Share this
How to Block Unwanted Websites On The Company Network
by Serena Raymond on Mar 11, 2021 12:00:00 AM
How to block unwanted websites
DNS security with content filtering is the best way to block unwanted websites on the company network. Unfortunately, it's all too easy to trick people into clicking links they shouldn't. That means, even if someone is cybesecurity aware or careful about what they click on, they can still find themselves on an unsavory or malicious site.
When you use a DNS security solution like DNSFilter, you’re able to:
- Control what site categories users can access
- Apply block and allow lists
- Block entire threat categories such as phishing, malware, and botnet threats
- Look at DNS queries on your network to see if any unwanted sites are slipping through the cracks
Block lists vs. categories
It’s possible that you have a set list of websites that you know you want to block. You might even already have that list. It’s easy to upload that list to DNSFilter’s Block List tab under the filtering policy you create.

But blocking categories is much simpler. Categories are buckets that domains fall into. A domain can be labeled as more than one category. For instance, Facebook is categorized as both “Social Networking” and “Business.” DNSFilter has nearly 40 categories to choose from and 7 threat categories. Blocking website categories allows you to apply blanket policies to your end users. But you can also pair blocking certain categories with either block or allow lists. So if you want to block Social Networking but still allow LinkedIn access, you can do that.

The easiest way to get started with content filtering is to deploy the DNSFilter Roaming Client. The Roaming Client enables you to block (and allow) websites on an individual device as opposed to deploying across a network. Using the Roaming Client only a few minutes to get set up.
Here’s what you need to do:
- Sign up for a DNSFilter account
- Set up your site (Hint: This is your business’ location)
- Create your first policy under the “Policies” tab
- Install the Roaming Client by navigating to Roaming Clients → Install
- Apply your policy
Choosing the right deployment method
But Roaming Clients aren’t right for everyone. If you’re working in a traditional office, or provide public WiFi, you need to ensure that anyone who connects to your network is protected from deceptive sites. And you can’t install the Roaming Client on a stranger’s device!
But what you can do is deploy DNSFilter via your company network or via our Relay.
If you just want to apply content filtering to your office’s internet with as few frills as possible, the network deployment will work best for you.
Our Relay is a virtual appliance that will give you greater visibility into your network DNS traffic. A normal network deployment will show you the queries being made on your network, but it won’t be able to tell you which device is sending which query. The Roaming Client allows you to do that because of the way it’s implemented, but the Relay also allows you that visibility.
If you need to handle local domains, you’ll find our Relay useful. You can configure the Relay to recognize queries for local domains and forward those queries to your internal DNS resolver while sending all other queries to DNSFilter.
But...why should you block websites?
There are plenty of reasons why you might want to block employees from certain sites. You might be worried about time wasters—the internet has plenty of those. We’re constantly online, and more employees are working out of web applications than ever before. Unfortunately, a byproduct of spending more time online for work means there are more distractions than ever before. Blocking site categories such as social media, gambling, and gaming can give employers peace of mind that their employees are spending time actually working.
Maybe you’re concerned with threat protection. So many sites seem legitimate but turn out to be phishing or malware sites that can turn into an IT headache—not to mention a costly data breach. It is getting harder and harder to tell a real site from a fake one.

For the record, none of those logins are real. They are all completely fake.
Hackers use tactics such as typosquatting, where they claim domains close to the one they’re impersonating. For instance, if they’re creating a fake Chase login page they might register chhase[dot]com and set up a fake login. It’s the same reason a lot of brands will register domains that include brand typos in the name. It’s to keep hackers at bay and protect their brand.
Blocking known malicious sites (and having the ability to scan sites in real-time) is one of the best ways to mitigate risk.
Finally, we find a lot of people want to block unwanted websites because they want to achieve NIST compliance or CIPA compliance. Some companies may have their own internal compliance regulations for HR or other purposes that lead them to seeking out ways to block content online.
Ready to start blocking unwanted websites? Get your free trial.
Share this
Categories
- Featured (176)
- Cybersecurity & IT (32)
- DNS (27)
- Cyber Threats (16)
- DNSFilter Updates (13)
- IndyCar (9)
- Product & Features (9)
- IT (8)
- Protective DNS (7)
- Content Filtering (6)
- DNSFilter Community (6)
- IT Challenges (4)
- Public Wi-Fi (4)
- AI (3)
- Deep Dive (3)
- MSP (3)
- Staying Ahead of Cyber Threats (3)
- Machine Learning (2)
- Malware (2)
- Phishing (2)
- Team (2)
- Compare (1)
- Cybersecurity Brief (1)
- Events (1)
- Ransomware (1)
- Tech (1)

The Old-School Operations Role: Backbone or Bottleneck?
In the early days of IT, the operations team was the unsung hero—the silent, and often siloed, force that kept everything running. They were responsible for the infrastructure: Servers, databases, and networks that powered the business. They managed deployments, monitored systems, and ensured uptime. If it was working, no one noticed them. If it wasn't? Well, then the questions started: "Wha...

When Vintage Goes Viral (In All the Wrong Ways)
Remember that time you found your old Tamagotchi and thought, "Hey, this could be fun again"? Well, cybercriminals are having a similar nostalgic moment, but instead of resurrecting digital pets, they're breathing new life into outdated malware and long-forgotten data breaches. Welcome to the world of recycled cyber threats, where everything old is terrifyingly new again.

The Growing Threat of Malicious Domains in Cybersecurity
As cybercriminals continue to evolve their tactics, domain-based attacks like cybersquatting, typosquatting, and other malicious domains have become a significant threat to businesses and individuals alike. These attacks are designed to exploit trust, impersonate brands, and mislead users into handing over sensitive information—often resulting in financial losses, data breaches, and reputat...