Spam Botnet on my LAN - How can I use the Sonicwall to identify the culprit?

I have a Sonicwall TZ100 configured as a network edge device, and I was just blacklisted because my Firewall IP is shown sending SPAM messages.  I have setup a rule blocking all SMTP out with the copiers and Servers as exceptions and we have not been re-listed.

The infection persists on the network, however, and I am unable to track down where it is coming from.

How can I use the Sonicwall to see which host(s) are sending email now that the rule is blocking?  I cannot figure out how to see this with the log settings, it's pretty awful.

Who is Participating?
Blue Street TechConnect With a Mentor Last KnightCommented:
Hi jkeegan123,

You can do this by looking at the logs. What version of SonicOS are you running?

You don't need wireshark you have a solid packet capture within your TZ 100 under System > Packet Monitor if you need that. If you have the logs setup correctly (mark All Categories selected and Logging Level set to Debug, click Accept to save) you should be able to see the LAN IP being blocked by the LAN > WAN Access Rule #.

Let me know if you have any other questions!
Ned RamsayNetwork Operations ManagerCommented:
If you look in the firewalls logs you should see that the "block" rule you set up is being hit a lot by a specific host.

Downloading wireshark network analyser and then filtering the protocol by SMTP may help locate the PC

Alternatively if the reporting on that device isnt great and you cant find it with wireshark then add an "allow" rule above the deny rule for a small selection of IP addresses on your network.

e.g. if you have 100 devices on your network then allow 1-25 and see if it still spams. Then 26-50 etc. That will narrow it down to one section.

Edit: On my Sonicwall (larger version), I go to Dashboard then Connection Monitor. I can filter by destination port (25 for SMTP) and it shows a list of hosts using that.
jkeegan123Author Commented:
What should I look at in the log to see the BLOCK rule?  The new Sonicwall log is broken up into sections and it's not very say the least!
Improved Protection from Phishing Attacks

WatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!

jkeegan123Author Commented:
(ALSO Wireshark is not really an option since it's TCP, not a broadcast protocol, and we do not have a managed switch to port mirror the inside firewall interface.  We just wouldn't get the SMTP traffic showing up).
Ned RamsayNetwork Operations ManagerCommented:
If you filter wireshark using: tcp.port == 25 then it will show SMTP traffic on your network (I just tested on mine with no port mirroring)
Ned RamsayNetwork Operations ManagerCommented:
Good answer by DiverseIT ^^ sorry I dont have a tz100 available to me.
Blue Street TechLast KnightCommented:
Glad I could help...thanks for the points!
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.