DNS filtering provides protection from online threats such as viruses malware, ransomware. The Domain Name System makes it so that we can use the Internet by remembering names, and computers can translate these names into machine-readable IP addresses to transfer information from websites, email servers, and file servers to your web browser or email client. Passwords are hard enough to remember – imagine if we had to remember IP addresses instead of domain names. Even though the concept of DNS is simple to understand, you might have some misconceptions about DNS filtering that could affect getting it to work safely and reliably. So I’ll share with you the most common problems I’ve seen IT pros encounter while securing their DNS infrastructure throughout the years, and hopefully bust the most common myths at the same time.
Sure, but antivirus software can only detect known viruses while it’s running – and end users are notorious for turning off antivirus and the local firewall on their computers to avoid sluggish performance or install software that they “need” to do their job (or sometimes, really, to distract themselves from doing their job!). Managing this isn’t always as simple as enforcing domain policies – sometimes the culprits are in the executive suite. Bear in mind anti-virus cannot block content that isn’t infested with viruses but still isn’t appropriate for work, such as porn, gambling, politics, or social media. See where I’m going with this?
Small businesses can be (and many have been) crippled by copyright infringement suits – the business is liable for how its network is used. If an end user is serving up pirated movies from your IP address, can your business afford the fine? If an employee accidentally gets infected with a spam bot, it’s your IP address that will be blacklisted and blocked, and your email that will no longer be delivered.
Web-delivered malware can affect the entire business. If CryptoLocker or Petya or one of its ever-evolving variants destroys a shared drive containing overtime logs or customer invoices, who loses out? And there are other viruses that may be lurking undetected (Uroburos went undiscovered for years), silently stealing information or waiting to deliver a destructive payload.
Web filtering will not prevent all of these, but having multiple layers of security lowers the risk. What layers so you require?
You need web filtering, spam filtering, endpoint antivirus, sensible firewall rules, up-to-date software, regular reliable backups, and an aware workforce. Leaving a single door open makes all the rest of the locks pointless.
Nope! It starts with DNS lookup in just three steps:
Once the DNS reply is received with the IP address of the domain name server, DNS is no longer involved in the communications between your browser (or other application software) and the server.
This process then provides an opportunity for using DNS as a very basic, low-latency (fast!), and low-bandwidth filter to protect users from phishing sites, botnets, and other risky websites – and a way to prevent access to inappropriate NSFW (not suitable for work) websites. By using a DNS filter with a database of categorized websites (if the DNS server/database is quick), you can be safe in the blink of an eye. The filter protects your network by only providing lookup requests with a valid IP address for safe websites, but returns a local IP address to deliver a block page for forbidden sites.
DNS logging will show which lookups people have performed, but not which sites they actually visited, nor for how long. For that level of detail, you’ll need a fast local proxy/filter to look at all of the actual web traffic. For most small-to-medium-sized businesses, I’m not going to lie, this is overkill. For larger organizations, there are often valid reasons for including a local web filter and proxy that justify the extra expense and IT personnel overhead, though.
In most cases, simply setting the primary DNS servers as the cloud web filter in your DHCP server (usually this is all in your Internet gateway appliance for a small business – which includes the router, network switch, and a firewall) is good enough to block the majority of web-delivered malware and prevent access to any productivity-killing (Facebook) and bandwidth-gobbling sites (YouTube, Netflix).
Include DNS filtering in your security arsenal – for web filtering, it’s such an easy and straightforward option. Most routers and firewalls will allow you to block port 53 – DNS traffic. By editing your internal MX records, a single configuration change in one place (on most small networks, it’s the router), you can effectively prevent access to risky sites and protect your network.
Now for some cold, hard truths. First, technology isn’t the only part of the solution to website access. An acceptable usage policy is also required. Bet you aren’t surprised by that? People should be informed ahead of time what is and isn’t allowed, and made aware of the consequences. They aren’t only risking their own jobs, but potentially putting every other employee and the business at risk.And secondly, the speed and performance of DNS servers can vary. Slow or poor domain resolution will result in slow and less reliable web browsing. However, you can run speed tests on DNS servers to compare performance.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555Contact Us