Advanced DNS Security Powered by Precision AI®
Bypass DNS Security Subscriptions Services
Table of Contents
Expand All
|
Collapse All
Advanced DNS Security
Bypass DNS Security Subscriptions Services
Adjust DNS Security with a fail-open timeout to maintain performance. If queries exceed
this limit, queries pass without inspection to prevent network latency and user
disruption.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
DNS Security is designed to provide real-time protection by performing cloud-based
lookups for domain signatures. However, to ensure that security inspection does not
negatively impact user experience or critical network operations, the NGFW can bypass these queries if latency or connectivity issues occur. By default, the NGFW implements a 100-millisecond timeout; if a verdict is not received
from the DNS Security cloud within this window, the DNS response is released to the
client without further analysis. This fail-open mechanism prevents network bottlenecks
and ensures that internal applications remain responsive even during transient periods
of high service latency or network congestion.
In addition to handling latency, you can configure a manual bypass of the service if
comprehensive troubleshooting or policy changes are required. This is achieved by
setting the policy action to allow, the packet capture to
disabled, and the log severity to none
(for NGFW) within the Anti-Spyware profile for specific DNS categories.
This level of control ensures that administrators can maintain operational continuity
while balancing the need for deep DNS-layer visibility. For persistent false positives,
Palo Alto Networks recommends using domain exceptions rather than a full service bypass
to maintain a high security posture for the rest of your network traffic.
In cases where false-positives occur, Palo Alto Networks recommends creating specific exceptions
instead of bypassing DNS Security queries altogether.
Bypass DNS Security Subscriptions Services (Strata Cloud Manager)
- Use the credentials associated with your Palo Alto Networks support account and log in to the Strata Cloud Manager on the hub.Go to ConfigurationNGFW and Prisma AccessSecurity ServicesDNS Security and select the relevant DNS Security profile.Configure the DNS Security signature policy settings to bypass DNS Security queries. For each DNS category, set the Action to allow and Packet Capture to disabled. In the following, the DNS Security categories have been configured to bypass DNS Security queries.
In the Overrides section, verify that there are no entries present; if necessary, delete all Domain/FQDN overrides.
Click OK to save the DNS Security profile.Bypass DNS Security Subscriptions Services (NGFW (Managed by PAN-OS or Panorama))
PAN-OS 10.0 and later supports individually configurable DNS signature sources, which enables you to define separate policy actions as well as a log severity level for a given signature source. This requires you to configure both the policy action and the log severity for each available DNS signature source to bypass DNS Security. Additionally, you must also remove the DNS exceptions entries for the DNS Security to be fully bypassed. On PAN-OS 9.1, you can simply set the policy action for Palo Alto Networks DNS Security to an action of allow.Bypass DNS Security Subscriptions Services (PAN-OS 10.0 and later)
- Log in to the NGFW.Configure the DNS Security signature policy settings to bypass DNS Security queries.
- Select ObjectsSecurity ProfilesAnti-Spyware.Select the profile containing your active DNS Security policy settings.Select the DNS Policies tab.For each DNS category, set the log severity to none, the policy action to allow, and packet capture to disable. In the following, the DNS Security categories have been configured to bypass DNS Security queries.
Select DNS Exceptions and remove all DNS Domain/FQDN Allow List entries.
Click OK to save the Anti-Spyware profile.Bypass DNS Security Subscriptions Services (PAN-OS 9.1)
- Log in to the NGFW.Configure DNS Security signature policy settings to bypass DNS Security look-ups.
- Select ObjectsSecurity ProfilesAnti-Spyware.Select the profile containing your active DNS Security policy settings.Select the DNS Signatures tab.Under Policies & Settings, set the policy action for Palo Alto Networks DNS Security to an action of allow.
Click OK to save the Anti-Spyware profile.