{"id":989,"date":"2018-05-30T15:45:29","date_gmt":"2018-05-30T15:45:29","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=989"},"modified":"2020-05-06T10:27:05","modified_gmt":"2020-05-06T17:27:05","slug":"why-you-need-reporting-amp-analytics-with-query-logging","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/","title":{"rendered":"Why You Need Reporting &#038; Analytics with Query Logging"},"content":{"rendered":"<h1 id=\"toc-hId-474202802\">The Need for DNS Query Logs<\/h1>\n<h2 id=\"toc-hId--445747980\">DNS is a known threat vector for malware<\/h2>\n<p>DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0 In fact, malware command and control (C&amp;C) is the number one threat vector for crimeware (Verizon Data Breach Investigations Report, 2016).\u00a0 Further, 91% of malware uses DNS to carry out malicious campaigns (Cisco Annual Security Report, 2016).\u00a0 According to a recent study, this can cost companies more than $500 per minute of downtime caused by DDoS attacks (Ponemon Institute, Cost of Data Breach Study, 2016).\u00a0 Yet, 70% of survey respondents in another report (Ponemon Institute, Second Annual Study on Exchange Cyber Threat Intelligence, 2015), felt that their threat intel was not timely enough for defense and mitigation.<\/p>\n<h2 id=\"toc-hId-441755701\">You are sitting on a wealth of threat mitigation data, a.k.a., your DNS query logs.<\/h2>\n<p>Surprisingly, many Security teams are often blind to the value of threat mitigation data available through their core network.<\/p>\n<p>If network conflicts, performance issues or outages occur, teams need access to the raw data found in network log files for fast root cause resolution.\u00a0 Raw data can be used by Security teams for\u00a0<strong><em>investigations and<\/em><\/strong>\u00a0<strong><em>forensics<\/em><\/strong>\u00a0to uncover a detailed query history of infected clients.\u00a0 It can further be used by Security and Audit teams for\u00a0<strong><em>access logging<\/em><\/strong>\u00a0to gain visibility into which clients queried which domains and which domains were queried by which clients for a given date and time range.\u00a0 Query logging can also aid\u00a0<strong><em>Compliance and audit<\/em><\/strong>\u00a0efforts by providing historical records of device and domain queries.\u00a0 To have this information on-demand through a few keystrokes up to two years back reduces the stress of an on-demand audit and provides significant peace-of-mind and high value when it comes to root cause discovery, analysis and resolution.<\/p>\n<h2 id=\"toc-hId-1329259382\">But, there are significant challenges to use DNS query logs without impacting DNS performance<\/h2>\n<p>Unfortunately, access to readily consumable DNS query logging is a lot more difficult than just turning up the logging feature of your DNS services. \u00a0\u00a0Infoblox Reporting and Analytics with Query Logging moves these functions out of the critical path while minimizing the impact on the DNS infrastructure.<\/p>\n<p>Here are the top three obstacles teams face:<\/p>\n<ol>\n<li><strong>Resource Strain.\u00a0<\/strong>Windows event logs or Unix Syslogs are two operating system-level logging facilities often used for query logging.\u00a0 In environments with high DNS query volumes, these facilities can overload server resources, impacting and degrading DNS core and hosted service availability and performance. \u00a0This occurs because system logging facilities aren\u2019t designed to manage hundreds, thousands or more messages per second.\u00a0 Resources needed to log and format messages along with the underlying metadata places heavy compute demands on the CPU and storage utilization.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Data Management.\u00a0<\/strong>The next challenge is how to efficiently organize and store data in a searchable format and ensure the needed redundancy to keep data accessible. Even a couple of hundred queries per second can easily require gigabytes of storage each day, snowballing into significant memory requirements over weeks, months and years.\u00a0 It can take months to years to get a system designed, vetted, approved and deployed to manage extensive data redundancy on disk, accommodate successful disaster recovery, yet support searchability for forensic security investigations, compliance, and audit.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>Data Access Delays.\u00a0<\/strong>Even with a well-designed platform and suitable infrastructure, log data must still be parsed, and search\/visualization tools must be engaged to view and manage the data. \u00a0Depending on the amount of data and cross-functional team dynamics, even many enterprise-grade tools can take days to deliver search results.<\/li>\n<\/ol>\n<p>Once you have an integrated, scalable platform in place, you still have to create the reports and visualizations to simplify the potentially enormous amounts of data into timely, actionable intelligence within CapEx and OpEx constraints.\u00a0 This can take months to plan, budget and build out, but the threats are active now&#8211;and you can\u2019t afford a data breach, so the need is more immediate.<\/p>\n<h1 id=\"toc-hId--270749770\">Efficient Query Logging with Infoblox Reporting &amp; Analytics in 20 Minutes<\/h1>\n<p>If this describes your situation, the Infoblox solution warrants serious consideration.\u00a0 It streamlines architecting and deploying an efficient query logging infrastructure that can be turned-up in as little as 20 minutes.<\/p>\n<p>Infoblox Reporting &amp; Analytics with Query Logging is a complete solution that solves data access, visibility challenges and more.\u00a0 Powered by a Splunk reporting and visualization engine, it includes an appliance that simply plugs into the Infoblox Grid Master to provide visibility and access to the breadth of network data from a single convenient platform.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-990\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/infoblox-reporting-analytics-query-logging.png\" alt=\"Infoblox Reporting and Analytics - Query Logging\" width=\"587\" height=\"447\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-reporting-analytics-query-logging.png 587w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-reporting-analytics-query-logging-300x228.png 300w\" sizes=\"auto, (max-width: 587px) 100vw, 587px\" \/><\/p>\n<p>It efficiently collects DNS query data and enables clustering of multiple appliances for High Availability (HA), Disaster Recovery (DR) and scalability to accommodate virtually whatever amount of data needed.<\/p>\n<h2 id=\"toc-hId--1190700552\">Better Performance through Connected Data<\/h2>\n<p>Part of the Infoblox solution is a free component called the Infoblox Data Connector VM.\u00a0 It\u2019s a cool utility running on a virtual appliance that reduces bandwidth and DDI performance impacts when dealing with large, highly-active grids, syslog data, and DNS query and response logging.\u00a0 It works by collecting DNS query and response data, offloading resource-impacting DNS\/DHCP processing and applying user-defined filtering to reduce data quantity.\u00a0 It then formats and sends the data for report generation, ingestion by the Infoblox ActiveTrust cloud or to third-party Splunk Indexers using an SCP protocol via HTTP requests.\u00a0 It\u2019s the central point of network data collection that improves performance by reducing the impact of data exchange across the network.\u00a0 Further, it runs on VMware ESXi servers and is easily installed and registered on the Infoblox Grid (running NIOS 7.3 and later) in a matter of minutes.<\/p>\n<h2 id=\"toc-hId--303196871\">Converting Raw Data to Actionable Insights<\/h2>\n<p>Accessing raw network data is one thing, seeing it is another, but it takes planning, data selection, organization, formatting, and distribution to make it truly actionable\u2014and this takes time.\u00a0 Fortunately, Infoblox offers over 120 engineered, pre-built and customizable reports available through a single, unified console dashboard, so teams can get instant access to data without the time, expense and hassle of spinning-up a DIY project. \u00a0Infoblox documents many of these reports in a\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-datasheet-infoblox-reporting-and-analytics-sample-report.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Sample Report Guide<\/a>\u00a0which includes dashboards, audit logs, device, DNS, DHCP, ecosystem, internal, Global Server Load Balancing (GSLB), security, system\/appliance reports and other categories.\u00a0 Further, since Infoblox uses the Splunk reporting and visualization engine, users with Splunk programming ability can customize any of the pre-built reports to better meet their needs.\u00a0 Reports are integrated with the Microsoft server environment for even greater visibility.\u00a0 Run individual ad-hoc reports or automate regular distribution across teams.\u00a0 Further, there is a Reporting Experts Community Forum that shares newly developed reports, enables participants to exchange information, resolves problems and discusses best practices.<\/p>\n<p>Infoblox\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/reporting-analytics\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Reporting &amp; Analytic<\/a>s with\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-solution-note-infoblox-reporting-analytics-query-logging.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Query Logging<\/a>\u00a0provides uncompromised visibility now across the network, instant access to current data, enables customized views, streamlines and automates operations, saves time and money, and delivers fast actionable insights enabling you to be a better manager of the network and resources in your care.<\/p>\n<h1 id=\"toc-hId--1903206023\">To Learn More:<\/h1>\n<ul>\n<li>Join the Infoblox Reporting &amp; Analytics Technical Demo Series to continue the discussion in the free webinar on 6\/19, 2018, 10A PDT, 1P EDT, 6P BST.\u00a0<a href=\"https:\/\/infoblox.zoom.us\/meeting\/register\/a4f2cc50de136b83dc2040ba88984b7b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Register<\/a><\/li>\n<li>As an existing Infoblox DDI customer, you can deploy a virtual Infoblox Reporting &amp; Analytics appliance free of charge \u2014 no strings attached.\u00a0<a href=\"https:\/\/info.infoblox.com\/WW_FY17_OS_FR_ReportingAnalyticsFreeTierDownload?utm_source=blox-community&#038;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download<\/a>\u00a0and try the Reporting &amp; Analytics Free Tier today.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Need for DNS Query Logs DNS is a known threat vector for malware DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0 In fact, malware command and control (C&amp;C) is the number one threat vector for crimeware (Verizon Data Breach Investigations Report, 2016).\u00a0 Further, 91% of malware uses DNS to [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[64],"class_list":{"0":"post-989","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-reporting-and-analytics","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why You Need Reporting &amp; Analytics with Query Logging<\/title>\n<meta name=\"description\" content=\"DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why You Need Reporting &amp; Analytics with Query Logging\" \/>\n<meta property=\"og:description\" content=\"DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-30T15:45:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-482461333-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2061\" \/>\n\t<meta property=\"og:image:height\" content=\"1457\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Why You Need Reporting &#038; Analytics with Query Logging\",\"datePublished\":\"2018-05-30T15:45:29+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/\"},\"wordCount\":1217,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-482461333-1.jpg\",\"keywords\":[\"Reporting and Analytics\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/\",\"name\":\"Why You Need Reporting & Analytics with Query Logging\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-482461333-1.jpg\",\"datePublished\":\"2018-05-30T15:45:29+00:00\",\"dateModified\":\"2020-05-06T17:27:05+00:00\",\"description\":\"DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-482461333-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-482461333-1.jpg\",\"width\":2061,\"height\":1457,\"caption\":\"Projecting The Future\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-you-need-reporting-amp-analytics-with-query-logging\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why You Need Reporting &#038; Analytics with Query Logging\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why You Need Reporting & Analytics with Query Logging","description":"DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/","og_locale":"en_US","og_type":"article","og_title":"Why You Need Reporting & Analytics with Query Logging","og_description":"DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0","og_url":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/","og_site_name":"Infoblox Blog","article_published_time":"2018-05-30T15:45:29+00:00","article_modified_time":"2020-05-06T17:27:05+00:00","og_image":[{"width":2061,"height":1457,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-482461333-1.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Why You Need Reporting &#038; Analytics with Query Logging","datePublished":"2018-05-30T15:45:29+00:00","dateModified":"2020-05-06T17:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/"},"wordCount":1217,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-482461333-1.jpg","keywords":["Reporting and Analytics"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/","url":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/","name":"Why You Need Reporting & Analytics with Query Logging","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-482461333-1.jpg","datePublished":"2018-05-30T15:45:29+00:00","dateModified":"2020-05-06T17:27:05+00:00","description":"DNS is a known critical exploit path for malware, ransomware and data exfiltration.\u00a0","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-482461333-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-482461333-1.jpg","width":2061,"height":1457,"caption":"Projecting The Future"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-you-need-reporting-amp-analytics-with-query-logging\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Why You Need Reporting &#038; Analytics with Query Logging"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=989"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/989\/revisions"}],"predecessor-version":[{"id":3995,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/989\/revisions\/3995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/921"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}