Introducing Active Directory (and more!)

After months of work and beta testing, our Active Directory integration has arrived.

The juicy Active Directory details

Now when you login to your DNSFilter account, you’ll see two new sections under “Deployments”:

You will begin your integration by using “Sync Tools.”

Navigate to the “install” tab and follow the instructions to download to your desktop. Watch the video above for more details and best practices around things like copying the site key.

Once you’ve finished your installation, go to “Collections” to add your first collection. After you create that first collection, you’ll see that all of your Active Directory groups are now synced to this section. So you select individual users or groups and create new collections.

Once you’ve created your first collection, you can apply policies and block pages from the main “Collections” page.

If you have multiple users in different collections, prioritize your collections using the drag-and-drop feature so that the most important policy is always enforced.

Active Directory is only the beginning

As we built our Active Directory integration, a lot of thought was put into other directory services that our customers are likely to need in the future. Because everyone works differently. So Active Directory (and Azure Active Directory) may be first, but it won’t be the last.

As time goes on, we’ll add more Active Directory services like Google Cloud IAM, Sambra, and OpenLDAP.

If you’re eager to learn more, we are hosting a webinar on Active Directory on Thursday, June 11 at 1 p.m. ET.

A few more goodies

We haven’t been hard at work on just Active Directory! While that’s our big news this week, we also added new capabilities under “Domain Lookup.”

Previously, when a user wanted to report a site as a threat or label a site miscategorized, the alerts were simply sent to DNSFilter. Now, you have the option to add some notes about what you saw and why you think something is a threat.

The other feature we’ve added has to do with Data Explorer. We’re continuing to make improvements to our reporting over time, and in this release we’re addressing a customer ask that we’ve seen a few times.

domain lookup

Customers using Roaming Clients can now drill down by domain in the user view. This enables you to see the specific domain, number of requests, and percentage of requests all by specific users using the same device.

We’re so excited to bring more functionality to our users, and Active Directory is a big step. I want to encourage everyone to keep providing feedback as you test Active Directory and other new features.

One final shoutout to our beta testers who provided invaluable feedback during the process.

Watch our Active Directory webinar

Search
  • There are no suggestions because the search field is empty.
Latest posts
What is Secure Web Gateway: What It Does, Benefits, and More What is Secure Web Gateway: What It Does, Benefits, and More

In today's world of ever-increasing cyber threats, organizations need strong defenses to protect their networks and data and in this complex digital ecosystem, we need more than just one line of defense.

Revving Up the Fun: DNSFilter's IndyCar Experience Recap — St. Pete Edition Revving Up the Fun: DNSFilter's IndyCar Experience Recap — St. Pete Edition

What a weekend at the track! DNSFilter was thrilled to host 10 guests alongside Pax8 this weekend for an unforgettable IndyCar experience in sunny St. Petersburg. Those who joined us came from Thrive, MVP Network Consulting LLC, Myrtle Beach Academy of Aviation, Entech, NetGain Technologies,Warren Averett Technology Group, LLC, and ECMSI—we were lucky to be in such great company for our very first race of the season.

Man-in-the-Middle Attacks: What Are They? Man-in-the-Middle Attacks: What Are They?

A man-in-the-middle (MITM) attack is a form of cyber threat where a bad actor inserts themselves into a conversation between two parties, intercepts traffic, and gains access to information that the two parties were trying to send to each other. It allows attackers to eavesdrop, collect data, and even alter communications between victims. Understanding the mechanics, implications, and defense mechanisms against MITM attacks is essential for prote...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.