{"id":5893,"date":"2021-01-20T15:18:15","date_gmt":"2021-01-20T23:18:15","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5893"},"modified":"2021-01-20T15:18:15","modified_gmt":"2021-01-20T23:18:15","slug":"new-bloxone-threat-defense-feature-policy-management","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/","title":{"rendered":"New BloxOne\u2122 Threat Defense Feature Policy Management"},"content":{"rendered":"<h3><b>Introduction<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.\u00a0<\/span><\/p>\n<h3><b>Prerequisites<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access to a BloxOne Account via the Infoblox CSP<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A CSP Tenant with a BloxOne Threat Defense license<\/span><\/li>\n<\/ul>\n<h3><b>Getting Started<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Recently, you may have noticed a dialog box notifying you of the changes to how BloxOne handles Security Policies. This notification occurs if you haven\u2019t accessed your Security Policies since the recent update to Security Policies. Once you acknowledge the notification, you\u2019re ready to manage your policies.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5902\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-1.png\" alt=\"\" width=\"617\" height=\"595\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-1.png 617w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-1-300x289.png 300w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re familiar with the Security Policy panel, the first thing you\u2019ll notice is the new<\/span><b> Precedence<\/b><span style=\"font-weight: 400;\"> column:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5901\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-2.png\" alt=\"\" width=\"512\" height=\"125\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-2.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-2-300x73.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p><b>Precedence<\/b><span style=\"font-weight: 400;\"> defines which security list is checked first when inspecting packets. Policies with the lowest <\/span><b>Precedence<\/b><span style=\"font-weight: 400;\"> are checked first.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By clicking a <\/span><b>checkbox<\/b><span style=\"font-weight: 400;\"> associated with a policy, and clicking <\/span><b>Edit,<\/b><span style=\"font-weight: 400;\"> you can inspect a Security policy.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5900\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-3.png\" alt=\"\" width=\"512\" height=\"125\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-3.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-3-300x73.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Note: In the new Security Policy interface, instead of a tiered list with dropdown menus, there\u2019s a new navigation panel on the left. On the primary screen, you can now adjust the <\/span><b>Precedence<\/b><span style=\"font-weight: 400;\"> of a Security Policy.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5899\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-4.png\" alt=\"\" width=\"512\" height=\"123\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-4.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-4-300x72.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Clicking on <\/span><b>Policy Rules<\/b><span style=\"font-weight: 400;\"> in the navigation panel will reveal the new interface for Policy Rules.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5898\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-5.png\" alt=\"\" width=\"874\" height=\"757\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-5.png 874w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-5-300x260.png 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-5-768x665.png 768w\" sizes=\"auto, (max-width: 874px) 100vw, 874px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Note the <\/span><b>Order<\/b><span style=\"font-weight: 400;\"> of the lists. This means these specific lists are checked first whenever a packet is inspected. In the example screenshot, the Custom List named <\/span><b>Custom_Blocklist<\/b><span style=\"font-weight: 400;\"> is checked first.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the <\/span><b>Custom Lists<\/b><span style=\"font-weight: 400;\"> tab of Security Policy page, we can observe the settings of a Custom list. Click a checkbox associated with a list, then click <\/span><b>Edit<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5897\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-6.png\" alt=\"\" width=\"479\" height=\"194\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-6.png 479w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-6-300x122.png 300w\" sizes=\"auto, (max-width: 479px) 100vw, 479px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Here you can see the same interface for a <\/span><b>Custom List<\/b><span style=\"font-weight: 400;\">. However, notice the <\/span><b>Threat Level<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Threat Confidence<\/b><span style=\"font-weight: 400;\"> lists that are now customizable. These metrics allow you to custom tailor the perceived threat and threat confidence of any queries that are caught by this Custom List. By defining these metrics you are able to easily filter events of this type in the Reports section of the Infoblox CSP.\u00a0 <\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5896\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/B1TD-feature-7.png\" alt=\"\" width=\"512\" height=\"235\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-7.png 512w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/B1TD-feature-7-300x138.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p>\n<h3><b>Summary<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With the addition of Precedence, and Policy Rule Order to Security Policies, and the addition of Threat Confidence and Threat Level to Custom Lists, you can now, more effectively, tune how DNS queries are managed in your network. The update to Security policies improves BloxOne Threat Defense, an already best-in-class DNS protection platform.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when [&hellip;]<\/p>\n","protected":false},"author":350,"featured_media":3212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[228,164,189],"class_list":{"0":"post-5893","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-bloxone-threat-defense","9":"tag-saas","10":"tag-cybersecurity","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New BloxOne\u2122 Threat Defense Feature Policy Management<\/title>\n<meta name=\"description\" content=\"New BloxOne\u2122 Threat Defense Feature Policy Management. Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New BloxOne\u2122 Threat Defense Feature Policy Management\" \/>\n<meta property=\"og:description\" content=\"New BloxOne\u2122 Threat Defense Feature Policy Management. Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-20T23:18:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Zenone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Zenone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/\"},\"author\":{\"name\":\"David Zenone\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/44f8c830b167b6fd384677b115cf9ec7\"},\"headline\":\"New BloxOne\u2122 Threat Defense Feature Policy Management\",\"datePublished\":\"2021-01-20T23:18:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/\"},\"wordCount\":429,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"keywords\":[\"BloxOne\u00ae Threat Defense\",\"SaaS\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/\",\"name\":\"New BloxOne\u2122 Threat Defense Feature Policy Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"datePublished\":\"2021-01-20T23:18:15+00:00\",\"description\":\"New BloxOne\u2122 Threat Defense Feature Policy Management. Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cloud-computers.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/new-bloxone-threat-defense-feature-policy-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New BloxOne\u2122 Threat Defense Feature Policy Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/44f8c830b167b6fd384677b115cf9ec7\",\"name\":\"David Zenone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_350_1611073681-96x96.jpg\",\"caption\":\"David Zenone\"},\"description\":\"David Zenone is a Technical Marketing Engineer. David joined Infoblox in late 2019 and has created multiple integrations with NIOS using Outbound Notifications. In addition to building Security Ecosystem integrations David has become a subject matter expert on Infoblox\u2019s SaaS offerings. In his free time he enjoys playing the Guitar, building and playing on PCs, and spending time with his family.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/david-zenone\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New BloxOne\u2122 Threat Defense Feature Policy Management","description":"New BloxOne\u2122 Threat Defense Feature Policy Management. Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/","og_locale":"en_US","og_type":"article","og_title":"New BloxOne\u2122 Threat Defense Feature Policy Management","og_description":"New BloxOne\u2122 Threat Defense Feature Policy Management. Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/","og_site_name":"Infoblox Blog","article_published_time":"2021-01-20T23:18:15+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","type":"image\/jpeg"}],"author":"David Zenone","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Zenone","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/"},"author":{"name":"David Zenone","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/44f8c830b167b6fd384677b115cf9ec7"},"headline":"New BloxOne\u2122 Threat Defense Feature Policy Management","datePublished":"2021-01-20T23:18:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/"},"wordCount":429,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","keywords":["BloxOne\u00ae Threat Defense","SaaS","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/","url":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/","name":"New BloxOne\u2122 Threat Defense Feature Policy Management","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","datePublished":"2021-01-20T23:18:15+00:00","description":"New BloxOne\u2122 Threat Defense Feature Policy Management. Infoblox\u2019s BloxOne\u2122 platform is steadily becoming a complete SaaS experience for Security and DDI. One of the recent changes to BloxOne Threat Defense has been an update to Security Policies. BloxOne Threat Defense now allows for granular control over the precedence of Security Policies, and the order in which security lists are checked when examining packets.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cloud-computers.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/new-bloxone-threat-defense-feature-policy-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"New BloxOne\u2122 Threat Defense Feature Policy Management"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/44f8c830b167b6fd384677b115cf9ec7","name":"David Zenone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_350_1611073681-96x96.jpg","caption":"David Zenone"},"description":"David Zenone is a Technical Marketing Engineer. David joined Infoblox in late 2019 and has created multiple integrations with NIOS using Outbound Notifications. In addition to building Security Ecosystem integrations David has become a subject matter expert on Infoblox\u2019s SaaS offerings. In his free time he enjoys playing the Guitar, building and playing on PCs, and spending time with his family.","url":"https:\/\/www.infoblox.com\/blog\/author\/david-zenone\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5893"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5893\/revisions"}],"predecessor-version":[{"id":5903,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5893\/revisions\/5903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3212"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}