Icon

DNS Filter Overview and How-To Guide for MSPs and Clients

Learn how to navigate DNS Filter, manage clients, set up filtering policies, and troubleshoot common issues. This comprehensive guide covers the DNS Filter layout, menu options, reporting, and step-by-step instructions for allow/block lists.

By Awecomm Training

In this guide, we'll learn how to navigate and use DNS Filter for managing web filtering and security across multiple clients. We will cover how to sign in, understand the main menus, and use features like global policies, deployments, roaming clients, and reporting. You will also learn how to adjust filtering policies, add URLs to allow or block lists, and troubleshoot common issues.

Let's get started

This is the DNS Filter overview, along with some how-to instructions at the end. We will cover the overall layout of DNS Filter, how to navigate it, and how to sign in. The common menus you will use, what they do, and how to use them. To access DNS Filter, go directly to the DNS Filter URL or use the DNS Filter tile in Duo SSO.

1
Click here
Step #1: Click here

If you click on it, you will be prompted to log in with your DNS Filter credentials. I'm already logged in, so it takes me straight in. When you log in for the first time, you are placed at the MSP level. You can see this on the dropdown menu on the left side.

2
Click on "Awecomm Technol ..."
Step #2: Click on "Awecomm Technol ..."

We are in the root directory of Occom Technologies. Below that, you'll see all the clients we have set up in our tenant. Key points to note: Occom Technologies, the root MSP, is mainly used for templates when deploying to clients.

3
Click on "Qecomm Technologies"
Step #3: Click on "Qecomm Technologies"
4
Click on "Qecomm Technologies"
Step #4: Click on "Qecomm Technologies"
5
Click on "Qecomm Technologies"
Step #5: Click on "Qecomm Technologies"
6
Click here
Step #6: Click here

Now you have this submenu below it. This is the same submenu you see when you drill down into clients. Right now, all the options here apply to all clients. It's like having a global view. There are also specific details when you look into the clients, as well as different views you will encounter. We can discuss that later.

We can start with the overview. It shows statistics that apply to all clients, including allowed and blocked organizations, as well as users. These are end users signed into computers, known as roaming clients. These are the computers with the DNS Filter application installed. We'll start with global policies on the left-hand menu.

If we open this up, filtering is essentially the filtering policy that we have. This is the template we use. We copy this when setting up a new client. We'll copy this global default and use it to tailor and fine-tune for each client. I'm not going to click on this now.

Next, we can skip universal lists. We don't use that. The block page is what clients see when a website is blocked. This is the default for all clients; it's a template. If you need something specific, you can copy from this and apply it to the client.

7
Click here
Step #7: Click here

In the Deployments tab, you can see all the sites set up for each client. Some sites have IP addresses associated with them.

8
Click here
Step #8: Click here

This shows whether a network is locked down. Others, such as Ideal, are not having their IPs or networks locked down at this time.

9
Click here
Step #9: Click here

DNS Filter is applied only to roaming clients. You can also view a high-level overview of their policy name and the block page they are using. The roaming clients section displays all roaming clients installed across all users. This is the D-DNS Filter application on end-user devices. "" This is at the MSP level, so it reports for all clients.

Use this when a client or team member has a block that isn't obvious. It helps you gather more details and better understand the issue. It would be more beneficial to first visit the client site to review their reporting. We’ll discuss that further when we look at a specific client. We'll skip reporting for now.

10
Click on "✰ Deployments"
Step #10: Click on "✰ Deployments"

I will minimize this.

11
Click here
Step #11: Click here

The MSP uses this only to set up new users in DNS Filter. That's the main reason we come here. Some Occom team members might not see this MSP. We will skip that as well.

12
Click here
Step #12: Click here

Tools are useful when troubleshooting what is being applied for DNS Filter. You might use this more when deploying to a new client. You can use the debug page to see which blocks are enabled for your tenant or site.

13
Click on "x"
Step #13: Click on "x"
14
Click on "| DN"
Step #14: Click on "| DN"

Okay, that's a high-level overview of the menu.

15
Click here
Step #15: Click here

Let's take a closer look at a specific client.

16
Click on "Awecomm Technol ..."
Step #16: Click on "Awecomm Technol ..."

We'll go into Occom Technologies.

17
Click here
Step #17: Click here

At Occom Technologies, we will review the deployments.

18
Drag here
Step #18: Drag here

We can see the site we set up. Again, it's called Occom. Click the site to view the IPs being protected.

19
Click here
Step #19: Click here

If we go back, we can see what their filtering policy is called and view the block page.

20
Click on "DNS Filter"
Step #20: Click on "DNS Filter"

Clicking on the roaming clients shows all end devices with the DNS Filter installed. Users are the individuals signed into those devices. That's what you would have here. Reporting. Suppose a client or end user is experiencing a block on their computer.

You may need to run an audit if it is unclear what is being blocked. If we go into Insights, this is the main area you would use. You can see all the... You can see all the traffic and data with DNS Filter, including allowed and blocked requests, top domains, and top categories. If we switch to "blocked," which you'll likely use most often, you can see what is being blocked. You can then click on the URL to view more detailed information.

21
Click on "All"
Step #21: Click on "All"
22
Click here
Step #22: Click here

We can see the dates. This is all in real time. We can see the dates. If we scroll down, we can view the specific URL. Expanding this shows who accessed it.

23
Click here
Step #23: Click here

Wes was likely testing something here. We have more details on what was blocking and how it was blocking. You can view a specific client or look back at previous records as needed.

24
Click here
Step #24: Click here
25
Click here
Step #25: Click here
26
Click here
Step #26: Click here

If you need to view a block on a specific user, go back to Roo Insights.

27
Click on "Blocked"
Step #27: Click on "Blocked"
28
Click here
Step #28: Click here

Use this dropdown to switch to "User." Find the user who is having issues, click on them, and view everything that has been blocked for that team member.

29
Click on "Blocked"
Step #29: Click on "Blocked"
30
Click on "⚫ cryptomining.filterdn"
Step #30: Click on "⚫ cryptomining.filterdn"
31
Click here
Step #31: Click here
32
Click here
Step #32: Click here

This park.filterdns.com and .net are the block pages that appeared during my testing. That's why it's there. Um, right. So that... Lastly, the filtering policy.

We can get started now. If you need to add a URL to the allow list or block a URL, follow these steps. The two main use cases for this tool are editing the policy to add a URL to the allow list or to the block list. Go to the applied policy. Once inside, you'll see several categories or tabs at the top that define how blocking is set up.

33
Click here
Step #33: Click here
34
Click here
Step #34: Click here

Awecom has many features enabled that we are currently testing. Other clients will most likely have categories enabled by default. We might need to strengthen security later, but DNS Filter can already block additional threats.

35
Click on "Settings"
Step #35: Click on "Settings"

We have these enabled. I don't think we have any appware enabled.

36
Click on "Categories"
Step #36: Click on "Categories"

Right now, everything is off. Privacy: Safe search is enabled.

37
Click on "Threats"
Step #37: Click on "Threats"

You will see the allow list and the block list here.

38
Click on "AppAware"
Step #38: Click on "AppAware"
39
Click on "Privacy"
Step #39: Click on "Privacy"
40
Click on "AppAware"
Step #40: Click on "AppAware"

To add to the allow list, click Add to List, enter the URL, click Add, and then click Save to apply the policy.

41
Click here
Step #41: Click here
42
Drag here
Step #42: Drag here
43
Click on "snap - reports - mdr - monthly - us - east1"
Step #43: Click on "snap - reports - mdr - monthly - us - east1"

It applies almost instantly. You should follow up with the end user to confirm the issue is resolved after your actions. You can use a... Is it a DNS query? You can check which category is applied to specific URLs.

Um... Let's see. Where is that? We'll skip that for now.

44
Click on "il"
Step #44: Click on "il"
45
Click on "Filter by a specific policy"
Step #45: Click on "Filter by a specific policy"
46
Click on "Filter by a specific policy"
Step #46: Click on "Filter by a specific policy"
47
Click here
Step #47: Click here
48
Click on "Q Awecomm Technolog"
Step #48: Click on "Q Awecomm Technolog"

Remove that from the video.

49
Click on "QAwecomm Technolog"
Step #49: Click on "QAwecomm Technolog"
50
Click here
Step #50: Click here

Cut the glitter. That's an overview of DNS Filter. There is a supplemental Teams guide.

51
Drag "Certificate"
Step #51: Drag "Certificate"

You can find that in the Awecom toolbox.

52
Click here
Step #52: Click here
53
Click on "..."
Step #53: Click on "..."

Go to Documents, then open the Awecom Toolbox. Navigate to Web Filtering and select DNS Filter.

54
Click here
Step #54: Click here
55
Click here
Step #55: Click here
56
Click here
Step #56: Click here

Let's move on to Troubleshooting and How-To guides.

57
Click here
Step #57: Click here

You can see how to add items to the allow and deny lists, use the reporting tool, and get started.

58
Click here
Step #58: Click here

It explains how to navigate the menu and which tab is used for each function, providing more specific details. This is an overview of the video.

59
Click on "LLC / Documents / Awecomm ToolBox / Web Filtering / DNSFilter / Troubleshooting / How - To's"
Step #59: Click on "LLC / Documents / Awecomm ToolBox / Web Filtering / DNSFilter / Troubleshooting / How - To's"

This guide is linked to the tickets submitted by clients. This is the block page you see when you visit a blocked site. This is the information they would submit as a ticket.

60
Click here
Step #60: Click here

You can find useful information, such as which policy is blocking access and which website the user is trying to reach. This is very helpful for understanding what to do with the ticket.

61
Click here
Step #61: Click here

Otherwise, that is the training video. I hope you enjoyed it.