- Introduction
- Deployment
- Configuration
- OS Support
- Integration
- 42. Amazon Web Services (AWS)
- 43. Apache HTTP Server
- 44. Apache Tomcat
- 45. APC Automatic Transfer Switch
- 46. Apple macOS kernel
- 47. ArcSight Common Event Format (CEF)
- 48. Box
- 49. Brocade Switches
- 50. Browser History Logs
- 51. Check Point
- 52. Cisco ACS
- 53. Cisco ASA
- 54. Cisco FireSIGHT
- 55. Cisco IPS
- 56. Cloud Instance Metadata
- 57. Common Event Expression (CEE)
- 58. Dell EqualLogic
- 59. Dell iDRAC
- 60. Dell PowerVault MD Series
- 61. Devo
- 62. DHCP logs
- 63. DNS Monitoring
- 64. Docker
- 65. Elasticsearch and Kibana
- 66. F5 BIG-IP
- 67. File Integrity Monitoring
- 68. FreeRADIUS
- 69. Graylog
- 70. HP ProCurve
- 71. IBM QRadar SIEM
- 72. Industrial Control Systems
- 73. Linux Audit System
- 74. Linux system logs
- 75. Log Event Extended Format (LEEF)
- 76. McAfee Enterprise Security Manager (ESM)
- 77. McAfee ePolicy Orchestrator
- 78. Microsoft Active Directory Domain Controller
- 79. Microsoft Azure
- 80. Microsoft Azure Event Hubs
- 81. Microsoft Azure Sentinel
- 82. Microsoft Exchange
- 83. Microsoft IIS
- 84. Microsoft SharePoint
- 85. Microsoft SQL Server
- 86. Microsoft System Center Endpoint Protection
- 87. Microsoft System Center Configuration Manager
- 88. Microsoft System Center Operations Manager
- 89. MongoDB
- 90. Nagios Log Server
- 91. Nessus Vulnerability Scanner
- 92. NetApp
- 93. .NET application logs
- 94. Nginx
- 95. Okta
- 96. Osquery
- 97. Postfix
- 98. Promise
- 99. Rapid7 InsightIDR SIEM
- 100. RSA NetWitness
- 101. SafeNet KeySecure
- 102. Salesforce
- 103. Snare
- 104. Snort
- 105. Solarwinds Loggly
- 106. Splunk
- 107. Sumo Logic
- 108. Symantec Endpoint Protection
- 109. Synology DiskStation
- 110. Syslog
- 111. Sysmon
- 112. Ubiquiti UniFi
- 113. VMware vCenter
- 114. Windows AppLocker
- 115. Windows Command Line Auditing
- 116. Windows Event Log
- 117. Windows Firewall
- 118. Windows Group Policy
- 119. Windows Management Instrumentation (WMI)
- 120. Windows PowerShell
- 121. Microsoft Windows Update
- 122. Windows USB auditing
- 123. Zeek (formerly Bro) Network Security Monitor
- Troubleshooting
- Enterprise Edition Reference Manual
- NXLog Manager
- NXLog Add-Ons
63.1. DNS logging and monitoring
DNS traffic analysis is commonly used to:
-
discover unknown devices that appear on the network;
-
monitor critical devices that have not issued a query within a predefined time window;
-
detect malware from young/esoteric domain lookups or consistent lookup failures; and
-
analyze host, subnet, or user behavioral patterns.
Tip
|
DNS traffic can quickly become overwhelming. To save resources, consider discarding any fields that will not be required for analysis. |
According to RFC 7626 there are no specific privacy laws for DNS data collection, in any country. However, it is not clear if data protection directive 95/46/EC of the European Union includes DNS traffic collection.
DNS logs are available from a number of sources. DNS queries and responses are commonly sent and received in the form of packets over UDP. These packets and the ability to passively capture them is basically the same across all operating systems.
Another common source is the DNS Server itself as it receives queries from clients, processes them and returns the results. Although the DNS protocol is a common standard, the logging facilities implemented in each DNS Server can vary greatly across different operating systems. Bind 9 generates flat log files while Windows DNS Server employs Event Tracing for Windows (ETW) for managing its DNS events.
DNS audit logging vs DNS analytical logging
Although Windows DNS Server has two event tracing channels named Audit and Analytical, the advantage gained from classifying DNS events into these two categories, and treating them separately, is by no means proprietary and can be applied to other DNS Server environments.
A DNS Server is basically a highly specialized database server, yet it still retains the same low-level CRUD (Create, Read, Update, Delete) functionality of any other database. Analytical logging is focused primarily on client queries, the read operations, while DNS Audit Logging is focused on the remaining CRUD operations: creating, updating, and deleting DNS zone information. These are the most important operations to monitor from a security perspective since unauthorized access to them can lead to interruption of network services, data loss, and outages of other infrastructure services.
The goal of DNS audit logging is to maintain an audit trail of any changes to the DNS Server’s configuration, mainly for security purposes, while providing timely notification and easy access to any high severity events. By logging changes to any of the more than 40 DNS resource record (RR) types in zone files, security analysts will have the forensic information they need, should DNS records be maliciously or accidentally modified.
The realm of DNS analytical logging is completely different. The volume of data collected can be huge and the events being analyzed are typically not time- sensitive. The bulk of these DNS queries can be useful for producing metrics on user and application network traffic to various internal and external sites and services.
In the following two sections, the methods used to collect audit and analytical log data may differ greatly, but the goal of managing them separately remains the same.