{"id":7735,"date":"2025-06-12T14:31:11","date_gmt":"2025-06-12T19:31:11","guid":{"rendered":"https:\/\/www.dnsfilter.com\/blog\/smarter-dns-policies"},"modified":"2025-06-12T14:31:11","modified_gmt":"2025-06-12T19:31:11","slug":"smarter-dns-policies-what-you-should-be-blocking-but-probably-arent","status":"publish","type":"post","link":"https:\/\/ddi.mohflo.net\/index.php\/2025\/06\/12\/smarter-dns-policies-what-you-should-be-blocking-but-probably-arent\/","title":{"rendered":"Smarter DNS Policies: What You Should Be Blocking (But Probably Aren\u2019t)"},"content":{"rendered":"<div><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/ddi.mohflo.net\/wp-content\/uploads\/2025\/06\/smarter-dns-policies-what-you-should-be-blocking-but-probably-arent.png?w=640&#038;ssl=1\" class=\"ff-og-image-inserted\"><\/div>\n<p>DNS filtering is a foundational layer of defense and helps to fortify the strongest security stacks. Most organizations use DNSFilter to block the obvious: <a href=\"https:\/\/www.dnsfilter.com\/glossary\/malware\"><span>malware<\/span><\/a>, <a href=\"https:\/\/www.dnsfilter.com\/glossary\/phishing\"><span>phishing<\/span><\/a>, and adult content. That\u2019s a great start, but many are missing out on the broader potential of DNS policies.<\/p>\n<p><!--more--><\/p>\n<p>Let\u2019s explore some of the underutilized content categories you <em>should<\/em> be blocking and how to customize policies for the most granular control.<\/p>\n<h2>DNS Policies: The Core of the Network Protection<\/h2>\n<p>DNSFilter policies are rule sets that determine which <a href=\"https:\/\/www.dnsfilter.com\/use-case\/content-filtering\"><span>web content categories<\/span><\/a> are allowed or blocked for users on your network. They&#8217;re a critical tool for shaping Internet access in a way that supports security, productivity, and compliance.<\/p>\n<p>While most admins configure the basics\u2014blocking security threats and NSFW content\u2014there are other categories that deserve your attention.<\/p>\n<h2>The Top 4 Underblocked Content Categories<\/h2>\n<p><strong>1. Parked Sites &amp; Domains<\/strong><\/p>\n<p>The Parked Sites &amp; Domains category is only blocked in 24% of policies. These domains may no longer be controlled by the original owner and are often taken over by malicious third parties to host threats.<\/p>\n<p><strong>2. Contentious &amp; Misinformation<\/strong><\/p>\n<p>The Contentious &amp; Misinformation content category only appears in 21% of DNSFilter policies. This category is defined as sites that are contentious, often causing argument or controversy, characterized by strong opposing arguments, as well as sites that spread or aid in the spreading of misinformation. This category can have negative impact on productivity, as well as company culture.<\/p>\n<p><strong>3. Suspicious &amp; Deceptive<\/strong><\/p>\n<p>Only 17% of policies include the Suspicious &amp; Deceptive category. This category is for risky websites suspected of association with scams, risky software and\/or unwanted activity. These include, but are not limited to, host abuse, URL shorteners, suspicious trackers, suspected typosquatting, potentially unwanted applications, disreputable businesses, and fast scam stores.<\/p>\n<p><strong>4. Newly Observed Domains<\/strong><\/p>\n<p>Only 12% of policies include Newly Observed Domains. These are characterized as domains observed in DNS traffic for the first time within the last 30 days, which have a higher likelihood of potentially malicious or unwanted activity. Blocking the Newly Observed Domains category provides an enhanced level of threat protection. Find more on new domains in our <a href=\"https:\/\/explore.dnsfilter.com\/q1-security-report\"><span>Q1 Security Report.<\/span><\/a><\/p>\n<p>While there are plenty of content categories that don\u2019t need to be blocked on most networks, the lesser-known categories above are likely to harbor threats.<\/p>\n<p>When you go beyond blocking the basic threat categories, you set your organization up to improve productivity and stop some of the more novel, unique threats before they even get a chance.&nbsp;<\/p>\n<p>And when different levels of access are needed, you can lift the restrictions based on location, user, or device.<\/p>\n<h2>DNS Policy Hierarchy<\/h2>\n<p>Tailoring your DNS policies based on location, device, or user allows more granular control over Internet access and improves both security and user experience.<\/p>\n<p>When building your <a href=\"https:\/\/www.dnsfilter.com\/use-case\/dns-filtering\"><span>DNS filtering policies<\/span><\/a>, it\u2019s important to consider:&nbsp;<\/p>\n<ol>\n<li aria-level=\"1\"><em>Who<\/em> needs access to <em>what<\/em>?<\/li>\n<li aria-level=\"1\">Which devices are being used?<\/li>\n<li aria-level=\"1\">Where will the users be accessing the devices?<\/li>\n<\/ol>\n<h3>Breaking It Down: The Coffee Shop<\/h3>\n<p>Let\u2019s pretend you are setting up new DNSFilter policies for your coffee shop. There will be different levels of access needed based on device, but also based on user.&nbsp;<\/p>\n<h4>Safety Blanket: Your Network Policy<\/h4>\n<p>To ensure that your entire network is covered, it\u2019s a good idea to start off with a blanket policy that protects all devices on your network. This would typically be where you would toggle on all of the threat categories and any other categories that are in line with the security guidelines for your organization.<\/p>\n<p>Securing your network with a blanket policy via <a href=\"https:\/\/help.dnsfilter.com\/hc\/en-us\/articles\/4516775372051-DNSFilter-deployment-options\" rel=\"noopener\" target=\"_blank\"><span>network forwarding<\/span><\/a> is a great way to protect your network even when you don\u2019t control the devices accessing it (like with your guest Wi-Fi).<\/p>\n<p>We\u2019ll talk about this in a bit, but keep in mind that you can override the categories blocked on your network later on with a more specific user-based policy.<\/p>\n<h4>Securing Individual Devices<\/h4>\n<p>Point-of-sale (POS) devices only need basic Internet access\u2014your baristas don\u2019t need to be scrolling their Instagram feed while taking orders, they just need to be able to send orders in and accept payments. These devices would require a <a href=\"https:\/\/www.dnsfilter.com\/features\/roaming-clients\"><span>Roaming Client<\/span><\/a> with a very locked down Block list for the highest level of security.<\/p>\n<p>However, your back office may have a PC that is used for placing inventory orders, managing payroll, and creating schedules. This device would need slightly looser restrictions in place to ensure that users can actually do their jobs.<\/p>\n<h4>Separate Policies for Users<\/h4>\n<p>As far as users, different access will be required for a barista than for the store manager. Additionally, the owner of the store may need a higher level of access than the marketing manager.<\/p>\n<p>Users can have DNSFilter policies applied individually, or grouped within collections.This may look like the coffee shop\u2019s social media marketer having access to social networking content while baristas are grouped into a collection with the highest restrictions. <a href=\"https:\/\/help.dnsfilter.com\/hc\/en-us\/articles\/1500008111141-Manage-User-Collections-settings\" rel=\"noopener\" target=\"_blank\">Read more on collections in our Help Center<\/a>.<\/p>\n<h3>How Are Policies Enforced?<\/h3>\n<p>User-based policies are the highest priority and will override a device-based or network-based policy. Additionally, Allow lists will override Block lists.&nbsp;<\/p>\n<p>Utilizing Allow lists on user or collection policies will ensure that you can lock down a broader policy across your network without impeding access for those who need it.<\/p>\n<p>This structure ensures that your most targeted policies always have the final say and gives you precise control.<\/p>\n<h2>The Balance of User Experience &amp; Security Posture<\/h2>\n<p>DNS filtering policies are an intelligent, adaptable layer of your cybersecurity stack. By revisiting your policies, exploring lesser-known content categories, and using hierarchy strategically, you can dramatically improve your network\u2019s security posture without frustrating end users.<\/p>\n<p>The DNSFilter team recently presented a webinar on this topic and covered some of the most-blocked categories, additional content categories you should be blocking, and walked through creating new policies for scenarios similar to those above.&nbsp;<\/p>\n<p>Watch<span> <\/span><span><a href=\"https:\/\/explore.dnsfilter.com\/policy-guidance-webinar\" rel=\"noopener\" target=\"_blank\"><strong><span>Building a DNSFilter Policy: What You Should Be Blocking<\/span><\/strong><\/a><\/span><strong> <\/strong>on-demand now.<\/p>\n<p><a href=\"https:\/\/www.dnsfilter.com\/blog\/smarter-dns-policies\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS filtering is a foundational layer of defense and helps<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[30,222],"tags":[38,230],"class_list":["post-7735","post","type-post","status-publish","format-standard","hentry","category-dns","category-featured","tag-dns","tag-featured"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","chromenews-featured":"","chromenews-large":"","chromenews-medium":""},"author_info":{"display_name":"DNSFilter","author_link":"https:\/\/ddi.mohflo.net\/index.php\/author\/dnsfilter\/"},"category_info":"<a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/dns\/\" rel=\"category tag\">DNS<\/a> <a href=\"https:\/\/ddi.mohflo.net\/index.php\/category\/featured\/\" rel=\"category tag\">Featured<\/a>","tag_info":"Featured","comment_count":"0","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/7735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/comments?post=7735"}],"version-history":[{"count":0,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/posts\/7735\/revisions"}],"wp:attachment":[{"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/media?parent=7735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/categories?post=7735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ddi.mohflo.net\/index.php\/wp-json\/wp\/v2\/tags?post=7735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}