Professional Documents
Culture Documents
PfBlockerNGConfigurationGuide-StepByStep_1714660961696
PfBlockerNGConfigurationGuide-StepByStep_1714660961696
0987
Instructions
You can follow these simple steps to configure your pfBlockerNG to filter malicious URLs and protect
the internal network, computers and users from getting infected by malware and ransomware.
3) Choose Available packages then scroll down to pfBlockerNG and clock Save.
Enable pfBlockerNG
De-Duplication
CIDR Aggregation
Suppression
Global Logging (optional)
You may also need to adjust Interface/Rules Configuration depending on your set up.
6) Choose DNSBL from the pfBlockerNG menu. Check Enable DNSBL. And under IP Firewall Rule
Setting select Deny Outbound. Click Save.
9) Under DNSBL Source enter your URL for the Plain Text – Aggressive block list provided by
Malware Patrol. The address can be found by logging in to your account with Malware Patrol. Enter a
label, MP-Aggressive for example and click +Add.
10) Repeat step 9 for the Plain Text – Aggressive block list for Ransomware (optional).
11) Set List Action to Unbound and Update Frequency to Every hour (for Malware Patrol Premium
members only). Click Save.
13) Choose Update from the pfBlockerNG menu. Select the Select Force optionand mark Update,
then click Run.
Our special thanks to F34RInc for helping put together this how-to.
Connect With Us
Follow @malwarepatrol
Blog Posts
APT (4)
Archive (55)
DDoS (10)
Malware (79)
Phishing (53)
Ransomware (56)
Vulnerability (33)
Social Media
Tweets by MalwarePatrol
Home
Threat Intelligence
Blog
Contact
© 2005-2024 Malware Patrol / SP Cyber LLC. All rights reserved. I Terms of Use