The Policy Editor gives organizations granular, auditable control over DNS traffic and a mechanism to rapidly apply or exempt indicators from commercial threat feeds while preserving CISA’s baseline protections—improving threat mitigation for roaming endpoints. This workflow balances centralized government protections with enterprise flexibility and oversight, reducing risky resolution traffic with traceable approvals.
Protective DNS’s Policy Editor lets organizations create, manage and customize DNS filtering rules that sit at an upstream resolver for roaming and mobile devices. Policies exist at two levels—global (CISA-managed) and organizational—and can be static (rule-based) or dynamic (threat-feed driven), with CISA proprietary rules enforced globally and feed-based rules allowing organization-specific exceptions. The video walks through creating a policy (naming, source sets, actions like allow/block/log/override, expressions or CSV upload), running an impact analysis against historical logs, and the two-manager approval workflow required to activate or disable policies. Automated notifications and detailed status/approval history help inform approvers before a policy is approved and takes immediate effect.
Comments
Want to join the conversation?
Loading comments...