Description
This article discusses using the best security method to protect the network environment against C&C (Command and Control) Attacks.
Scope
FortiGate.
Solution
- The recommended solution is to use a proxy-based policy.
- Proxy mode inspection provides the most thorough inspection of traffic, making it ideal for preventing data leaks and malicious content from entering or exiting the network.
- By buffering traffic for inspection and applying various security filters like virus filters, DLP filters, Web Filters, and email filters in proxy mode, security measures can be enhanced effectively.
- On the other end, Explicit proxy and Transparent proxy are also viable options, however, they may not offer the same level of thorough inspection and security as a proxy-based policy.
- Explicit proxy allows for more control over web traffic and user authentication, while transparent proxy provides anonymity but may not be as effective in detecting and preventing C&C attacks compared to proxy-based policies.
Related documents:
Technical Tip: Explicit proxy vs. transparent proxy vs. NGFW proxy-mode
Proxy mode inspection
Inspection mode feature comparison