ConnectWise
;

What is DNS filtering?

DNS filtering is a cybersecurity technique that blocks access to malicious, inappropriate, or unauthorized websites by filtering domain name requests at the domain name system (DNS) level. When a user attempts to visit a website, the DNS filtering system checks the domain against a list of blocked or categorized domains and determines whether access should be allowed or denied before a connection to the website is ever established.

DNS filtering is often used as a first line of defense to prevent phishing, malware downloads, command-and-control callbacks, and content policy violations.

What is a DNS filtering system?

A DNS filtering system acts as an intermediary between user requests and DNS resolution. Instead of allowing all requests to proceed to the internet, it applies security policies and threat intelligence to decide which domains should be resolved and which should be blocked.

Key features of DNS filtering systems include:

  • Real-time threat blocking: Prevents access to domains associated with malware, phishing, or botnets.
  • Category-based filtering: Blocks websites based on predefined content categories such as gambling, adult content, or streaming.
  • Custom policies: Organizations can configure allowlists and blocklists to control domain access.

DNS filtering works at the DNS layer, making it a lightweight and scalable security solution that requires no deep packet inspection or full proxying.

How does DNS filtering work?

Think of DNS filtering like a GPS system that checks your route for hazards. Before guiding you to a destination (website), it checks whether the address is safe or restricted. If the domain is dangerous or against policy, access is blocked before the user reaches it.

Here’s how DNS filtering works:

1. A user types a web address or clicks a link.

2. The DNS filtering service intercepts the DNS request.

3. The domain is checked against threat intelligence and content filtering rules.

4. If the domain is allowed, the user is directed to the site. If blocked, a custom block page or alert is displayed.

Common use cases for DNS filtering

  • Blocking access to malicious websites before a connection is made.
  • Enforcing acceptable use policies in schools or workplaces.
  • Preventing data exfiltration or callbacks from infected systems.
  • Protecting remote or roaming users without needing full VPN tunnels.

Who needs DNS filtering?

DNS filtering is an essential tool for organizations of all sizes that want lightweight, scalable web security and policy control.

IT departments and enterprises

  • Protect employees from phishing and malware during daily browsing.
  • Enforce content filtering without affecting bandwidth or performance.
  • Reduce exposure to shadow IT and unauthorized cloud services.
  • Maintain uptime by blocking domains linked to drive-by downloads or exploits.

Cybersecurity teams

  • Enhance layered security with DNS-level threat prevention.
  • Provide DNS visibility to security information and event management (SIEM) and extended detection and response (XDR) tools for correlation and response.
  • Prevent connections to command-and-control servers.
  • Support incident response with logs of blocked domain requests.

Managed service providers (MSPs)

  • Deliver DNS filtering as a scalable security service for small and midsized business (SMB) clients.
  • Customize policies by industry (e.g., healthcare, finance, education).
  • Manage multiple client environments through centralized dashboards.
  • Reduce risk and liability for clients without depending solely on endpoint agents.

Small and midsized businesses (SMBs)

  • Prevent employees from accessing unsafe or non-business-related sites.
  • Reduce risk from phishing, ransomware, and credential theft.
  • Enforce internet use policies cost-effectively.
  • Help meet compliance and insurance requirements.

Benefits of DNS filtering for IT and security teams

Lightweight, network-level protection

DNS filtering blocks threats before connections are established, reducing malware infections and drive-by downloads.

  • Stop users from visiting phishing or exploit-hosting sites.
  • Prevent connections to known bad domains used in attacks.
  • Extend protection to remote users and BYOD devices.

Easy deployment and scalability

DNS filtering requires no hardware or complex installations:

  • Deploy in minutes by updating DNS settings.
  • No latency or bandwidth impact.
  • Scales across locations and devices without additional infrastructure.

Policy enforcement and productivity control

DNS filtering enables businesses to enforce internet usage policies and reduce distractions:

  • Block time-wasting or inappropriate websites.
  • Apply access controls based on role, department, and time of day.
  • Support HR and compliance policies with enforceable controls.

Integration with threat intelligence

Leading DNS filtering tools are backed by real-time threat intelligence:

  • Detect and block newly registered malicious domains.
  • Stay ahead of phishing campaigns and exploit kits.
  • Minimize false positives by refining detection criteria.

ConnectWise Tip: Threat data from the ConnectWise Cyber Research Unit™ (CRU) is continuously integrated into solutions such as ConnectWise SIEM™, enhancing DNS filtering decisions with frontline intelligence.

Enhanced visibility and reporting

Most DNS filtering platforms offer centralized dashboards and reporting that:

  • Track access to blocked or risky domains.
  • Identify high-risk users or devices.
  • Generate compliance reports and logs for audits.

DNS filtering vs. URL filtering vs. firewall

Feature

DNS filtering

URL filtering

Firewall

Layer

DNS (domain-level) Application/content (URL-specific) Network/transport (IP/port-level)

Blocking method

Based on domain resolution Based on full URL and content Based on traffic source/destination

Deployment

Network settings or DNS service Proxy, firewall, or endpoint agent Edge devices or cloud firewall

Best for

Lightweight, broad access control Granular, content-based filtering Core network access enforcement

Best practices for implementing DNS filtering

Choose a trusted DNS filtering provider

Select a provider with:

  • Global coverage and low-latency resolution.
  • Up-to-date threat intelligence feeds.
  • Role-based access control and policy templates.
  • Logging and reporting features for visibility.

Tailor filtering policies by user or role

Not every department needs the same level of restriction:

  • Grant marketing or IT broader access for research.
  • Apply stricter rules to shared or guest devices.
  • Use time-based controls to balance productivity and flexibility.

Combine with other security controls

DNS filtering is a key layer, but not a complete solution on its own:

  • Pair with endpoint protection and intrusion prevention.
  • Correlate blocked domain alerts with SIEM or XDR tools.
  • Integrate with firewalls, proxies, or secure access service edge (SASE) tools.

ConnectWise Tip: DNS filtering works seamlessly with ConnectWise SIEM and endpoint security solutions, creating a layered defense against web-based threats across networks and remote users.

Monitor, review, and adjust policies

DNS filtering should be tuned over time:

  • Review reports for blocked domains and user behavior.
  • Adjust policies to reduce false positives and improve coverage.
  • Use analytics to identify new threat trends or shadow IT usage.

FAQs

What is DNS filtering used for?

DNS filtering blocks access to dangerous, inappropriate, or policy-violating domains, improving security and helping enforce acceptable internet use.

How is DNS filtering different from URL filtering?

DNS filtering works at the domain level (e.g., example.com), while URL filtering can block specific pages or paths (e.g., example.com/phishing.html) for more granular control.

Can DNS filtering prevent phishing attacks?

Yes. DNS filtering blocks access to domains associated with phishing, stopping users from reaching malicious websites even if they click on a harmful link.