Manage Domain Overrides
Focus
Focus
Advanced DNS Security Powered by Precision AI®

Manage Domain Overrides

Table of Contents

Manage Domain Overrides

Where Can I Use This?What Do I Need?
  • Strata Cloud Manager
  • Advanced DNS Resolver License
You can specify a list of domains that the Advanced DNS Resolver can bypass (allow), or, in the case of EDL definitions, apply a user-specifiable action.
  1. Log in to the Strata Cloud Manager on the hub.
  2. Select ManageConfigurationADNS ResolverDNS Security Profiles and then select an existing DNS Security profile or create a new one (if you are creating a new DNS Security profile for the Advanced DNS Resolver, be sure to review the requirements and other related configuration tasks).
  3. In the Overrides tab, add domains to an allow list. If your organization uses third party threat feeds as part of a comprehensive threat intelligence solution, you can also reference those in the form of external dynamic lists (EDLs) as part of your overrides configuration.
    Add Allowed FQDNs:
    1. From the Allowed FQDNs panel, Add or Delete to modify the domain list entries as necessary.
    2. A valid domain override can be a domain, FQDN, or wildcard. For guidelines on using wildcards, refer to Guidelines for URL Category Exceptions.
    3. You can add multiple entries by opening additional fields using + Add.
    Add EDL Definitions:
    1. From the EDL Definitions panel, + Add or delete entries (using the icon) to modify the EDL list entries as necessary. If none have been previously created, you can Create new External Dynamic List by selecting the bottom-most option under the EDL definition drop down. For details on the options related to creating an EDL, refer to: Manage External Dynamic List.
    2. Select an Action for each EDL list entry.
      • allow—The DNS query is allowed.
      • alert—The DNS query generates an alert. DNS queries that generate an alert are saved in the DNS Security log.
      • block—The DNS query is blocked.
      • sinkhole—Forges a DNS response for a DNS query targeting a detected malicious domain. This directs the resolution of the malicious domain name to a specific IP address (referred to as the Sinkhole IP), which is embedded as the response.
    3. You can add multiple entries by opening additional fields using + Add.
    4. Click Save when finished.