DNSFilter Features
Protection (6)
Quarantine
Blocks malicious website or destination, redirecting the user to a secure page
Continuous Monitoring
Monitors 24/7 to detect anomalies in functionality, user accessibility, traffic flows, and tampering.
Off-Network Protection
Supports agent-based DNS protection with individual endpoint devices on any network.
Guest Network Protection
Allows DNS filtering and protection for guest WiFi networks.
BYOD Protection
Supports bring-your-own-device (BYOD) users, supporting DNS protection across any device connected to a network or equipped with an agent.
Native DNS over HTTPS (DoH)
“DoH” is a protocol that facilitates DNS resolution via HTTPS. Native DoH functionality facilitates DNS over DoH using local agents to manage DNS requests, extending DoH beyond a single browser or network.
Functionality (3)
DNS Lookups
Associate information from various domains to identify associated parties and threats.
Threat Intelligence
Develops domain reputation by gathering contextual information related to web-based threats.
Advanced Traffic Filtering
Allows DNS routing to resolve requests across HTTP or HTTPs requests and/or covers IPv4 and IPv6 protocols.
Administration (5)
Whitelisting
The ability to green light a specific Domain or system to bypass the scanning process.
Policy Enforcement
Abilities to set DNS protection policy control standards including whitelisting, blacklisting, and application access.
Incident Reports
Produces reports detailing suspicious activity and anomalies related to networks and endpoints.
Domain Categorization
Allows administrators to group users and devices based on IP, Endpoint, or role.
Multi-Network Management
Allows centralized administration and control of DNS protection and policies across multiple networks.
Web Content and Traffic Filtering - Secure Web Gateways (5)
SSL/TLS Inspection
Decrypts and inspects encrypted web traffic to detect and block threats hidden within encrypted connections.
Content Filtering
Analyzes web content to filter out malicious code, malware, and inappropriate material.
URL Filtering
Blocks access to known malicious or unauthorized websites based on predefined policies.
Real-Time Traffic Inspection
Inspects and analyzes inbound and outbound web traffic in real-time for threats and compliance.
Ad and Tracker Blocking
Blocks ads and trackers to enhance user privacy and reduce exposure to potential threats.
Data Protection and Loss Prevention - Secure Web Gateways (4)
Data Loss Prevention (DLP)
Monitors outgoing web traffic to prevent sensitive data from being leaked or exfiltrated.
Phishing Protection
Detects and blocks phishing attempts to protect users from fraudulent websites and email links.
Malware Protection
Uses signature-based scanning, heuristic analysis, and sandboxing to detect and block malware threats.
Cloud Access Security
Monitors and controls access to cloud applications and services to prevent unauthorized use and data leakage.
Access Control and Authentication - Secure Web Gateways (3)
Application Control
Regulates access to web-based applications and services as per organizational policies.
Authentication and Access Control
Verifies users' identities and enforces access control policies to ensure only authorized users can access permitted web resources.
User and Group Policies
Supports the creation of policies based on user roles, groups, or other attributes for more granular control.
Performance and Management - Secure Web Gateways (5)
Customizable Policy Enforcement
Allows organizations to create and enforce custom web usage policies tailored to their specific needs.
Bandwidth Management
Prioritizes and allocates network resources based on predefined policies to optimize performance.
Integration Capabilities
Integrates with other security tools and systems, such as firewalls, SIEMs, and endpoint security solutions.
Reporting and Logging
Provides comprehensive reports and logs of web activity, including sites visited, user activity, security events, and policy violations.
Threat Intelligence Integration
Leverages threat intelligence feeds to stay updated on the latest threats and enhance protection.






