Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

DNS Summary

by Stephanie Dunn
April 21, 2016

DNS Summary Screenshot

The Domain Name System (DNS) service is a critical component used by virtually every type of network, application, and service today. Managing DNS servers can also be challenging, as any misconfiguration on DNS servers can leave an organization’s network vulnerable to attack. The DNS Summary report presents an overall summary of DNS-related events and activity.

Reliable network connectivity is an essential part of business operations. Without DNS services, connecting to hosts both internally and externally would be impossible. DNS provides an inherent trust between clients and servers that allows organizations to quickly identify internal hosts and connect to external websites. However, this trust relationship can also be exploited, allowing attackers to compromise DNS servers and redirect clients to spoofed or malicious websites. Any disruption or compromise of DNS servers can severely impact an organization’s ability to conduct business. By continuously monitoring DNS services, organizations will be able to detect threats before critical services are impacted.

Using this report, analysts will be able to quickly identify and remediate misconfigurations within existing DNS servers. Several elements provide the latest information on existing DNS vulnerabilities and compliance issues that can present serious risks for the organization. Systems are scanned using Nessus and the Passive Vulnerability Scanner (PVS), which can alert security teams to possible DNS cache poisoning, DNS amplification attacks, denial of services attacks, and other DNS vulnerabilities that could be exploited by an attacker. The Log Correlation Engine (LCE) can detect events such as DNS queries and zone transfer requests from systems that have forwarded logs to the LCE. Additional elements will report on existing DNS server compliance, which can be useful in identifying blind spots within current DNS server configurations. Misconfigured DNS servers can cause network traffic to be improperly routed and result in network outages or downtime for an organization. Organizations can use the information provided within this report to strengthen enterprise security policies, and harden existing DNS servers on the network.

This report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the SecurityCenter Feed under the category Discovery & Detection. The report requirements are:

  • SecurityCenter 5.3.1
  • Nessus 6.5.6
  • LCE 4.8.0
  • PVS 5.0.0

SecurityCenter Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. PVS provides deep packet inspection to continuously discover DNS vulnerabilities traveling the wire. LCE correlates real-time events, and has the capability to discover users, operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and other critical infrastructure. SecurityCenter CV allows for the most comprehensive and integrated view of network health.

The following chapters are included in this report:

  • Executive Summary - The Executive Summary chapter presents a summary of DNS events. Information on DNS events will alert analysts to zone transfers, client queries, and potential attacks. The Log Correlation Engine (LCE) can detect events such as DNS queries and zone transfer requests from systems that have forwarded logs to the LCE. Other activity, such as hosts attempting to access suspicious sites or DNS tunneling, may also be detected using this chapter.
  • DNS Servers - The DNS Servers chapter presents an inventory of current DNS servers on the network. This information will provide a summary of DNS servers such as Microsoft DNS, ISC BIND, and PowerDNS. The table in this chapter will report on DNS services that have been detected by Nessus and PVS. Organizations can use the information provided in this chapter to detect unauthorized systems running DNS services.
  • DNS Vulnerabilities - The DNS Vulnerabilities chapter displays a list of vulnerabilities related to DNS by count and severity. The element will report on the latest vulnerability information by severity level. Only the top 10 detections with severity levels of low, medium, high, and critical are included. Organizations should continuously monitor DNS servers, as vulnerabilities can disrupt network availability, damage systems, and leave critical assets exposed to attack.
  • DNS Compliance Checks - The DNS Compliance Summary Chapter presents information on the current DNS compliance status within the organization. Elements in this chapter can be used to determine which systems have failed DNS compliance checks or need to be manually checked. High severity represents failed audit checks, and medium severity represents checks that must be manually verified. Compliance failures presented within this chapter can provide targeted information that analysts need to identify and remediate outstanding DNS compliance issues in a timely manner. The included table can be modified to include additional or specific compliance information based on organizational needs.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training