The botnet report enables you to use heuristic and behavior-based mechanisms to identify potential malware- or botnet-infected hosts in your network. To evaluate botnet activity and infected hosts, the firewall correlates user and network activity data in Threat, URL, and Data Filtering logs with the list of malware URLs in PAN-DB, known dynamic DNS domain providers, and domains registered within the last 30 days.
ABF, To evaluate botnet activity and infected hosts, the firewall correlates user and network activity data in Threat, URL, and Data Filtering logs with the list of malware URLs in PAN-DB, known dynamic DNS domain providers, and domains registered within the last 30 days
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
dnhan
Highly Voted 2 years, 6 months agocb4251b
Most Recent 11 months, 3 weeks agock19
1 year, 1 month agoJJ_512
1 year, 2 months agoMohamad_Seifeldine
1 year, 6 months agoluismendes21
1 year, 9 months agoLostatSea
1 year, 11 months agof143c37
1 year, 11 months ago