
Virtually every page (or page element) that’s accessed via the Internet is first looked up in the Domain Name System (DNS). This means that those DNS lookups represent a unique opportunity whereby companies can keep users from inadvertently “hurting” themselves. Summarizing this in bullet point format:
This is the fundamental concept behind protective DNS services: Use DNS services to shield users from many known dangerous sites. Some people refer to this as “protective DNS” or using a “DNS firewall.”
At its most basic, protective DNS services may refuse to resolve a known-dangerous domain name, reporting that the bad domain doesn’t exist (returning “NXDOMAIN” to user queries). Other times, sites may attempt to take advantage of a potential “teachable moment,” redirecting the user from a dangerous site to a safe alternative web site that explains that they’ve just been protected from accidentally getting infected with malware (or from visiting a phishing site). Either way, the outcome is the same, and good – a user HASN’T had their system infected (or their information stolen by a cyber attacker)!
Those who may be open to “rolling their own” protective DNS cybersecurity solution can use DNS RPZ as a critical “building block” for a protective DNS project. See https://dnsrpz.info/ or check out https://datatracker.ietf.org/doc/html/draft-vixie-dnsop-dns-rpz-00 (an expired draft by Paul Vixie and Vernon Schryver).
Some might consider combining the DNS RPZ protocol with DomainTools Hotlist). Another potential source of protection is NOD/NAD/NOH. Both might serve as a pretty good data foundation for a basic protective DNS system.
Commercial cybersecurity companies also produce a variety of ready-to-use protective DNS services, either “on-premises” or “in-the-cloud.” A representative assortment of these companies includes:
Other protective DNS services are available solely to government agencies and similar specifically-approved users, such as:
Protective DNS services are NOT focused on attempting to block network access to “user-WANTED” content. Some user-WANTED content might be business INappropriate, but protective DNS is NOT about trying to censor that sort of “consensual” access.
Protective DNS is about “keeping you from accidentally stumbling into a minefield,” not keeping you from watching a hockey game during your lunch hour (or going shopping during your break). This difference is important – EVERYONE wants to avoid “stepping on a mine” (or the online equivalent thereof). Attempting to prevent users from going somewhere they WANT to go, well, that can be quite hard. As John Gilmore once said, “The Net interprets censorship as damage and routes around it.”
Before relying on a protective DNS service, be sure you understand some of the limitations to this approach:

Unfortunately, threat detection is a statistical matter, and minimizing false negatives normally tends to increase false positives (and vice versa) – you can’t simultaneously minimize both.
You now know the value of domain name service as a potential control point for dangerous online content: it is truly one of the few places where users can be protected from online badness at scale and with comparative ease. At the same time, you now also understand what protective DNS (and isn’t) – it’s not “nannyware,” and normally requires users to welcome (rather than attempt to avoid) the protection provided. You now also know that operators of recursive resolvers can tell a LOT about what you’re doing online, so it is critical that you trust the privacy policy of the DNS service you’re using.
We hope this article provides a good overview of what protective DNS is and is not, examples of how to implement a protective DNS service for your users, and an overview of some potential challenges to keep in mind.
If you have any questions about this article or would like to know more about the DomainTools Hotlist, please don’t hesitate to contact us: