Skip to content

Get-B1DNSEvent

SYNOPSIS

Queries the BloxOne Threat Defense DNS Events

SYNTAX

Get-B1DNSEvent [[-Query] <String>] [[-IP] <String>] [[-Response] <String[]>] [[-Network] <String[]>]
 [[-Policy] <String[]>] [[-ThreatLevel] <String[]>] [[-ThreatClass] <String[]>] [[-FeedName] <String[]>]
 [[-FeedType] <String[]>] [[-AppCategory] <String[]>] [[-ThreatProperty] <String[]>]
 [[-ThreatIndicator] <String[]>] [[-PolicyAction] <String[]>] [[-AppName] <String[]>] [[-DNSView] <String[]>]
 [[-Start] <DateTime>] [[-End] <DateTime>] [[-Fields] <String[]>] [[-Limit] <Int32>] [[-Offset] <Int32>]
 [<CommonParameters>]

DESCRIPTION

This function is used to query the BloxOne Threat Defense DNS Events. This is the log which contains all security policy hits.

EXAMPLES

EXAMPLE 1

Get-B1DNSEvent -Start (Get-Date).AddDays(-7)

PARAMETERS

-Query

Use this parameter to filter the DNS Events by hostname or FQDN

Type: String
Parameter Sets: (All)
Aliases:

Required: False
Position: 1
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-IP

Use the IP parameter to filter the DNS Events by the IP of the source making the query

Type: String
Parameter Sets: (All)
Aliases:

Required: False
Position: 2
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Response

Use this parameter to filter the DNS Log by the response, i.e "NXDOMAIN"

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 3
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Network

Filter the DNS Events by one or more DFP Servers, External Networks & BloxOne Endpoints (i.e "mybloxoneddihost.mydomain.corp (DFP)" or "mybloxoneddihost1.mydomain.corp (DFP)","mybloxoneddihost2.mydomain.corp (DFP)","BloxOne Endpoint"

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 4
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Policy

Used to filter the DNS Events by Policy Name

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 5
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-ThreatLevel

Used to filter the DNS Events by Threat Level

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 6
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-ThreatClass

Used to filter the DNS Events by Threat Class

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 7
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-FeedName

Used to filter the DNS Events by Feed Name

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 8
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-FeedType

Used to filter the DNS Events by Feed Type

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 9
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-AppCategory

Used to filter the DNS Events by App Category

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 10
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-ThreatProperty

Used to filter the DNS Events by Threat Property

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 11
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-ThreatIndicator

Used to filter the DNS Events by Threat Indicator

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 12
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-PolicyAction

Used to filter the DNS Events by Policy Action

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 13
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-AppName

Used to filter the DNS Events by App Name

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 14
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-DNSView

Used to filter the DNS Events by DNS View

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 15
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Start

A date parameter used as the starting date/time of the log seatrch. By default, the search will start from 24hrs ago and returns the latest results first. You may need to increase the -Limit parameter or reduce the -End date/time to view earlier events.

Type: DateTime
Parameter Sets: (All)
Aliases:

Required: False
Position: 16
Default value: $(Get-Date).AddDays(-1)
Accept pipeline input: False
Accept wildcard characters: False

-End

A date parameter used as the end date/time of the log search.

Type: DateTime
Parameter Sets: (All)
Aliases:

Required: False
Position: 17
Default value: $(Get-Date)
Accept pipeline input: False
Accept wildcard characters: False

-Fields

Specify a list of fields to return. The default is to return all fields.

Type: String[]
Parameter Sets: (All)
Aliases:

Required: False
Position: 18
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Limit

Use this parameter to limit the quantity of results. The default number of results is 100.

Type: Int32
Parameter Sets: (All)
Aliases:

Required: False
Position: 19
Default value: 100
Accept pipeline input: False
Accept wildcard characters: False

-Offset

Use this parameter to offset the results by the value entered for the purpose of pagination

Type: Int32
Parameter Sets: (All)
Aliases:

Required: False
Position: 20
Default value: 0
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

NOTES