DNS filtering
Admin users can enable or disable DNS filtering, which includes basic malware filtering when enabled. DNS filtering allows admin users to restrict or allow access to specific domains, as well as groups or categories of domains. For example, an admin user may block access to suspected malware sites, or enforce company policy by blocking access to gambling sites or social networks. By default, DNS filtering is disabled.
note
To apply DNS filtering, make sure the Network service in the Coro Agent or Endpoint Protection app is connected on each device. For more information, see The Network service in the Coro Agent or The Coro Endpoint Protection app.
Enabling DNS filtering
To apply DNS filtering to protected devices, you must both enable DNS filtering and assign device labels to allowlists or blocklists. Filtering only applies to devices that are part of the specified device labels; it does not apply to all devices in the workspace.
To enable DNS filtering:
- Sign in to the Coro console .
-
From the sidebar, select
Control Panel
:
-
Select
SWG
:
Coro displays the SWG page:
-
Enable DNS filtering:
Coro displays a confirmation dialog:
- Select YES, ENABLE .
- Add device labels to allowlists or blocklists with device labels to which DNS filtering should apply. For more information, see Allowlists and blocklists .
When filtering is enabled, admin users can enable:
- DNS resolver anonymous mode : Protects user privacy by not tracking individual data. This option ensures that Coro does not analyze or store the DNS request history.
- Allowlist-only filtering : Blocks all URLs except those added to the allowlist.
Allowlists and blocklists
Below the DNS filtering section are the allowlists and blocklists. When an admin user enables DNS filtering for the first time, a predefined inactive set of external blocklists (locked URL groups) are added to the Allow/Block Lists section. Admin users can view, enable, and add device labels to these lists.
Adding device labels to locked URL groups
To add device labels to locked URL groups:
-
From the three-dot menu of the relevant URL group, select
Edit URL group
:
Coro displays the Edit URL group dialog:
- Select device labels to which the allowlist or blocklist should apply.
- Select APPLY .
-
If disabled, from the three-dot menu, select
Enable URL group
:
Adding URLs to lists
To add URLs, IP address ranges, subnets, or URL-based wildcards to an allowlist or blocklist:
-
Select
+ ADD > Add to allowlist/blocklist
:
Coro displays the Add to allowlist/blocklist dialog:
- Enter URLs, IP address ranges, subnets, or URL-based wildcards.
- Select the device labels to which the list should apply.
- Select ADD TO LIST .
Adding URL groups to lists
To add a list of URLs, IP address ranges, subnets, or URL-based wildcards to an allowlist or blocklist:
-
Select
+ ADD > Import URL group to allowlist/blocklist
:
Coro displays the Import URL group to allowlist/blocklist dialog:
-
Upload a text file of the URLs, IP address ranges, subnets, or URL-based wildcards. To facilitate creating a valid text file, Coro provides a link to a template in the
Import URL to allowlist/blocklist
dialog. Each entry should be on a separate line:
- Enter a name for the URL group.
- Select the device labels to which the list should apply.
- Select IMPORT .
Managing lists
View, edit, remove, disable, or enable allowlists and blocklists from the three-dot menu next to each list. Disabled lists appear grayed out: