icon-zscaler-deployments-operations.svg
Zscaler Deployments & Operations

DNS Control Deployment and Operations Guide

This guide describes the benefits of using DNS Control and the steps necessary for configuring Zscaler Internet Access (ZIA) to add DNS Control to your security posture.

DNS Control mitigates the risk of malware transmission, identifies infected endpoints using DNS tunnels, and restricts domains visited to comply with organizational standards and acceptable use.

The Zscaler service also detects and controls DNS tunneling occurring in your networks. The service operates as a DNS proxy. You can use this proxy as a firewall for DNS traffic. The service logs all traffic that goes through this proxy.

To learn more, see About DNS Control.

Value of Deploying DNS

  • Implements DNS security.
  • Detects and controls DNS tunneling.
  • Redirects requests to your organization’s trusted public DNS resolver.
  • Improves DNS performance.
  • Gives visibility into every DNS request and response.
  • Controls DNS traffic regardless of the DNS resolver selected by the end user.
  • Protections from evasive behavior even for TLS-encrypted traffic.
  • Logs every transaction in a forensically complete and enriched format.

Deployment Phase

The deployment phase includes initially setting up and integrating Zscaler solutions into an existing network infrastructure. During the deployment phase, you configure DNS Control to meet the needs of your infrastructure. The following sections discuss steps to deploy DNS Control.

Prerequisites

DNS Control might require an additional license for your organization. Check with your Zscaler Account team to verify the necessary licensing requirements.

Deployment Steps

The following steps explain how to deploy DNS Control:

  1. Choose between the following scenarios:
  2. Modify the Firewall Filtering policies so that DNS traffic passes through the cloud firewall.
  3. Configure the DNS Control policy.
  4. (Optional) Configure DNS tunneling detection.
  5. After adding rules to the DNS Control policy, you might also need to do the following before enabling the firewall for your locations.
    1. Modify the rules for the NAT Control policy and Firewall Filtering policy to allow traffic to pass.
    2. Configure custom ports as applicable.
  6. (Optional) Define application groups.

Considerations

  • The DNS proxy model of DNS Control allows the DNS to be intercepted and resolved as soon as the request reaches the ZIA Public Service Edge. The DNS is configurable by endpoint and many other conditions in the destination NAT policy and essentially amounts to two modes:
    • Transit Option: This mode passes DNS requests through the proxy. A proxy safely hides the customer's IP address from third parties, including the external resolver (DNS security policy is still applied). Hiding the IP address is good for iterative requests that Zscaler can’t resolve, but DNS Control can secure.
    • Resolver Option: This option sees and intercepts the DNS request at the Public Service Edge and resolves the request pending DNS Control policy. This option provides all the security and performance benefits of quickly resolving DNS requests with a geographic context where users get the closest Microsoft or Amazon Web Services (AWS) point of presence.
  • Zscaler recommends using the Resolver option. You can enable traffic to reach Zscaler's Trusted DNS Resolver in two ways:

Operations Phase

This section describes common practices used to operate Zscaler solutions when integrated with your environment. You can monitor and tune DNS Control during operations to meet your infrastructure needs.

Prerequisites

For DNS Control operation, verify the following prerequisites:

  • Document the methodology for deploying DNS Control (either the Transit or Resolver option).
  • Consider destination NAT for selective queries and its performance impact.
  • Give the support team access to the DNS dashboard. This provides visibility into the most blocked domain categories and users, providing insights into incidents raised due to malicious domains getting blocked.

Common Troubleshooting Items

The following list describes common issues related to DNS Control operation:

  • Internal domains are blocked or not accessible: Check if the internal domains are part of DNS exclusions.
  • Iterative queries are not getting resolved: Iterative DNS requests require additional policy configurations to transit the traffic through the Zscaler service (depending on your methodology). Disable the default rule in NAT Control or create a higher precedence rule to support iterative queries transiting the ZIA service. To learn more, see About NAT Control.
  • New DNS domains are getting blocked: Domains that fall under malicious domains might get blocked per your policy. Verify whether these domains are getting blocked under blocked domains in the DNS Overview dashboard.

Deployment Checklist

Zscaler recommends downloading the DNS Control Deployment and Operations Checklist to help plan and implement DNS Control: Download PDF

Additional Information

For more SaaS Security information and troubleshooting instructions, see the Zscaler Support Portal and the Zscaler Zenith Community.

Related Articles
Advanced Sandbox Deployment and Operations GuideAuthentication Deployment and Operations GuideBandwidth Control Deployment and Operations GuideCloud App Control Deployment and Operations GuideIsolation Deployment and Operations GuideDisaster Recovery Deployment and Operations GuideDLP Deployment and Operations GuideDNS Control Deployment and Operations GuideFirewall Deployment and Operations GuideIPS Control Deployment and Operations GuideLocal Breakouts Deployment and Operations GuideSaaS Security Deployment and Operations GuideSIEM and ZIA Integration Deployment and Operations GuideSSL Inspection Deployment and Operations GuideURL Filtering Deployment and Operations GuideThreat Protection Deployment and Operations GuideZIA Policy Leading Practices GuideZIA SSL Inspection Leading Practices Guide