The more information you have about your network, the better you can manage and protect it. Most admins don’t know just how much valuable information is buried in their network, especially when it comes to their Domain Name System (DNS) infrastructure.
Modern recursive name servers can keep a record of every response they see: every time there’s an answer, a referral, or an error, it’s logged. This passive DNS data, is turns out, is a gold mine. Name servers mediate virtually every non-trivial transaction that occurs across a network, after all – including malicious transactions. By aggregating and analyzing passive DNS data, network admins can expand their capabilities to detect suspicious activity, trade name infringement, and much more.
In a one-hour webinar at 10 am Pacific (1 pm Eastern) on Tuesday March 1st at 10:00 a.m. PST, Getting Active with Passive DNS, Joe St. Sauver, a scientist at Farsight Security, and I will talk about how networks collect and replicate passive DNS data, and how you can analyze it to find relevant security information. You’ll also learn how you can dig deeper into your data by setting up passive DNS collection on your own name servers or by subscribing to feeds of suspicious or malicious domain names and IP addresses.
To register, click here.