: Enable DNS Security on Cloud NGFW for Azure
Focus
Focus

Enable DNS Security on Cloud NGFW for Azure

Table of Contents

Enable DNS Security on Cloud NGFW for Azure

Enable DNS Security on Cloud NGFW for Azure to proactively detect and defend against DNS-based threats using predictive analysis and machine learning.
Domain Name Service (DNS) is a critical and foundational internet protocol, as described in the core RFCs for the protocol. Malicious actors have utilized Command & Control (C2) communication channels over the DNS and, in some cases, have even used the protocol to exfiltrate data. DNS exfiltration can happen when a bad actor compromises an application instance in your network and then uses DNS lookup to send data out of the network to a domain they control. Malicious actors can also infiltrate malicious data/payloads to the network workloads over DNS. Over the years, Palo Alto Networks Unit 42 research has described different types of DNS abuse discovered.
Cloud NGFW for Azure allows you to protect your vNet and vWAN traffic from advanced DNS-based threats by monitoring and controlling the domains that your network resources query. With Cloud NGFW for Azure, you can deny access to the domains that Palo Alto Networks considers bad or suspicious and allow all other queries to pass through.
For this purpose, Cloud NGFW leverages the Palo Alto Networks’ Domain Name System (DNS) Security service, which proactively detects malicious domains by generating DNS signatures using advanced predictive analysis and machine learning, with data from multiple sources (such as WildFire traffic analysis, passive DNS, active web crawling & malicious web content analysis, URL sandbox analysis, Honeynet, DGA reverse engineering, telemetry data, whois, the Unit 42 research organization, and Cyber Threat Alliance). DNS security service then distributes these DNS signatures to your Cloud NGFW resources to proactively defend against malware using DNS for command-and-control (C2) and data theft.
With DNS security enabled, the Cloud NGFW takes the following actions for each DNS security category.
CategoryLog SeverityAction
Ad Tracking DomainsInformationalAllow
Command and Control (C2) DomainsHighBlock
Dynamic DNS (DDNS) DomainsInformationalAllow
Grayware DomainsLowBlock
Malware DomainsMediumBlock
Newly Registered DomainsInformationalAllow
Parked DomainsInformationalAllow
Phishing DomainsLowBlock
Proxy Avoidance and AnonymizersLowBlock
To inspect DNS traffic, you must enable DNS Proxy on your Cloud NGFW for Azure.
  1. Log in to the Azure portal.
  2. Click the Cloud NGFWs icon under Azure Services.
  3. Select your Cloud NGFW instance.
  4. Enable DNS Proxy.
    1. Select SettingsDNS Proxy.
    2. Select the Enabled radio button.
    3. Use the default DNS server or select Custom and specify a DNS server previously configured in your virtual network.
    4. Click Save.
  5. Navigate to the local rulestack associated with your Cloud NGFW instance.
  6. Select Security Services.
  7. Enable DNS Security.
    Enabling DNS Security requires that Anti-Spyware be enabled as well. Additionally, both DNS Security and Anti-Spyware must be set to Best Practices.