{"id":12209,"date":"2025-08-26T07:55:35","date_gmt":"2025-08-26T14:55:35","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12209"},"modified":"2025-08-26T07:48:41","modified_gmt":"2025-08-26T14:48:41","slug":"operationalize-protective-dns-step-by-step","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/","title":{"rendered":"Operationalize Protective DNS Step-by-Step"},"content":{"rendered":"<h3>Protective DNS Challenges<\/h3>\n<p>Preemptively blocking connections to threat-related domains is a highly attractive opportunity for security teams of all sizes\u2014one also promoted by standardization bodies like the National Institute of Standards and Technology (NIST), with the latest version of NIST Special Publication (SP) 800-81 Revision 31 serving as a key proof point. <\/p>\n<p>The technology enabling this, Protective DNS (PDNS), is still relatively new\u2014especially when compared to more established security solutions such as network firewalls, antivirus software and identity management systems. Today, many security teams have limited exposure to PDNS and lack the experience needed to fully operationalize its benefits\u2014particularly its ability to deliver early, large-scale threat prevention. <\/p>\n<p>Let\u2019s explore why adopting PDNS remains challenging\u2014and how security teams can accelerate its deployment for quick wins. <\/p>\n<h3>Roadblocks to Protective DNS <\/h3>\n<p>There are several reasons why security teams struggle to get into PDNS. Here, an overview: <\/p>\n<ul class=\"list-spacing\">\n<li>\n    <strong>Lack of DNS Expertise:<\/strong> Most security teams are trained in traditional technologies like vulnerability management, endpoint protection, firewalls and SIEM\u2014but have rarely had the opportunity to dive deeply into DNS. They often rely on network teams to manage this part of the IT stack. Concepts such as DNS record types, resolution processes and protection mechanisms are typically discussed during initial infrastructure setup but are often overlooked afterward. Adversaries are aware of this knowledge gap and register millions of domains each year\u2014often with a lifespan of just one day\u2014to evade detection.\n  <\/li>\n<li>\n    <strong>Reliance on Tactical Tools:<\/strong> Many security teams are locked into existing tools that focus on detecting malicious content or payloads as they arrive at their doorstep. Their expertise tends to develop heuristically around known attack patterns at the point of impact. Pre-attack knowledge and trends\u2014such as how threat actors set up infrastructure\u2014remain a less favored topic. Consider this: the MITRE ATT&#038;CK framework includes 12 post-delivery attack tactics (from initial access through impact) and hundreds of sub-techniques, but only two pre-attack tactics and fewer than 20 related sub-techniques.\n  <\/li>\n<li>\n    <strong>Long Implementation Cycles:<\/strong> PDNS initiatives are often stalled by the time-consuming process of redesigning network traffic flows, which can delay or derail projects. Networking teams frequently have to request changes months in advance and are often given minimal time windows to implement them.\n  <\/li>\n<li>\n    <strong>Fear of False Positives:<\/strong> New enforcement layers always carry the risk of service disruptions caused by false positives. At scale, solutions like PDNS may amplify these concerns, especially in organizations with low risk tolerance.\n  <\/li>\n<\/ul>\n<p>The combination of all these roadblocks makes PDNS less attractive to decision-makers. Most importantly, it creates a catch-22: with fewer resources allocated, the ROI remains unclear\u2014pushing PDNS projects lower on the priority list during resource planning. <\/p>\n<h3>Protective DNS Isn\u2019t Binary; It\u2019s a Journey<\/h3>\n<p>To overcome these blockers, a systematic, step-by-step approach can help. Why use a spectrum? Because PDNS isn\u2019t binary. Like many other technologies, PDNS requires time and organizational maturity to implement effectively. Additionally, today\u2019s security market is saturated with various solutions, each claiming some level of PDNS functionality\u2014yet often lacking the depth and effectiveness needed to support real-world use cases. As a result, it becomes increasingly difficult for security decision-makers to determine which tools to adopt and how to do so effectively. <\/p>\n<p>An alternative approach is to frame PDNS as a maturity journey\u2014enabling initiative-takers and project managers to help organizations identify the right solution based on their size, goals and current capabilities.  <\/p>\n<p>Here\u2019s a simplified overview of how to effectively roll out PDNS: <\/p>\n<p><strong>Step 1: Run a Time-Limited, One-Time Assessment by an External Expert <\/strong><\/p>\n<p>This approach helps organizations quickly uncover previously unknown risks within their network. More importantly, visibility into these risks initiates high-level conversations among decision-makers and highlights the potential benefits that PDNS can offer. In simple terms: tell me what I don\u2019t know. <\/p>\n<p><strong>Step 2: Initiate Continuous Monitoring to Feed SecOps <\/strong><\/p>\n<p>Once the risks are understood, the organization can greenlight the exposure of PDNS to security and network operations teams. During this phase, PDNS should be enabled in detection mode, providing continuous threat detection events to monitoring and analytics functions such as SIEM. Key results include new insights into which assets are at risk, when and why. Security teams can use this data to track threats and correlate findings with existing tools. <\/p>\n<p>This step offers different users distinct insights. <strong>SOC analysts <\/strong>gain access to valuable new threat signals, enhancing decision-making through deeper visibility into DNS-layer activity. <strong>Detection engineers<\/strong> can use this phase to identify gaps in existing detections and improve coverage.<\/p>\n<p>Most importantly, by continuously uncovering and trending previously unknown risks, organizations build confidence in the data and develop a clearer understanding of their threat landscape. <\/p>\n<p><strong>Step 3: Activate Preemptive Security for Confirmed Malicious Domains <\/strong><\/p>\n<p>After security teams gain confidence in the risk signals, specific <strong>blocking policies<\/strong> can be enabled using response policy zones. This powerful DNS security mechanism allows network and security administrators to <strong>modify DNS query responses<\/strong> based on custom policies\u2014enabling real-time blocking, redirection or logging of potentially malicious or unwanted domain lookups.  <\/p>\n<p>This phase allows organizations to begin experiencing tangible benefits, such as a reduction in the number of security alerts and elimination of time-consuming incidents. Network teams may also observe improvements in traffic quality and performance. <\/p>\n<p><strong>Step 4: Expand Blocking and Optimize Controls <\/strong><\/p>\n<p>As the organization gains experience in preemptively blocking threats, PDNS policies can be expanded. This phase may also enable <strong>consolidation or replacement<\/strong> of outdated security controls\u2014such as hard-to-manage access control lists or redundant endpoint policies\u2014leading to a more efficient security architecture. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/protect-dns-maturity-with-steps-and-tasks.jpg\" alt=\"\" width=\"895\" height=\"498\" class=\"alignnone size-full wp-image-12211\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protect-dns-maturity-with-steps-and-tasks.jpg 895w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protect-dns-maturity-with-steps-and-tasks-300x167.jpg 300w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/protect-dns-maturity-with-steps-and-tasks-768x427.jpg 768w\" sizes=\"auto, (max-width: 895px) 100vw, 895px\" \/><\/p>\n<p class=\"image-caption\">Figure1. Protect DNS maturity with steps and tasks<\/p>\n<h3>Example Detections Accelerating the Adoption of PDNS <\/h3>\n<p>Continuous monitoring using detection-only mode (step 2) plays a critical role in the successful adoption of PDNS, as new threats can be detected without requiring major changes to the infrastructure. A strong example of such threats is the detection of DNS-based command-and-control (C2) traffic. <\/p>\n<p>Due to the widespread use of DNS tunneling tools\u2014legit and malicious\u2014many security teams struggle to effectively monitor and control DNS traffic for C2 traffic. While next-generation firewalls or secure access service edge (SASE) type technologies have some capabilities to detect DNS tunneling, several complexities remain. Content delivery networks, usage of new lookalike domains and the expansion of legitimate DNS C2 tools complicate the detection and blocking of all C2 activities. <\/p>\n<p>To address this challenge, PDNS solutions that leverage predictive threat intelligence\u2014actively tracking threat actors and their infrastructure\u2014are essential. Powered by this intelligence, PDNS provides security teams with a precise scalpel for detecting C2 activity, rather than relying on broad, reactive measures based on previously known attacks. <\/p>\n<p>As DNS tunnels are detected, many security decision-makers and practitioners immediately see the value. A key reason is that understanding and mitigating DNS tunneling is vital for protecting enterprises and meeting compliance standards like the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR).   <\/p>\n<p>Infoblox Threat Defense\u2122 makes detection of C2 and many other threats easier by offering a detection-only mode only that does not require any changes to existing network architectures, eliminating time consuming network redesigns or possible service interruptions.  <\/p>\n<p>The new insight also helps demonstrate the <strong>potential impact of enforcement<\/strong>, making the transition to active blocking more acceptable. Most importantly, detection-only mode provides a foundation to clearly <strong>articulate the ROI<\/strong> of PDNS by showing measurable security value without disrupting operations. <\/p>\n<h3>Learn More about Infoblox Threat Defense<\/h3>\n<p>PDNS is not a binary, on-off solution. Given its relatively recent emergence in the security technology landscape, it requires a step-by-step adoption approach. By following a phased roll-out model, organizations can efficiently realize the full benefits of PDNS by leveraging existing resources and gradually integrating it without major investments. <\/p>\n<p>To learn more about Infoblox\u2019s PDNS solution, <a href=\"https:\/\/www.infoblox.com\/products\/threat-defense\/\" target=\"_blank\">Threat Defense<\/a>, and how to leverage detection-only mode, visit the <a href=\"https:\/\/www.infoblox.com\/products\/secure-dns-security\/\" target=\"_blank\">Infoblox website<\/a> or contact one of our specialists. New to PDNS? Request a <a href=\"https:\/\/www.infoblox.com\/resources\/workshop\/security-workshop\/\" target=\"_blank\">DNS workshop here<\/a>. <\/p>\n<h3 style=\"font-size: 18px;\">Footnotes<\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-81r3.ipd.pdf\" target=\"_blank\">NIST Special Publication (SP) 800-81 Revision 3: Secure Domain Name System (DNS) Deployment Guide<\/a>, Rose, Scott, Liu, Cricket, Gibson, Ross, National Institute of Standards and Technology (NIST), April 2025 <\/li>\n<\/ol>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n.entry-content ul.list-spacing ul > li {\n    list-style-type: square;\n}\n.list-spacing li {\n    margin-bottom: 20px;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('Operationalize <span class=\"gradient\">Protective DNS<\/span> Step-by-Step');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protective DNS Challenges Preemptively blocking connections to threat-related domains is a highly attractive opportunity for security teams of all sizes\u2014one also promoted by standardization bodies like the National Institute of Standards and Technology (NIST), with the latest version of NIST Special Publication (SP) 800-81 Revision 31 serving as a key proof point. The technology enabling [&hellip;]<\/p>\n","protected":false},"author":407,"featured_media":12210,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[740,1294,1295,1296,1297],"class_list":{"0":"post-12209","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-protective-dns","9":"tag-maturity-model","10":"tag-security-and-networking-teams","11":"tag-roadblocks","12":"tag-detection-mode","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Successfully deploying protective DNS<\/title>\n<meta name=\"description\" content=\"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Successfully deploying protective DNS\" \/>\n<meta property=\"og:description\" content=\"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-26T14:55:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bart Lenaerts-Bergmans\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Successfully deploying protective DNS\" \/>\n<meta name=\"twitter:description\" content=\"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bart Lenaerts-Bergmans\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/\"},\"author\":{\"name\":\"Bart Lenaerts-Bergmans\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/641bd9fbad20df55272970414b97ada9\"},\"headline\":\"Operationalize Protective DNS Step-by-Step\",\"datePublished\":\"2025-08-26T14:55:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/\"},\"wordCount\":1348,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-Operationalize-Protective-DNS.jpg\",\"keywords\":[\"Protective DNS\",\"maturity model\",\"security and networking teams\",\"roadblocks\",\"detection mode\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/\",\"name\":\"Successfully deploying protective DNS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-Operationalize-Protective-DNS.jpg\",\"datePublished\":\"2025-08-26T14:55:35+00:00\",\"description\":\"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-Operationalize-Protective-DNS.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-thumbnail-Operationalize-Protective-DNS.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/operationalize-protective-dns-step-by-step\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Operationalize Protective DNS Step-by-Step\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/641bd9fbad20df55272970414b97ada9\",\"name\":\"Bart Lenaerts-Bergmans\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/photo-bart-lenaerts-bergmans-96x96.jpg\",\"caption\":\"Bart Lenaerts-Bergmans\"},\"description\":\"Bart is a Senior Product Marketing Manager with over 20 years of experience in bringing security operations solutions to market. He started his career in the security industry as a product manager for SIEM solutions. In this role, he enabled security teams around the globe to detect, investigate, and stop threats within their IT infrastructure. Over the past 10 years, Bart has focused on messaging Threat Intelligence solutions as a product marketing manager at McAfee, FireEye-Mandiant, and recently CrowdStrike. As a go-to-market and technical expert, he witnessed firsthand several shifts in cybercriminal tradecraft. Bart currently focuses on communicating the compelling research from the Infoblox Threat Intel team and delivering thought leadership around the uniqueness of DNS-sourced threat intel. Based close to Boston, Massachusetts, he is currently a member of Infoblox\u2019s product and solutions marketing team. Bart holds a master\u2019s degree in Information Technology Management from Post-University of Limburg, Belgium.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bart-lenaerts-bergmans\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Successfully deploying protective DNS","description":"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/","og_locale":"en_US","og_type":"article","og_title":"Successfully deploying protective DNS","og_description":"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/","og_site_name":"Infoblox Blog","article_published_time":"2025-08-26T14:55:35+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg","type":"image\/jpeg"}],"author":"Bart Lenaerts-Bergmans","twitter_card":"summary_large_image","twitter_title":"Successfully deploying protective DNS","twitter_description":"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg","twitter_misc":{"Written by":"Bart Lenaerts-Bergmans","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/"},"author":{"name":"Bart Lenaerts-Bergmans","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/641bd9fbad20df55272970414b97ada9"},"headline":"Operationalize Protective DNS Step-by-Step","datePublished":"2025-08-26T14:55:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/"},"wordCount":1348,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg","keywords":["Protective DNS","maturity model","security and networking teams","roadblocks","detection mode"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/","url":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/","name":"Successfully deploying protective DNS","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg","datePublished":"2025-08-26T14:55:35+00:00","description":"Protective DNS requires a step-by-step approach to maximize effectiveness. Detection mode only is a key stepping stone to introduce the benefits of Protective DNS to security and networking teams.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/blog-thumbnail-Operationalize-Protective-DNS.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/operationalize-protective-dns-step-by-step\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Operationalize Protective DNS Step-by-Step"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/641bd9fbad20df55272970414b97ada9","name":"Bart Lenaerts-Bergmans","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/photo-bart-lenaerts-bergmans-96x96.jpg","caption":"Bart Lenaerts-Bergmans"},"description":"Bart is a Senior Product Marketing Manager with over 20 years of experience in bringing security operations solutions to market. He started his career in the security industry as a product manager for SIEM solutions. In this role, he enabled security teams around the globe to detect, investigate, and stop threats within their IT infrastructure. Over the past 10 years, Bart has focused on messaging Threat Intelligence solutions as a product marketing manager at McAfee, FireEye-Mandiant, and recently CrowdStrike. As a go-to-market and technical expert, he witnessed firsthand several shifts in cybercriminal tradecraft. Bart currently focuses on communicating the compelling research from the Infoblox Threat Intel team and delivering thought leadership around the uniqueness of DNS-sourced threat intel. Based close to Boston, Massachusetts, he is currently a member of Infoblox\u2019s product and solutions marketing team. Bart holds a master\u2019s degree in Information Technology Management from Post-University of Limburg, Belgium.","url":"https:\/\/www.infoblox.com\/blog\/author\/bart-lenaerts-bergmans\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12209"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12209\/revisions"}],"predecessor-version":[{"id":12217,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12209\/revisions\/12217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12210"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}