What DNSFilter is and where it sits
A five-minute mental model of DNSFilter as a closed protective DNS resolver that decides allow or block before any TCP connection opens.
DNSFilter is a cloud-delivered, AI-driven DNS resolver that filters every DNS query against threat feeds and your account’s policy before answering. The block decision happens at the resolver, not in the browser, not at the firewall, so the user’s machine never opens a TCP connection to a flagged domain.
The DNS path, one diagram
sequenceDiagram
autonumber
participant U as User device
participant R as DNSFilter anycast resolver
participant P as Policy engine
participant S as Site / threat feeds
U->>R: DNS query for site.example
R->>P: lookup matching Site, Policy, Allow/Block lists
R->>S: check threat feeds + categories
alt Allowed
R-->>U: real IP answer
else Blocked
R-->>U: block-page IP (or NXDOMAIN)
end
DNSFilter publishes anycast IPs that you point your network’s DNS at, or that the Roaming Client uses on a single device:
| Use | IPv4 addresses | Notes |
|---|---|---|
| Standard DNS queries (incl. DNS-over-TLS) | 103.247.36.36, 103.247.37.37 | UDP/TCP 53, UDP/TCP 5353, TCP 853 (DoT), TCP 443 (DoH) |
| DNS queries with DNSSEC validation | 103.247.36.9, 103.247.37.9 | UDP/TCP 53, UDP/TCP 5353 |
| IPv6 standard DNS queries | 2402:5c40:5c40::3636, 2402:5c40:5c41::3737 | Same port set as the IPv4 standard pair |
Anycast means the same IP is announced from many points of presence, so a roaming user automatically reaches the closest one without any reconfiguration.
DNSFilter is a closed resolver: it only answers for networks and devices it recognises. If a Site or Roaming Client isn’t registered against your organisation, the resolver won’t respond. There is no public 8.8.8.8-style fallback.
What DNSFilter blocks
A Filtering Policy controls two kinds of decisions:
- Threats: Malware, Phishing, Botnets, Cryptomining, plus circumvention tools like TOR, anonymisers, and many VPNs/proxies.
- Content categories: Adult Content, P2P & Illegal, Social Networking, Drugs, Terrorism & Hate, and many more.
Both are evaluated for every query, alongside the organisation’s Allow and Block lists.
A worked ticket: Able Moose Accounting
Sarah at Able Moose Accounting (15-person bookkeeping firm, one office, one tenant) opens a ticket: “I tried to open a quoted estimate from a supplier and got a ‘blocked by your administrator’ page.”
Confirm it's DNSFilter
The block page is hosted by DNSFilter and shows the customer’s organisation name. That tells you the block came from the DNS layer, not from the browser, the firewall, or the M365 tenant.
Find the query in the dashboard
Open the DNS Query Log, filter by Sarah’s Site or device, and locate the query for the supplier domain. The log shows what category or threat feed flagged it.
Decide if it's a real positive
If the verdict is Phishing or Malware, the user stays blocked and you investigate. If it’s Newly Registered Domain or a category like Cloud Storage that the customer needs, you’ll move on to an allowlist entry (covered in lesson 4).
What this is NOT
- Not a web filter. DNSFilter sees domain names, not URLs. It can’t block one path on a site while allowing another.
https://example.com/badthingandhttps://example.com/safethinglook identical to it. - Not a replacement for endpoint protection. A user who downloads malware via a domain DNSFilter doesn’t recognise as malicious is still a malware incident. DNSFilter raises the floor; it doesn’t lower the ceiling on what else you need.