4 Myths about DNS Filtering
WebTitan DNS Filtering

4 Myths about DNS Filtering

DNS filtering provides protection from online threats such as viruses, malware and ransomware. The Domain Name System makes it so that we can use the Internet by remembering names, and computers can translate these names into machine-readable IP addresses to transfer information from websites, email servers, and file servers to your web browser or email client. Passwords are hard enough to remember – imagine if we had to remember IP addresses instead of domain names. Even though the concept of DNS is simple to understand, you might have some misconceptions about DNS filtering that could affect getting it to work safely and reliably. So I’ll share with you the most common problems I’ve seen IT pros encounter while securing their DNS infrastructure throughout the years, and hopefully bust the most common myths at the same time.

Myth 1: We don’t need  web filtering , we already have endpoint antivirus

Sure, but antivirus software can only detect known viruses while it’s running – and end users are notorious for turning off antivirus and the local firewall on their computers to avoid sluggish performance or install software that they “need” to do their job (or sometimes, really, to distract themselves from doing their job!). Managing this isn’t always as simple as enforcing domain policies – sometimes the culprits are in the executive suite. Bear in mind anti-virus cannot block content that isn’t infested with viruses but still isn’t appropriate for work, such as porn, gambling, politics, or social media. See where I’m going with this?

Small businesses can be (and many have been) crippled by copyright infringement suits – the business is liable for how its network is used. If an end user is serving up pirated movies from your IP address, can your business afford the fine? If an employee accidentally gets infected with a spam bot, it’s your IP address that will be blacklisted and blocked, and your email that will no longer be delivered.

Web-delivered malware can affect the entire business. If CryptoLocker or Petya or one of its ever-evolving variants destroys a shared drive containing overtime logs or customer invoices, who loses out? And there are other viruses that may be lurking undetected (Uroburos went undiscovered for years), silently stealing information or waiting to deliver a destructive payload.

Web filtering will not prevent all of these, but having multiple layers of security lowers the risk. What layers so you require?

You need web filtering, spam filtering, endpoint antivirus, sensible firewall rules, up-to-date software, regular reliable backups, and an aware workforce. Leaving a single door open makes all the rest of the locks pointless.

Myth 2:  DNS filtering  is complicated

Nope! It starts with DNS lookup in just three steps:

  1. Query: You type a web address into the browser, triggering a DNS query.
  2. Lookup: The DNS server specified in your network interface configuration (usually provided automatically by your DHCP server) receives the request and looks up the IP address relating to that domain.
  3. Response: As long as the domain name exists, the corresponding IP address is returned, and your browser then uses that IP address to communicate directly with the web server for that domain (and usually caches it for future reference).

Once the DNS reply is received with the IP address of the domain name server, DNS is no longer involved in the communications between your browser (or other application software) and the server.

This process then provides an opportunity for using DNS as a very basic, low-latency (fast!), and low-bandwidth filter to protect users from phishing sites, botnets, and other risky websites – and a way to prevent access to inappropriate NSFW (not suitable for work) websites. By using a DNS filter with a database of categorized websites (if the DNS server/database is quick), you can be safe in the blink of an eye. The filter protects your network by only providing lookup requests with a valid IP address for safe websites, but returns a local IP address to deliver a block page for forbidden sites.

DNS logging will show which lookups people have performed, but not which sites they actually visited, nor for how long. For that level of detail, you’ll need a fast local proxy/filter to look at all of the actual web traffic. For most small-to-medium-sized businesses, I’m not going to lie, this is overkill. For larger organizations, there are often valid reasons for including a local web filter and proxy that justify the extra expense and IT personnel overhead, though.

Get the truth about DNS filtering


Dryden Geary

Marketing Director @ TitanHQ Best-in-class SaaS Cybersecurity

4 年
回复

要查看或添加评论,请登录

Dryden Geary的更多文章

社区洞察

其他会员也浏览了