06-18-2019 05:26 AM
Hi!
Our organization has both Cisco Umbrella and Amp For Endpoints.
Let´s say we are getting blocked cause of malware, phishing etc.
Is there any nice way to find out which process that blocked the dns request?
I´m able to search in Cisco CTR which other devices that has been communicating with that blocked domain or IP.
But there is no way to find out which process/application did the request?
Best regards
Johan
Solved! Go to Solution.
07-01-2019 06:40 AM
If you used the AnyConnect Network Visibility Module and a Netflow analysis tool (like Stealthwatch or Splunk) you could get that visibility.
https://www.youtube.com/watch?v=Z31TQJL1nec
06-28-2019 01:20 AM
Hi Johan,
That's not possible since DNS request doesn't contain any data about process/application generated it, so Umbrella simply doesn't have visibility on that.
08-14-2019 06:14 AM
Shouldn't it be rather easy to get AMP for endpoints to flag any processes that tries to connect to any of the blockpages that Umbrella shows.
For example if Umbrella blocks a malware classified page, it sends an DNS response back with 146.112.61.107 (opendns/umbrella malware block page). When the process tries to connect to this IP it should be flagged in AMP for Endpoints. This would provide some very useful visibility that doesn't exist in that product today.
I hope you understand what I mean.
07-01-2019 06:40 AM
If you used the AnyConnect Network Visibility Module and a Netflow analysis tool (like Stealthwatch or Splunk) you could get that visibility.
https://www.youtube.com/watch?v=Z31TQJL1nec
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide