IncidentResponsev2

Block External Communication Methods

Task Block External Communication Methods from Compromised Systems

Conditions

Given systems identified as impacted or at risk, and access to endpoint and network controls, the operator will block all external communication capabilities to prevent command and control (C2), data exfiltration, or attacker pivoting.

Operator Note: Blocking external communications reduces adversary capabilities while containment and eradication operations are underway. This prevents data loss and stops live connections.

Standards

End State

Compromised or impacted systems are fully isolated from external communications until remediation is complete.


Notes


Manual Steps

Method 1: Host Firewall (Windows)

Block all outbound traffic except internal ranges

New-NetFirewallRule -DisplayName "Block External Outbound" -Direction Outbound -RemoteAddress 0.0.0.0/0 -Action Block
New-NetFirewallRule -DisplayName "Allow Internal Outbound" -Direction Outbound -RemoteAddress 192.168.0.0/16,10.0.0.0/8 -Action Allow

Operator Note: Adjust internal ranges as necessary.


Method 2: Host Firewall (Linux iptables)

iptables -P OUTPUT DROP
iptables -A OUTPUT -d 192.168.0.0/16 -j ACCEPT

Operator Note: Be cautious. This blocks all external outbound unless explicitly allowed.


Method 3: DNS Sinkhole or Block External DNS

Example - Windows hosts via GPO:

Computer Configuration → Administrative Templates → Network → DNS Client → DNS Servers

Method 4: Network Firewall / Router ACLs


Method 5: Remove Default Gateway (Emergency Isolation)

Windows:

Remove-NetRoute -DestinationPrefix "0.0.0.0/0"

Linux:

ip route del default

Operator Note: This will block all internet access but retains local communications.


Running Script (Windows example for rapid host blocking)

# Block all external traffic but allow internal
New-NetFirewallRule -DisplayName "Block All External" -Direction Outbound -RemoteAddress 0.0.0.0/0 -Action Block
New-NetFirewallRule -DisplayName "Allow Internal" -Direction Outbound -RemoteAddress 192.168.0.0/16,10.0.0.0/8 -Action Allow

Dependencies


Other Available Tools

Tool Platform Use Case
Windows Firewall + PowerShell Windows Rapid per-host block
Linux iptables / ufw Linux Host-level outbound blocking
Network Firewall (Palo Alto, Cisco ASA, Fortigate) Network Segment or site-wide blocking
DNS Sinkhole (Unbound, Bind, Infoblox) Network Block DNS-based outbound
VPN or NAC solutions Enterprise Restrict network access

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

Windows Defender Firewall PowerShell Cmdlets
iptables Linux Firewall Guide
DNS Sinkhole Strategies
NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS)


Revision History

Date Version Description Author
2025-05-02 1.0 Fully generated operator guide for blocking external communication via firewall, DNS, and ACLs Leo