- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
The Domain Name System is the backbone of internet communication, yet it remains one of the most frequently targeted vectors. Palo Alto Networks Unit 42 ® found that 85% of malware leverages DNS to establish command-and-control (C2) communication, alongside other tactics such as phishing, ransomware delivery, and data exfiltration. While organizations may have fortified their perimeters, the modern distributed workforce creates a persistent "last mile" challenge: the mobile user.
Mobile users may need to disconnect their Secure Access Service Edge (SASE) agent to bypass captive portals, circumvent site restrictions, or resolve underlying network connectivity issues. In such cases, the user's device silently reverts DNS traffic to an unmonitored local ISP resolver. This creates a significant visibility gap. Traditional resolvers were built to answer queries quickly, not to secure them; they lack the inline inspection required to detect threats. Consequently, when a user disconnects, they step into a blind spot where sophisticated threats such as DNS tunneling, command-and-control (C2), and DNS hijacking can operate unnoticed. Historically, security teams have had to balance the risk of invisible threats against the need for mobile productivity. We have engineered a modern solution that delivers both.
We are excited to announce support for Advanced DNS Security Resolver (ADNSR) in the Prisma Access Agent. This integration ensures that your DNS security travels with the device, even when the agent tunnel is disconnected, thereby closing one of the most persistent visibility gaps in the modern enterprise. This new capability ensures that enterprise-grade, Precision AI™-powered Advanced DNS protection follows your users, regardless of their connection status.
The concept is simple but powerful: Security is engineered to be persistent, ensuring policy enforcement follows the user wherever they go. When you enable ADNS, the Prisma Access Agent effectively becomes an intelligent DNS guardian. When a full network tunnel is unavailable or disabled, the agent automatically adapts, intercepting DNS queries and forwarding them to Palo Alto Networks ADNS Anycast resolvers over an encrypted DNS-over-HTTPS (DOH) connection.
This ensures that "baseline security protections remain in place regardless of connection status." ADNS Security Resolver applies your configured security rules, including blocking malicious domains and sinkholing C2 traffic, and applying content categorization to uphold acceptable use policies even when users are off the network. Ultimately, your users get the direct-to-internet performance they need, and you get the visibility and control your security posture demands.
The implementation relies on three sophisticated mechanisms to ensure resilience without breaking user workflows:
This solution moves beyond simple routing to deliver real-time, inline security encompassing both DNS Request and Response inspection. The Prisma Access Agent connects your endpoints directly to the powerful Precision AI™ technology that drives our Advanced DNS Security capabilities.
This technology prevents 2.06B DNS threats every single day. By extending this inspection to the endpoint, you are effectively preventing "patient zero" scenarios. You can block malicious traffic distribution systems, DNS Hijacking, domain generation algorithms (DGAs), stop ultra-slow DNS tunneling, and prevent C2 callbacks before a malicious connection is ever established.
The extension of Advanced DNS Resolver to Prisma Access Agent represents a pivotal step in securing the hybrid workforce. It empowers organizations to maintain a robust security posture without hindering user productivity or connectivity.
Extend Advanced DNS Security Resolver protection to Prisma Access Agent users in just a few simple steps. Centrally manage policies in Strata Cloud Manager to ensure DNS-layer security remains active even when users disconnect from the tunnel, closing last-mile visibility gaps without impacting productivity.
Get started today:
For a detailed configuration guide, please refer to the Technical Documentation.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| Subject | Likes |
|---|---|
| 2 Likes | |
| 2 Likes | |
| 1 Like | |
| 1 Like | |
| 1 Like |
| User | Likes Count |
|---|---|
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 1 |


