BlueCat Threat Protection leverages data from reputable third-party sources to provide protection against malicious domains and sites that employ malware, botnets, exploits, and spam. Conventional tools and software focus on securing the end device or the communication layer.
BlueCat Threat Protection leverages the pervasiveness of DNS to provide another layer of protection by controlling or preventing access to known malicious sites. BlueCat Threat Protection uses DNS Response Policies to allow administrators to define hosts and zones that they wish to block. You can configure BlueCat Threat Protection manually by defining local DNS Response Policies and/or BlueCat Security Feed which provides automatic updates to receive threat data in real time.
Threat Protection Reports
For information on generating Threat Protection reports, refer to article 6613 on BlueCat Customer Care.
Threat Protection Limitations
You can only deploy response policy zones that use BlueCat Threat Protection feeds to DNS/DHCP Servers that have 8GB of RAM or greater.