, TOTAL_COUNT \r\n| stats sum(TOTAL_COUNT) as Matches by l2domain | sort -Matches<\/pre>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2854\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/l2-domain-blocked-dns-firewall.png\" alt=\"L2 Domain Blocked on DNS Firewall\" width=\"2672\" height=\"1075\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/l2-domain-blocked-dns-firewall.png 2672w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/l2-domain-blocked-dns-firewall-300x121.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/l2-domain-blocked-dns-firewall-768x309.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/l2-domain-blocked-dns-firewall-1024x412.png 1024w\" sizes=\"auto, (max-width: 2672px) 100vw, 2672px\" \/><\/p>\n<ul>\n<li>IPAM blacklisted networks<\/li>\n<\/ul>\n<p>This simple search checks if networks registered in IPAM were compromised.<\/p>\n<pre>index=ib_ipam sourcetype=\"ib:ipam:network\" \r\n| dedup NETWORK \r\n| rex field=address \"^(?&lt;ip1&gt;\\d+\\.)(?&lt;ip2&gt;\\d+\\.)(?&lt;ip3&gt;\\d+\\.)(?&lt;ip4&gt;\\d+)$\" | eval REQ=cidr.\".\".ip4.\".\".ip3.ip2.ip1.\"rpz-ip.cnc.rpz.infoblox.local\"\r\n | addthreatstopdetails rpzorip REQ \r\n| search short_description !=\"UNKNOWN\"| table NETWORK, short_description , public_description<\/pre>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2853\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/ipam-blacklisting-networks.png\" alt=\"IPAM Blacklisting Networks\" width=\"3193\" height=\"870\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipam-blacklisting-networks.png 3193w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipam-blacklisting-networks-300x82.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipam-blacklisting-networks-768x209.png 768w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ipam-blacklisting-networks-1024x279.png 1024w\" sizes=\"auto, (max-width: 3193px) 100vw, 3193px\" \/><\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>You saw how simple it to create a new dashboards\/reports or mine the data using searches. If you have any other questions regarding the reporting solution or created a dashboard, which you want to share with public, please post your messages on the\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Reporting\/bd-p\/Reporting\" target=\"_blank\" rel=\"noopener noreferrer\">reporting forum<\/a>\u00a0of the community site.<\/p>\n<p>Vadim Pavlov<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently Infoblox released a new version of our\u00a0reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d. The solution is based on the Splunk engine and delivers an enhanced reporting interface so now you can create custom dashboards, reports, and alerts. This\u00a0gives you unlimited possibilities to analyze data and mine invaluable knowledge about your network. In [&hellip;]<\/p>\n","protected":false},"author":283,"featured_media":2761,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,110,15,67],"class_list":{"0":"post-2848","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-reporting","10":"tag-security","11":"tag-tips-tricks","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infoblox Reporting and Analytics for Security<\/title>\n<meta name=\"description\" content=\"ecently Infoblox released a new version of our reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoblox Reporting and Analytics for Security\" \/>\n<meta property=\"og:description\" content=\"ecently Infoblox released a new version of our reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-10T17:59:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vadim Pavlov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vadim Pavlov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/\"},\"author\":{\"name\":\"Vadim Pavlov\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\"},\"headline\":\"Infoblox Reporting and Analytics for Security\",\"datePublished\":\"2016-02-10T17:59:18+00:00\",\"dateModified\":\"2020-05-06T17:30:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/\"},\"wordCount\":709,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"keywords\":[\"Infoblox\",\"Reporting\",\"Security\",\"Tips &amp; Tricks\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/\",\"name\":\"Infoblox Reporting and Analytics for Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"datePublished\":\"2016-02-10T17:59:18+00:00\",\"dateModified\":\"2020-05-06T17:30:05+00:00\",\"description\":\"ecently Infoblox released a new version of our reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fighting Point-of-Sale (POS) Malware by Using DNS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/infoblox-reporting-and-analytics-for-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infoblox Reporting and Analytics for Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\",\"name\":\"Vadim Pavlov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"caption\":\"Vadim Pavlov\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/vadim-pavlov\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infoblox Reporting and Analytics for Security","description":"ecently Infoblox released a new version of our reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/","og_locale":"en_US","og_type":"article","og_title":"Infoblox Reporting and Analytics for Security","og_description":"ecently Infoblox released a new version of our reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/","og_site_name":"Infoblox Blog","article_published_time":"2016-02-10T17:59:18+00:00","article_modified_time":"2020-05-06T17:30:05+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","type":"image\/jpeg"}],"author":"Vadim Pavlov","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vadim Pavlov","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/"},"author":{"name":"Vadim Pavlov","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974"},"headline":"Infoblox Reporting and Analytics for Security","datePublished":"2016-02-10T17:59:18+00:00","dateModified":"2020-05-06T17:30:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/"},"wordCount":709,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","keywords":["Infoblox","Reporting","Security","Tips &amp; Tricks"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/","url":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/","name":"Infoblox Reporting and Analytics for Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","datePublished":"2016-02-10T17:59:18+00:00","dateModified":"2020-05-06T17:30:05+00:00","description":"ecently Infoblox released a new version of our reporting solution, which we renamed \u201cInfoblox Reporting and Analytics\u201d.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Fighting-Point-of-Sale-POS-Malware-by-Using-DNS.jpg","width":660,"height":454,"caption":"Fighting Point-of-Sale (POS) Malware by Using DNS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/infoblox-reporting-and-analytics-for-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Infoblox Reporting and Analytics for Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974","name":"Vadim Pavlov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","caption":"Vadim Pavlov"},"url":"https:\/\/www.infoblox.com\/blog\/author\/vadim-pavlov\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/283"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2848"}],"version-history":[{"count":8,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2848\/revisions"}],"predecessor-version":[{"id":3002,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2848\/revisions\/3002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2761"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}