Azure AD DNS Filtering: What is it and What are the Benefits?Azure AD DNS filtering is the practice of applying DNS-based web filtering policies based on Azure Active Directory (AD) user identities and groups. By integrating DNS filtering with Azure AD, organizations can control which websites users can access regardless of device or location using the same identity and access structure already in place. DNS filtering works by blocking or allowing domains at the DNS resolution stage. When a domain is on a blocklist, users cannot reach it; when a domain is on an allowlist, access is permitted. This prevents users from navigating to malicious or inappropriate sites, such as phishing pages or malware-infected domains. Azure DNS filtering extends this protection to Azure-hosted services, creating controlled and safe access zones in cloud environments. A DNS filtering solution, especially one that can selectively adapt to zero-hour threats, provides major benefits to protect your organization from web-borne cyber-attacks: Dynamically Block Inappropriate or Malicious Website AccessMalware-infected websites are used as bait to attract users and infect any devices connecting to the malicious domain IP address. Other sites may contain inappropriate material. Users are encouraged to open such sites using social engineering techniques. If a user navigates to a malicious site, malicious code takes advantage of vulnerabilities in poorly patched or configured browsers, infecting the device with malware. It can be difficult for traditional antivirus or antispam solutions to prevent the impact of these sites as new variants pop up that are designed to evade detection by traditional security measures. One of the latest tactics is to use Azure apps as a vector for malware infection/credential theft. Hackers use realistic-looking, but malicious, Azure apps to encourage users to navigate to an attacker-controlled website to execute the full attack. The use of a DNS filter stops attacks such as this by cutting off the route to the malicious website. By using a DNS filter based on Azure AD membership, an enterprise can quickly and dynamically map an active directory user or role to stop access to established and new malicious websites. Block Phishing WebsitesIn 2025, 3.4 billion phishing emails were sent every day across the globe. These attacks often lead users to visit a phishing website. Once the user enters that malicious site, login credentials, data, and/or access to corporate resources are at risk. AI-driven smart technology will ensure that even zero-hour threats are mitigated. Stops Ransomware Infection and Data TheftRansomware is the malware of the moment. Ransomware is no longer about encrypting data and extorting money for a decryption key. Now, according to IBM X-Force, 59% of ransomware incidents also include data exfiltration, the stolen data then being used to put pressure on organizations to pay up. However, even if a ransom is paid there is no guarantee stolen data will not be sold on and used for fraud. Ransomware, often, infects a company through phishing emails and infected websites. The Verizon Data Breach Investigation Report (DBIR) says that in 85% of data breaches a human being is involved, usually by navigating to an infected website or clicking a link in a phishing email. Azure DNS filtering prevents Azure AD members from becoming part of the 85% of humans that help ransomware infections to propagate. Protect DevicesRemote and homeworking have meant that personal devices are being used for work tasks. However, personal devices are much harder to protect as policies are more difficult to apply and manage remotely. By using an Azure AD DNS filter that uses device-based agents that are remotely managed, even personal devices can be protected from malicious software infections. Simple to Setup and UseFinally, any DNS filter needs to be easy to set up and must be configurable remotely for a cloud-based/remote workforce. Cloud environments are continuously changing, adding new apps and new endpoints, that require appropriate policies for different environments. DNS filters need to be easy to set up, configure, and modify. API-based content filters allow for remote configuration and monitoring. Mapping Azure AD to website access provides an easy way to create security policies on a per user/per role basis. By applying the powerful control of Azure AD integrated DNS filtering to web access, an organization can improve its security posture and reduce web-related risk. A DNS filter offers an organization a way to improve the safe web browsing of its workforce, preventing data and credential theft, ransomware, and other cyber-attacks as well as inappropriate web use. What is a DNS? And Where Does Microsoft Azure Fit?A DNS (Domain Name System) underpins the internet by mapping a human-readable domain name to a machine-readable IP address (IP stands for Internet Protocol), e.g., https://wtc1.webtitancloud.com:8443 maps to IP address: 52.32.39.15 When a user types a web address into a browser, a ‘DNS resolver’ matches this domain to an IP address using DNS servers. In other words, the DNS system resolves the address and maps it to the IP address. This IP address is used to make the connection between the device and the IP address before loading the content. Things like a remote worker's mobile device also have an IP address. The billions of objects, people, and websites are all dependent on a functioning DNS to deliver content and data. A DNS is highly distributed and does not rely on a single server. The domains in Azure are hosted on a global network of DNS name servers that are managed by the Azure cloud infrastructure. The whole system is configured to optimize speed and high availability for a given domain. Azure administrators use Azure DNS for services including website hosting, applications, APIs, and cloud service hosting, and DNS Zone management. What is Azure DNS filtering?Azure DNS filtering is the application of DNS-based web filtering controls within Azure environments to protect users and resources from accessing malicious or unauthorized domains. It works by blocking or allowing domain requests at the DNS resolution stage. When a domain is placed on a blocklist, users cannot reach it; when it’s on an allowlist, access is permitted. This form of filtering helps prevent common internet-based threats such as phishing and malware by stopping connections before they are established. Azure DNS filtering can be applied to Azure-hosted services and virtual machines to create secure access zones and can also extend to specific devices, such as Chromebooks, through tailored filtering policies. Azure Active Directory (AD) Based DNS filteringAzure AD is a directory used to apply role-based access control. Azure DNS filtering uses policies that span an entire organization, applying and monitoring them based on AD group membership. WebTitan, for example, is deeply integrated with Azure AD, using an Azure AD Enterprise App to scan any Azure sign-in to find new users. These users are then paired with the IP of any Virtual Machine used to sign in, and security and access policies are applied as appropriate. |
WebTitan Azure AD DNS Filtering: What is it and What are the Benefits?
What it is:
Azure AD DNS filtering is a security approach that uses Azure Active Directory identities, users and groups to apply DNS-based web filtering policies across an organization. By integrating DNS filtering with Azure AD, access control is tied directly to user identity rather than just network location or device.
Using solutions like WebTitan Cloud, Azure AD DNS filtering works by synchronizing Azure AD users and groups through the WebTitan Azure AD Enterprise App built into the DNS Proxy. This app continuously scans Azure AD sign-ins, identifies new or active users, and pairs them with the IP address of the virtual machine they signed into. This allows WebTitan Cloud to apply the correct filtering policies to each user, whether the organization uses on-prem AD, Azure AD, or a hybrid setup.
DNS filtering itself prevents users from reaching malicious, risky, or unauthorized websites by blocking domains at the DNS resolution stage. Blocklists prevent access to harmful sites, while allowlists ensure safe sites remain accessible.
Benefits of Azure AD DNS Filtering
- Identity-based policy control: Policies follow the user, not the device or network, allowing consistent filtering across cloud environments, remote workers, and Azure-hosted services.
- Stronger protection against cyber threats: DNS filtering blocks access to phishing sites, malware domains, and other harmful internet destinations before connections are ever established.
- Zero-hour threat detection: AI-driven solutions like WebTitan use machine learning to detect and block newly emerging threats that haven’t yet been added to traditional blocklists.
- Centralized, automated management: Integration with Azure AD allows organizations to automatically apply and update DNS filtering policies based on AD group membership, no manual mapping required.
- Supports modern infrastructures: Works seamlessly with on-prem AD, Azure AD, and hybrid environments, making it suitable for organizations transitioning to cloud-based identity management.
- Remote and scalable: Policies can be managed and deployed across distributed teams and cloud resources without on-prem hardware.
Did You Know?
businesses experienced a DNS attack
malware & spyware domains categorised a day
predefined categories by default
of websites tested by Google for malware were infected
Azure DNS Filtering with WebTitan FAQs
The WebTitan AzureAD Enterprise App is a core component of the WebTitan DNS Proxy that integrates Azure Active Directory with WebTitan Cloud. Its primary function is to synchronize Azure AD users and groups with the DNS Proxy to enable identity-based web filtering policies.
The app continuously scans Azure AD sign-ins to detect new or active users and matches each user to the IP address of the virtual machine they signed into. This mapping allows WebTitan Cloud to apply the correct filtering policies to individual users based on their Azure AD identity and group membership.
Previously, user activity appeared only as IP addresses or generic identifiers from sources like WADA. With the new approach, the system identifies and displays actual devices instead. It discovers devices in Azure and shows their hostnames (machine names) and associated IP addresses. This provides clearer visibility into which specific devices are generating DNS activity and makes policy application more accurate and easier to manage.
For WebTitan customers, to install the AzureAD Enterprise app follow the below steps:
Download the app installer here.
Log into Azure on the device and run app installer.
Follow this guide.
Finally, configure the DNS Proxies as per usual.
The initial sync may take a few minutes, depending on the number of users in Azure AD. Larger directories take longer for example, syncing around 300 users typically takes about four minutes. After this first sync is complete, subsequent syncs load almost instantly.
How long does it take to sync users in the AzureAD Enterprise App?
The first-time sync may take a short amount of time to sync. However, once this first sync has been completed, it will load instantly. The larger the number of users, the longer it will take for the first sync. For example, 300 users could take 4 minutes.
Geraldine Hunt
- DNS FILTERING
- WEB FILTERING
- CONTENT FILTERING
Talk to our Team today