DNS Filtering
Block communication with banned or harmful websites like malware-hosting or phishing sites
with a cloud-delivered DNS filtering service.
GoodAccess' DNS filter is called Threat Blocker, and it often acts as the first line of
defense against online threats, preventing ransomware attacks before they occur.
Try DNS filtering for free.
No card needed. Full onboarding support.
BENEFITS
Automated browsing protection and content compliance
Prevent breaches
Block attempts to communicate with phishing C&C botnets, credential spoofing sites, or malware-hosting domains.
Main benefit
Protect end-users
Bar access to disreputable websites hosting copyrighted material, p2p sharing, or adult content.
Main benefit
Try Interactive Demo
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
dns filtering demo
How to use DNS filtering?
FEATURES
GoodAccess Threat Blocker protects against phishing, malware, and productivity sinks
dns filtering
Phishing protection
Prevent credential theft by blocking access attempts to known spoofing sites or phishing C&C botnets. DNS filtering is a safety net for end-users who unwittingly fall for a phishing lure.
secure browsing
Secure web browsing
Prevent infection by automatically blocking entry to malware-hosting sites. Cut off communication attempts of malware droppers to prevent early breaches from escalating.
dns filtering
Enforcing content policies
Use DNS filtering to deny access to sites hosting adult content or copyrighted material (bittorrents). You may also choose to filter out social media or streaming sites.
Case study
Hear it from your peers
Case study
Zero Trust Architecture in Creative Dock
Creative Dock needed to ensure ISO 27001 compliance, but they
struggled to achieve the required level of security and control over their network and
user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full,
centralized control over their infrastructure and
covered up to 70% of technical security requirements of ISO 27001.
Trusted leader in Zero Trust Security
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
"Incredibly user frienly, fast and very helpful."
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
"Find the connectivity and stability of connections stable."
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
"Simplifies access management and reduces network administration complexity."
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
"Secure, scalable access to critical systems across a global IP reach."
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
How to enable DNS filtering
Test all premium features for 14 days without limitation. No credit card required.
Choose a gateway location, add your devices, invite team members, add custom blacklists.
When a user tries to access a harmful website, the attempt will be blocked and notified. You may track everything on the dashboard.
Get your personalized product demo
Take a product tour with Eva, GoodAccess product expert, to discover how GoodAccess meets your needs firsthand.
Other features
Explore other features
Network access control
Have full control over inbound connections, manage them centrally with zero hardware required.
Zero trust access control
Minimize the attack surface by robust user authentication, granular privilege assignment, and strong encryption.
Multi-factor authentication
Reduce the risk of unauthorized access to your systems by multi-factor authentication or biometric login to client apps.
DNS FILTERING guide
Complete guide to DNS filtering in GoodAccess
GoodAccess runs its own DNS infrastructure that handles all DNS resolutions for every connected client. It incorporates a DNS filter called Threat Blocker, which is offered as part of a larger security package called Secure Shield.
The GoodAccess Threat Blocker combines open-source and commercial lists of malicious domains
(malware, ransomware, phishing, botnet C&C, spammers), and checks every DNS request
against these lists. When a match is found, Threat Blocker redirects the user to a safe
website that informs them that an attempt to access a malicious domain was blocked.
Our lists contain around 5 million domains and are updated every 6 hours.
Learn more about the GoodAccess Secure Shield and DNS management .