What DNS Needs To Be When It Grows Up: Protective
by Kory Underdown on Sep 26, 2025 3:50:44 PM
DNS—short for Domain Name System—has quietly operated behind the scenes as the backbone of how devices find one another on the Internet. But as threats evolve, DNS is no longer just the plumbing: It has to become your first line of defense. That’s the core message from our recent webinar, What DNS Needs to Be When It Grows Up.
Let’s walk through some of the key takeaways from the session: Why traditional DNS is vulnerable, how protective DNS (PDNS) elevates your security posture, and how organizations can adopt DNS-based defense in a proactive way.
A Brief Look at the Evolution of DNS
One of the key points raised by our Chief Technology Officer, TK Keanini, in the webinar was that DNS was never built with security in mind. When it was first developed in the 1980s, DNS was simply designed to be a scalable naming service—allowing users to access services by domain name instead of IP address. That’s it. No encryption or validation, just name resolution.
But over time, as the Internet grew and security threats emerged, DNS began to evolve. Here’s how that evolution has unfolded:
1. DNS as Infrastructure
Initially, DNS was treated purely as infrastructure. ISPs or internal IT teams hosted basic recursive resolvers that would pass along queries. The focus was uptime, caching efficiency, and speed—not threat detection.
2. DNSSEC and Integrity
As DNS attacks (e.g., cache poisoning, spoofing) began to rise, protocols like DNSSEC were introduced to add integrity checks. While helpful in protecting against tampering, DNSSEC didn’t stop malicious intent—it just confirmed responses came from the correct source.
3. Encryption Enters the Picture
Later came DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT), which encrypted DNS queries to improve privacy. But again, this was about secrecy, not security—you could now privately access a malicious site just as easily as a benign one. But, it’s still a malicious site that you shouldn’t be accessing.
4. DNS as a Security Control: The Rise of Protective DNS
Only recently has DNS been viewed as a control point for threat mitigation. Protective DNS (PDNS) represents a fundamental shift: We no longer treat DNS as a passive utility, but as an active security enforcement layer.
This shift is driven by three key trends:
- The volume and sophistication of threats (e.g., command-and-control, phishing kits, malware delivery)
- The dissolution of the traditional network perimeter (remote work, cloud apps, BYOD)
- The need for lightweight, scalable, everywhere-capable protection
The bottom line? DNS has grown up. Rather than merely respond to queries, DNS must now actively protect, inspect, and inform.
Why Traditional DNS is a Target
Before we dig into protective DNS, it helps to understand what’s weak about “plain” DNS:
- Lack of built‑in security controls. Standard DNS resolvers do name lookups, but they don’t filter or inspect traffic. That means if a client resolves a domain tied to malware or phishing, nothing stops them from connecting.
- Upstream trust issues. Even if you encrypt DNS requests (DoT, DoH), that only protects confidentiality of the query. It doesn’t guarantee that the resolver you use is trustworthy (or hasn’t been tampered with).
- Rapidly shifting threat domain space. Attackers spin up new domains or use Domain Generation Algorithms (DGAs), making static blocklists obsolete quickly.
- Growing dispersion and cloud erosion of the perimeter. With remote work, hybrid environments, cloud platforms, and roaming endpoints, you can’t rely on a classic perimeter firewall approach anymore.
What Protective DNS (PDNS) Adds to the Stack
Protective DNS (sometimes called DNS-layer security) is a DNS resolver that filters for security purposes. It adds intelligence, filtering, and policy enforcement to your DNS traffic. Below are the core capabilities and benefits highlighted by TK in the webinar:
1. Threat Blocking at the DNS Level
By evaluating DNS queries and responses against threat intelligence (blocklists, heuristics, ML models), PDNS can block connections to known malicious domains before any TCP/HTTP connection ever begins. Because Protective DNS happens at the earliest part of the chain, it's an extremely effective method of blocking bad content.
2. Real-Time Domain Categorization & Logging
A PDNS service continuously scans and categorizes domains (benign, suspicious, malicious). This gives you visibility into what users/devices are trying to connect to—good or bad—and enables dynamic blocking policies.
3. Granular Policy Controls & Filtering
Beyond just blocking malware/phishing, PDNS enables filtering by content categories (e.g. gambling, adult content, social media, AI/ML sites), time-based policies, group-level controls, and more. You can segment policies by user, device, site, etc.
4. Protection Against Zero-Days & New Domains
Because protective DNS leverages heuristics, ML, and anomaly detection over just static blocklists, it can catch previously unseen malicious domains (e.g. those generated via DGA or spun by attackers) before they become problematic.
5. Remote or Roaming Device Support
As users travel or work from home, PDNS ensures DNS-based protection even outside the corporate network (via agents, roaming clients, tunneling, or split DNS). The defense follows the user.
6. Compliance & Reporting
Many regulatory frameworks require monitoring, logging, or filtering of web access. PDNS gives you detailed logs and reporting needed for audits, governance, and compliance.
7. Easy Integration & Low Overhead
Because DNS is lightweight and already a network staple, PDNS is often easy to layer in—no heavy agents or big hardware changes required. It scales well and has minimal performance impact when done right.
Best Practices & Pitfalls to Avoid
From the webinar and DNSFilter’s experience, here are some lessons and recommendations:
- Start with visibility, then restrict. Enable passive logging and monitoring first to see what users or devices are doing, then tighten policies gradually.
- Use allow lists judiciously. While allow lists are powerful, overly restrictive allowlisting leads to business friction. Have exceptions and overrides.
- Combine PDNS with other security layers. PDNS isn’t a silver bullet—endpoint protection, firewalls, and behavior analytics all still play roles.
- Stay nimble. Threats evolve. Ensure your PDNS vendor updates fast and gives you control over policies.
- Train and socialize policy changes. Sudden blocking of sites can frustrate users. Communicate, get buy-in, and offer override workflows.
The Big Picture: DNS Has Grown Up
In the webinar, the central metaphor was clear: DNS can no longer act like a naive functionary. In a matured security architecture, DNS must:
- Enforce policy
- Detect threats
- Provide visibility
- Scale globally
- Protect remote / roaming devices
- Work in concert with other layers
In other words: DNS needs to grow up to be proactive, adaptive, and secure.
By deploying a mature protective DNS layer, organizations move from reactive defense (chasing threats after they manifest) to a preventative posture.
If your organization hasn’t seriously considered DNS-layer protection yet, now is the time. The infrastructure exposure is real, the threats are evolving, and PDNS is a high-ROI lever in your security architecture. Start your trial of DNSFilter now.
Why Scaling Your MSP Doesn’t Mean Hiring More Technicians
Growth should feel like progress. But for a lot of MSPs, there comes a point where growth starts to feel heavier instead. New clients are coming in, and revenue is rising, yet the day-to-day operation feels more stretched, not more efficient. The service desk is constantly busy. Senior techs keep getting pulled into escalations. The team is working harder just to maintain the same standard of delivery.The usual response is to hire more people. On...
The Hidden Cost of “Good Enough” Security in MSP Environments
“Good enough” security checks the boxes and keeps the dashboards green. It covers the basics and gets you through onboarding. But in MSP environments, “good enough” usually means nothing breaks badly enough to force action. And that’s exactly the problem.The tooling system doesn’t fail. It just becomes more expensive to run, gradually turning your service desk into a permanent cleanup crew.Over time, reactive security tools create a profitability...
SASE vs SSE: What's the Difference and Why It Matters for Your Security Stack
If you’ve spent any time researching modern network security, you’ve likely come across SASE and SSE used interchangeably, sometimes even in vendor messaging. The result is a lot of confusion around two concepts that are closely related but not identical.
