Securedns Categoryget
Endpoints Summary
GET
/securedns_categoryget/
Swagger ↗
The SecureDNS Category API provides
access to DNS transaction categorization data, allowing youfunctionality to retrievethecategoryclassificationinformationof specificfor SecureDNStransactions.transactions using their unique identifiers. This endpoint is essential forsecurity monitoring, content filtering analysis, andunderstanding thenatureclassification of DNSrequestssecurityprocessedeventsthroughandthecanSecureDNSbeservice.integrated into security monitoring workflows, reporting systems, and compliance auditing processes.
Base URL: https://control.zequenze.com/api/v1
Authentication: All endpoints require a Bearer token:
Authorization: Bearer <your-api-token>
Overview
The SecureDNS Category API enables youdevelopers to query andthe retrievecategorization categoryof informationSecureDNS transactions by providing a UUID-based lookup mechanism. This API is particularly valuable for security operations teams who need to understand the nature and classification of DNS transactionssecurity events that have been processed through the SecureDNS filtering system. Each DNS transaction is assigned a unique UUID when processed, and this API allows you to look up the category classification associated with that transaction.
Key Features:
-
Transaction Classification: Retrieve detailed category
namesinformation for specific SecureDNS transactions SupportforUUID-based Lookups: Use unique transactionlookups
Common UseIntegration Cases:Scenarios:
- Security
incident investigationInformation andforensics
The category information returned by this API helps classifyorganizations understand the typetypes of content or service associated with DNS requests,security events they're experiencing, enabling better understandingthreat of network traffic patternsintelligence and potentialmore informed security threats.decisions.
Endpoints
GET /securedns_categoryget/
Description: Retrieves the category nameclassification associated withfor a specific SecureDNS transaction identified byusing its UUID. This endpoint is crucialessential for understanding what type of content or service was being accessed in a particular DNS request, making it invaluable for security analysis,event complianceoccurred, reporting,enabling security teams to properly categorize, respond to, and trafficreport classification.on DNS-related security incidents.
Use Cases:
InvestigateSIEMsuspicioussystems automatically categorizing DNSactivitysecurity alerts for proper incident handling
Full URL Example:
https://control.zequenze.com/api/v1/securedns_categoryget/?uuid=550e8400-e29b-41d4-a716-446655440000
Parameters:
| Parameter | Type | In | Required | Description |
|---|---|---|---|---|
| uuid | string | query | Yes | The unique identifier of the SecureDNS transaction to |
cURL Example:
curl -X GET "https://control.zequenze.com/api/v1/securedns_categoryget/?uuid=550e8400-e29b-41d4-a716-446655440000" \
-H "Authorization: Bearer YOUR_API_TOKEN" \
-H "Content-Type: application/json"
Example Response:
[
{
"category": "Social Networking"
}
]
Additional Example Responses:
[
{
"category": "Malware"
}
]
[
{
"category": "Business and Economy"malware"
}
]
Response Codes:
| Status | Description |
|---|---|
| 200 | Category request Ok - |
| 401 | Category request not authorized - Invalid or missing |
| 403 | Category request forbidden / not allowed - Valid |
| 404 | Provided UUID don't match any transaction - The specified UUID |
Common Use Cases
Use Case 1: SIEM Integration for DNS Security Incident InvestigationMonitoring
Security operations centers integrate this API into their SIEM platforms to automatically categorize DNS security events. When investigating a potential security incident, security analysts can useSecureDNS transaction UUIDsis fromflagged, DNSthe logsSIEM system uses the transaction UUID to quicklyretrieve determinethe whatcategory, categoriesenabling ofautomated contentrule-based were being accessed. This helps prioritize investigationsresponses and understandproper theincident scope of potential threats.classification.
Use Case 2: DNSIncident PolicyResponse OptimizationInvestigation
NetworkDuring administratorssecurity incident investigations, analysts use this endpoint to quickly understand the nature of DNS-related security events. By querying transaction UUIDs from security logs, investigators can analyzerapidly thecategorize categoriesthreats ofand blockeddetermine orappropriate allowedresponse DNS requests to fine-tune their filtering policies, ensuring legitimate business traffic flows while maintaining security controls.procedures.
Use Case 3: Compliance Reporting and Auditing
Organizations canuse this API to generate compliance reports bythat categorizingcategorize DNS trafficsecurity toevents. The category information helps demonstrate adherencesecurity tomonitoring acceptable use policieseffectiveness and regulatoryprovides requirementsdetailed classifications required for internetvarious accessregulatory monitoring.frameworks.
Use Case 4: Automated Threat Response Workflows
Security orchestrationautomation platforms can integrate this APIendpoint to automaticallycreate categorizedynamic response workflows. Different DNS transactionssecurity andcategories trigger appropriatedifferent responseautomated workflowsresponses, basedfrom onsimple thelogging categoryfor (e.g.,low-risk categories to immediate blocking and alerting for malwarehigh-risk categories).classifications.
Use Case 5: NetworkSecurity TrafficDashboard AnalysisVisualization
ITSecurity dashboards use this API to display real-time categorized DNS threat intelligence, helping security teams canvisualize analyzethe types and distribution of DNS transaction patterns over time by categorizing requests, helping identify unusual activity patterns or potential security risksevents inacross networktheir usage.organization.
Best Practices
-
UUID Validation: Always validate UUID format before making API calls to avoid unnecessary 404
errorsresponses and reduce API usage -
Error Handling: Implement
robustcomprehensive error handling for all response codes, especially 404 responses when UUIDs don'texist