Hello All,
We have noticed in our SIEM that we are receiving an insane amount of DNS logs from our Fortigates for some specific domains.
These are:
update.microsoft.com swscan.apple.com softwareupdate.vmware.com play.google.com autoupdate.opera.com auth.gfx.ms
I know that these are some default domains in the firewall - I believe that they may be defaulted as SSL decryption ignore. (but not 100% positive)
My real question is how to have the Fortigates stop sending SIEM millions of these events every day and why are these domains specifically doing it? Is something misconfigured??
Thanks!
Got this same issue and found this old question.
softwareupdate.vmware.com and auth.gfx.ms where the one my DNS server noticed. I'm not using the default SSL deep-inspection profile, but I'm also not able to remove it (FortiGate-30D). I noticed the TTL is very short (20 seconds) on this two domains.
# diagnose test application dnsproxy 6
worker idx: 0
vfid=0 name=auth.gfx.ms ver=IPv4 timer running, min_ttl=20:4, cache_ttl=0 , slot=-1, num=1
95.101.59.100 (ttl=20:10:10)
vfid=0 name=softwareupdate.vmware.com ver=IPv4 timer running, min_ttl=9:4, cache_ttl=0 , slot=-1, num=1
2.17.220.33 (ttl=9:9:9)
## filtered
this link might help;
https://kb.fortinet.com/kb/documentLink.do?externalID=FD32406
...so that would mean by overriding the TTL with a larger value one would effectively disable the round-robin algorithm (to one change per hour).
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.