BlueCat Threat Protectionleverages data from reputable third-party sources to provide protection against malicious domains and sites that employ malware, botnets, exploits, and spam. Conventional tools and software focus on securing the end device or the communication layer.
BlueCat Threat Protection leverages the pervasiveness of DNS to provide another layer of protection by controlling or preventing access to known malicious sites. BlueCat Threat Protection uses DNS Response Policies to allow administrators to define hosts and zones that they wish to block. BlueCat Threat Protection can be configured by manually defining local DNS Response Policies and/orBlueCat Security Feed which provides automatic updates to receive threat data in real time.
Threat Protection Reports
For information on generating Threat Protection reports, refer to article 6613 on BlueCat Customer Care.
Threat Protection Limitations
You can only deploy response policy zones that use BlueCat Threat Protection feeds to DNS/DHCP Servers that have 8GB of RAM or greater.