[WEBINAR] Building a DNSFilter Policy: What You Should Be Blocking
Register now
Help Center
Login
Contact us
1 (877) 331-2412
Search
Search
Product
Features
Intuitive Reporting
Malicious Domain Protection
Domain Categorization
Integrations
See All Features
Use Cases
Protective DNS
Content Filtering
Public Wi-Fi
Cyber Defense
See All Use Cases
Industries Served
Enterprise
Higher Education
MSPs
Manufacturing
See All Industries
Compare
Cisco Umbrella
Cloudflare
Infoblox
Webtitan
Compare All
Pricing
Resources
Blog
Case Studies
dnsUNFILTERED
Events
Glossary
Newsroom
Press
Webinars
Whitepapers
View All Resources
Why DNSFilter
Careers
Awards
About
Team
Partners
Register a Deal
Value Added Resellers
Managed Service Providers
Partner Portal
Help Center
Login
Contact us
1 (877) 331-2412
Product
Features
Intuitive Reporting
Malicious Domain Protection
Domain Categorization
Integrations
See All Features
Use Cases
Protective DNS
Content Filtering
Public Wi-Fi
Cyber Defense
See All Use Cases
Industries Served
Enterprise
Higher Education
MSPs
Manufacturing
See All Industries
Compare
Cisco Umbrella
Cloudflare
Infoblox
Webtitan
Compare All
Pricing
Resources
Blog
Case Studies
dnsUNFILTERED
Events
Glossary
Newsroom
Press
Webinars
Whitepapers
View All Resources
Why DNSFilter
Careers
Awards
About
Team
Partners
Register a Deal
Value Added Resellers
Managed Service Providers
Partner Portal
Glossary
> Command and Control Attack
Table of Contents
Command and Control Attack
See
C2 server
.
Other Glossary Entries
Anycast
Brute force attacks
C2 Server
Cache Poisoning
CIS Controls
Cloud Access Security Broker (CASB)
CNAME
Cross-site Scripting (XSS)
Data Loss Prevention (DLP)
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
DNS
DNS Filtering
DNS Poisoning
DNS Tunneling
DNSSEC
DoH
Domain Generation Algorithms (DGA)
Domain Host Configuration Protocol (DHCP)
DoT
Endpoint Detection & Response (EDR)
Endpoint Protection
Fileless Malware
Geoblocking
HIPAA
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
ISO 27001
Keylogger
Least Privilege
Malware
Man-in-the-Middle
Network Address Translation (NAT)
NIST
PDNS
Phishing
Roaming Clients
Secure Access Service Edge (SASE)
Secure Web Gateway (SWG)
SOC 2
Transport Layer Protocol (TCP)
User Datagram Protocol (UDP)
Zero Trust Network Access (ZTNA)
Zero-Day