SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
APRIL 2018 | by Manasi Kulkarni
DNS to Anything - How
Securly Works
DNSDNS
This paper discusses the architecture behind Securly’s DNS-based filtering solution,
currently making over 3 million US students safer. The steps for configuring a school
network to use Securly’s DNS-based filtering solution are laid out. Additionally, included
statistics provide evidence of lives saved and bullying incidents mitigated as a result of
these solutions.
ABSTRACT
Whitepaper on DNS to Anything- How Securly works
1
Abstract
Introduction
Definition of Terms
Understanding the Securly DNS Filtering Architecture
- Get, set, go...
- A visit to the proxy server
- Pitstop- User Authentication
- Finish line
Exceptions
How to set up Securly DNS?
Saving lives with Securly DNS
Conclusion
1
3
4
5
9
10
11
12
CONTENT
Whitepaper on DNS to Anything- How Securly works
2
Each year, millions of students are handed school-owned devices in order to research
topics for class or explore personal interests at home. Still, online dangers are only ever just
a few mouse clicks away. Searching out adult content in a hormone-fueled fervor,
cyberbullying a classmate over their race, using a parent’s credit card to buy weapons, or
conversing with strangers who may be online predators. As a result, schools are on the
lookout for solutions that keep students both focused and safe. DNS-based solutions are
easy to roll out and sweeping in their potential. Securly filters out inappropriate content, but
also helps to prevent cyberbullying, self-harm, and even suicide in students. Keeping kids
safe is a full-time job, but it doesn’t have to be a difficult one.
INTRODUCTION
Whitepaper on DNS to Anything- How Securly works
3
1. DNS: Domain Name Servers(DNS) are servers that contain a directory of domain names
and convert them into IP addresses whenever a request is sent by a user. Securly
maintains its own DNS servers used by its DNS filtering solution.
2. Proxy server: A proxy server works as an intermediary between the user’s computer
and the endpoint machine to fetch information from the endpoint website on behalf of
the user. A proxy server can help control which websites students/users can and
cannot access.
3. Broker: Broker is a web component that is central to the DNS solution and is used to
identify the user, his policy, and category of the domain requested. Every request must
necessarily pass through the broker for filtering to work correctly.
4. Decryption: Information/data on websites may be encrypted during transmission. The
process of translating encrypted data into the understandable or original format is
decryption. Securly does selective decryption of sites for filtering, activity logging, and
sentiment analysis. (Note- Securly does not decrypt sensitive information, or personal
identifiable information(PII) such as credit card numbers, etc.)
5. Token: A string of unique characters generated for a website once the user is logged in.
The Securly server uses tokens to determine what filtering policy needs to be applied
to the user.
6. PageScan: This is Securly’s proprietary approach to auto-blacklisting new and
potentially dangerous websites. It actively scans any new websites for inappropriate
content and images, categorizes, and adds it to the Securly database such that any
subsequent request to it is filtered appropriately.
DEFINITION OF TERMS
Whitepaper on DNS to Anything- How Securly works?
4
Get, set, go...
When a student enters a website address (URL) into the browser, that request is sent to
Securly’s DNS, which replies with a Securly proxy address before sending it back to the
student’s machine.
A visit to the proxy server
The traffic routes to the Securly proxy server. Securly maintains two types of proxy servers:
● MITM
● Non-MITM (TNM)
Depending on what type of website the student is trying to access, it will be sent to either of
these two servers.
UNDERSTANDING THE SECURLY DNS
FILTERING ARCHITECTURE
Whitepaper on DNS to Anything- How Securly works
5
DNSDNS
Being a 100% cloud-based service allows Securly to maintain an army of proxy servers
that auto-scale depending upon the traffic load. Servers sleep and wake up as the traffic
load fluctuates and ensure that users always get the same blazing fast DNS resolution no
matter what traffic you throw at it.
Sites that need to be decrypted are sent to the MITM or Man-in-the-Middle server, so that
Securly can act as the middleman for communication between students and websites.
Social media sites often need to be decrypted to allow Securly’s AI engines to monitor and
flag self-harm, grief, bullying, and suicide-related posts. The sentiment analysis algorithm
uses natural language processing to identify the sentiment behind posts. For example, “I
have had enough, I cannot take this anymore,” does not include any alarming keywords,
but is still a clear indicator of grief in the student. This critical step in Securly’s student
safety initiative has already helped save lives.
Whitepaper on DNS to Anything- How Securly works
6
PROXY PROXY PROXY PROXY
DNSDNS
MITM TNM
User information is usually stored in cookies, meaning users will not need to authenticate
themselves again so long as he/she does not terminate the browsing session. If the user
does terminate the session, then starts a fresh one on the same machine, they would be
required to authenticate again.
Finish line
Once authenticated, the user’s request is sent to the proxy server with the token information
and the appropriate filtering policy applied. If the site the student is attempting to access is
allowed as per school policy, he/she would continue to the actual website. If the site is
blocked, student will receive a blocked page announcement. Irrespective of whether the
student accesses the website or is shown a blocked page, all activity will be logged in the
Securly database, and displayed to the school admin and parents within their Securly
accounts. Any alarming activity will be flagged and sent to admins and parents via email.
Pitstop- User Authentication
The proxy server then sends a request to the broker to help identify the user. At this stage,
if the user is not signed in he/she is required to login and authenticate. Securly supports
authentication with Google, Azure, and on-prem AD. The user would need to input his/her
relevant login credentials at this stage and authenticate himself/herself as a valid user. The
user would not be able to proceed further if authentication fails.
Whitepaper on DNS to Anything- How Securly works
7
PROXY
DNSDNS
This four step process happens real-time and does not interfere with the browsing
experience of the user. Even at peak traffic hours, Securly’s auto-scaling mechanism
ensures that the filtering process remains fast and accurate. This process guarantees
schools a comprehensive filtering experience where students are protected from harmful
and age-inappropriate content at all times.
Whitepaper on DNS to Anything- How Securly works?
8
Blocked
Page
INTERNET INTERNET INTERNET
Azure
INTERNET
JIM
JIM
CNN.com
Playboy.com
G
O
O
G
L
E
PROXY
DNSDNS
STUDENT
MITM TNM
BROKERBROKER
It should be noted that Securly has categorized over a million websites and counting in its
database. This database is updated daily by Securly’s proprietary PageScan technology
that scans and categorizes new websites. Any site in this database will follow the four step
filtering process. Any missing sites would stop at Step 1 and will be accessible to the user
directly. However, such a site will be identified by PageScan and added to the Securly
database within a few seconds for the next time any user attempts to access it.
Along with user based filtering, Securly also provides IP based filtering. This IP based
filtering is used for the Guest Network Policy that allows schools to provide guests filtering
access to their network, without requiring them to login.
EXCEPTIONS
Whitepaper on DNS to Anything- How Securly works
9
Setting up Securly DNS is a simple five minute process. Depending upon what type of
environment you use at your school you would need to add the Securly DNS server
information at your Firewall settings level, or Windows server settings level, or your router
level. The Securly DNS details will be provided to you by the Securly sales engineer.
You would also need to install Securly SSL certificates to allow us to decrypt websites
efficiently. You could do this at the browser level, device level or push out the certificates
via your G Suite admin console. The Securly sales engineer will provide you the necessary
SSL certificates during the onboarding process, or can be downloaded from
support.securly.com.
HOW TO SET UP SECURLY DNS?
Whitepaper on DNS to Anything- How Securly works
10
Securly goes beyond basic filtering to include the detection of grief, bullying, and even
suicidal tendencies in students. This is achieved using a sophisticated sentiment analysis
algorithm that reads the actual sentiment behind posts, even when traditionally flagged
keywords are not included. Securly constantly updates its database consisting of
thousands of words, phrases, and sentences categorized to help the engine identify
activities to be flagged.
In addition to its AI, Securly has a dedicated team of student safety analysts who
investigate flagged activities to determine their severity, allowing parents and schools to
intervene when necessary. Since the beginning of the 2018 school year, the 24 team has
saved over 20 lives and managed to avert over five severe bullying incidents.
SAVING LIVES WITH SECURLY DNS
Whitepaper on DNS to Anything- How Securly works
11
Saving lives is often attributed to a superhero carrying a busload of kids over a ravine or a
firefighter leaping from a burning building with a baby in each arm. The reality is, saving
lives can be far less dramatic and as simple as changing DNS settings. With Securly’s
DNS-based filtering solution, any school district’s IT admin can become a life-saving hero
in a matter of minutes.
CONCLUSION
Whitepaper on DNS to Anything- How Securly works
12

Contenu connexe

Tendances

e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articleAizharkyn Burkanova
 
Websites using touchless interaction having graphical
Websites using touchless interaction having graphicalWebsites using touchless interaction having graphical
Websites using touchless interaction having graphicaleSAT Publishing House
 
Framework for online exam with graphical result and sms gateway
Framework for online exam with graphical result and sms gatewayFramework for online exam with graphical result and sms gateway
Framework for online exam with graphical result and sms gatewayAkash Agrawal
 
Online College info sys-abs
Online College info sys-absOnline College info sys-abs
Online College info sys-absGopi Om Kumar
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...IS Decisions
 
Online Safety
Online SafetyOnline Safety
Online Safetywmassie
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYChano Alfornon
 
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AIIRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AIIRJET Journal
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudyIS Decisions
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)itgsabc
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...journalBEEI
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using SnatchbotIRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using SnatchbotIRJET Journal
 
Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)journalBEEI
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance systemmohanaprasad_v
 

Tendances (20)

e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st article
 
Websites using touchless interaction having graphical
Websites using touchless interaction having graphicalWebsites using touchless interaction having graphical
Websites using touchless interaction having graphical
 
Framework for online exam with graphical result and sms gateway
Framework for online exam with graphical result and sms gatewayFramework for online exam with graphical result and sms gateway
Framework for online exam with graphical result and sms gateway
 
Attendance_App
Attendance_AppAttendance_App
Attendance_App
 
Online College info sys-abs
Online College info sys-absOnline College info sys-abs
Online College info sys-abs
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1Digital Proctor Whitepaper #1
Digital Proctor Whitepaper #1
 
IRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AIIRJET- College Enquiry Chat-Bot using API.AI
IRJET- College Enquiry Chat-Bot using API.AI
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...Examining a display-peeping prevention method that uses real-time UI part tra...
Examining a display-peeping prevention method that uses real-time UI part tra...
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
IRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using SnatchbotIRJET- Development of College Enquiry Chatbot using Snatchbot
IRJET- Development of College Enquiry Chatbot using Snatchbot
 
Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)
 
eTracemate
eTracemateeTracemate
eTracemate
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 

Similaire à DNS to Anything - How Securly Works

Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudRobert Ambrogi
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
SafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service ProvidersSafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service ProvidersSafeDNS
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Multitenency - Solving Security Issue
Multitenency - Solving Security Issue Multitenency - Solving Security Issue
Multitenency - Solving Security Issue MANVENDRA PRIYADARSHI
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistPixel Crayons
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...csandit
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...cscpconf
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary AlgorithmsIRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Truong Minh Yen
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security OvervewIvotefan
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 

Similaire à DNS to Anything - How Securly Works (20)

Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the CloudCloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
SafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service ProvidersSafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service Providers
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Multitenency - Solving Security Issue
Multitenency - Solving Security Issue Multitenency - Solving Security Issue
Multitenency - Solving Security Issue
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...Knowledge base compound approach against phishing attacks using some parsing ...
Knowledge base compound approach against phishing attacks using some parsing ...
 
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
KNOWLEDGE BASE COMPOUND APPROACH AGAINST PHISHING ATTACKS USING SOME PARSING ...
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
Cyber security
Cyber securityCyber security
Cyber security
 
Distil technical-white-paper
Distil technical-white-paperDistil technical-white-paper
Distil technical-white-paper
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security Overvew
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 

Plus de Securly

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programSecurly
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeSecurly
 
David's Law
David's Law David's Law
David's Law Securly
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesSecurly
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community SchoolsSecurly
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - UswestSecurly
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - UseastSecurly
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case StudySecurly
 
Best practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for WindowsBest practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for WindowsSecurly
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?Securly
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product BriefSecurly
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveSecurly
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 SchoolsSecurly
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictSecurly
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolSecurly
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public SchoolsSecurly
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictSecurly
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programSecurly
 
Best practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for ChromebooksBest practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for ChromebooksSecurly
 

Plus de Securly (20)

Best practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook programBest practices to shape and secure your 1:1 Chromebook program
Best practices to shape and secure your 1:1 Chromebook program
 
Best Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted ModeBest Practices for Configuring YouTube Restricted Mode
Best Practices for Configuring YouTube Restricted Mode
 
David's Law
David's Law David's Law
David's Law
 
Anti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United StatesAnti-Bullying Legislation in the United States
Anti-Bullying Legislation in the United States
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community Schools
 
Auditor Admin Config - Uswest
Auditor Admin Config - UswestAuditor Admin Config - Uswest
Auditor Admin Config - Uswest
 
Auditor Admin Config - Useast
Auditor Admin Config - UseastAuditor Admin Config - Useast
Auditor Admin Config - Useast
 
Securly - Pickens County Case Study
Securly - Pickens County Case StudySecurly - Pickens County Case Study
Securly - Pickens County Case Study
 
Best practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for WindowsBest practices to shape and secure your 1:1 program for Windows
Best practices to shape and secure your 1:1 program for Windows
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 
Can social media save kids' lives?
Can social media save kids' lives?Can social media save kids' lives?
Can social media save kids' lives?
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Managing Screen Time - The Student's Perspective
Managing Screen Time - The Student's PerspectiveManaging Screen Time - The Student's Perspective
Managing Screen Time - The Student's Perspective
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools
 
Case Study: Webb City R-VII School District
Case Study: Webb City R-VII School DistrictCase Study: Webb City R-VII School District
Case Study: Webb City R-VII School District
 
Case Study: Gila Crossing Community School
Case Study: Gila Crossing Community SchoolCase Study: Gila Crossing Community School
Case Study: Gila Crossing Community School
 
Case Study: Summit Public Schools
Case Study: Summit Public SchoolsCase Study: Summit Public Schools
Case Study: Summit Public Schools
 
Case Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School DistrictCase Study: Massac Unit #1 School District
Case Study: Massac Unit #1 School District
 
Best practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 programBest practices to shape and secure your 1:1 program
Best practices to shape and secure your 1:1 program
 
Best practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for ChromebooksBest practices to shape and secure your 1:1 program for Chromebooks
Best practices to shape and secure your 1:1 program for Chromebooks
 

Dernier

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 

Dernier (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 

DNS to Anything - How Securly Works

  • 1. APRIL 2018 | by Manasi Kulkarni DNS to Anything - How Securly Works DNSDNS
  • 2. This paper discusses the architecture behind Securly’s DNS-based filtering solution, currently making over 3 million US students safer. The steps for configuring a school network to use Securly’s DNS-based filtering solution are laid out. Additionally, included statistics provide evidence of lives saved and bullying incidents mitigated as a result of these solutions. ABSTRACT Whitepaper on DNS to Anything- How Securly works 1
  • 3. Abstract Introduction Definition of Terms Understanding the Securly DNS Filtering Architecture - Get, set, go... - A visit to the proxy server - Pitstop- User Authentication - Finish line Exceptions How to set up Securly DNS? Saving lives with Securly DNS Conclusion 1 3 4 5 9 10 11 12 CONTENT Whitepaper on DNS to Anything- How Securly works 2
  • 4. Each year, millions of students are handed school-owned devices in order to research topics for class or explore personal interests at home. Still, online dangers are only ever just a few mouse clicks away. Searching out adult content in a hormone-fueled fervor, cyberbullying a classmate over their race, using a parent’s credit card to buy weapons, or conversing with strangers who may be online predators. As a result, schools are on the lookout for solutions that keep students both focused and safe. DNS-based solutions are easy to roll out and sweeping in their potential. Securly filters out inappropriate content, but also helps to prevent cyberbullying, self-harm, and even suicide in students. Keeping kids safe is a full-time job, but it doesn’t have to be a difficult one. INTRODUCTION Whitepaper on DNS to Anything- How Securly works 3
  • 5. 1. DNS: Domain Name Servers(DNS) are servers that contain a directory of domain names and convert them into IP addresses whenever a request is sent by a user. Securly maintains its own DNS servers used by its DNS filtering solution. 2. Proxy server: A proxy server works as an intermediary between the user’s computer and the endpoint machine to fetch information from the endpoint website on behalf of the user. A proxy server can help control which websites students/users can and cannot access. 3. Broker: Broker is a web component that is central to the DNS solution and is used to identify the user, his policy, and category of the domain requested. Every request must necessarily pass through the broker for filtering to work correctly. 4. Decryption: Information/data on websites may be encrypted during transmission. The process of translating encrypted data into the understandable or original format is decryption. Securly does selective decryption of sites for filtering, activity logging, and sentiment analysis. (Note- Securly does not decrypt sensitive information, or personal identifiable information(PII) such as credit card numbers, etc.) 5. Token: A string of unique characters generated for a website once the user is logged in. The Securly server uses tokens to determine what filtering policy needs to be applied to the user. 6. PageScan: This is Securly’s proprietary approach to auto-blacklisting new and potentially dangerous websites. It actively scans any new websites for inappropriate content and images, categorizes, and adds it to the Securly database such that any subsequent request to it is filtered appropriately. DEFINITION OF TERMS Whitepaper on DNS to Anything- How Securly works? 4
  • 6. Get, set, go... When a student enters a website address (URL) into the browser, that request is sent to Securly’s DNS, which replies with a Securly proxy address before sending it back to the student’s machine. A visit to the proxy server The traffic routes to the Securly proxy server. Securly maintains two types of proxy servers: ● MITM ● Non-MITM (TNM) Depending on what type of website the student is trying to access, it will be sent to either of these two servers. UNDERSTANDING THE SECURLY DNS FILTERING ARCHITECTURE Whitepaper on DNS to Anything- How Securly works 5 DNSDNS
  • 7. Being a 100% cloud-based service allows Securly to maintain an army of proxy servers that auto-scale depending upon the traffic load. Servers sleep and wake up as the traffic load fluctuates and ensure that users always get the same blazing fast DNS resolution no matter what traffic you throw at it. Sites that need to be decrypted are sent to the MITM or Man-in-the-Middle server, so that Securly can act as the middleman for communication between students and websites. Social media sites often need to be decrypted to allow Securly’s AI engines to monitor and flag self-harm, grief, bullying, and suicide-related posts. The sentiment analysis algorithm uses natural language processing to identify the sentiment behind posts. For example, “I have had enough, I cannot take this anymore,” does not include any alarming keywords, but is still a clear indicator of grief in the student. This critical step in Securly’s student safety initiative has already helped save lives. Whitepaper on DNS to Anything- How Securly works 6 PROXY PROXY PROXY PROXY DNSDNS MITM TNM
  • 8. User information is usually stored in cookies, meaning users will not need to authenticate themselves again so long as he/she does not terminate the browsing session. If the user does terminate the session, then starts a fresh one on the same machine, they would be required to authenticate again. Finish line Once authenticated, the user’s request is sent to the proxy server with the token information and the appropriate filtering policy applied. If the site the student is attempting to access is allowed as per school policy, he/she would continue to the actual website. If the site is blocked, student will receive a blocked page announcement. Irrespective of whether the student accesses the website or is shown a blocked page, all activity will be logged in the Securly database, and displayed to the school admin and parents within their Securly accounts. Any alarming activity will be flagged and sent to admins and parents via email. Pitstop- User Authentication The proxy server then sends a request to the broker to help identify the user. At this stage, if the user is not signed in he/she is required to login and authenticate. Securly supports authentication with Google, Azure, and on-prem AD. The user would need to input his/her relevant login credentials at this stage and authenticate himself/herself as a valid user. The user would not be able to proceed further if authentication fails. Whitepaper on DNS to Anything- How Securly works 7 PROXY DNSDNS
  • 9. This four step process happens real-time and does not interfere with the browsing experience of the user. Even at peak traffic hours, Securly’s auto-scaling mechanism ensures that the filtering process remains fast and accurate. This process guarantees schools a comprehensive filtering experience where students are protected from harmful and age-inappropriate content at all times. Whitepaper on DNS to Anything- How Securly works? 8 Blocked Page INTERNET INTERNET INTERNET Azure INTERNET JIM JIM CNN.com Playboy.com G O O G L E PROXY DNSDNS STUDENT MITM TNM BROKERBROKER
  • 10. It should be noted that Securly has categorized over a million websites and counting in its database. This database is updated daily by Securly’s proprietary PageScan technology that scans and categorizes new websites. Any site in this database will follow the four step filtering process. Any missing sites would stop at Step 1 and will be accessible to the user directly. However, such a site will be identified by PageScan and added to the Securly database within a few seconds for the next time any user attempts to access it. Along with user based filtering, Securly also provides IP based filtering. This IP based filtering is used for the Guest Network Policy that allows schools to provide guests filtering access to their network, without requiring them to login. EXCEPTIONS Whitepaper on DNS to Anything- How Securly works 9
  • 11. Setting up Securly DNS is a simple five minute process. Depending upon what type of environment you use at your school you would need to add the Securly DNS server information at your Firewall settings level, or Windows server settings level, or your router level. The Securly DNS details will be provided to you by the Securly sales engineer. You would also need to install Securly SSL certificates to allow us to decrypt websites efficiently. You could do this at the browser level, device level or push out the certificates via your G Suite admin console. The Securly sales engineer will provide you the necessary SSL certificates during the onboarding process, or can be downloaded from support.securly.com. HOW TO SET UP SECURLY DNS? Whitepaper on DNS to Anything- How Securly works 10
  • 12. Securly goes beyond basic filtering to include the detection of grief, bullying, and even suicidal tendencies in students. This is achieved using a sophisticated sentiment analysis algorithm that reads the actual sentiment behind posts, even when traditionally flagged keywords are not included. Securly constantly updates its database consisting of thousands of words, phrases, and sentences categorized to help the engine identify activities to be flagged. In addition to its AI, Securly has a dedicated team of student safety analysts who investigate flagged activities to determine their severity, allowing parents and schools to intervene when necessary. Since the beginning of the 2018 school year, the 24 team has saved over 20 lives and managed to avert over five severe bullying incidents. SAVING LIVES WITH SECURLY DNS Whitepaper on DNS to Anything- How Securly works 11
  • 13. Saving lives is often attributed to a superhero carrying a busload of kids over a ravine or a firefighter leaping from a burning building with a baby in each arm. The reality is, saving lives can be far less dramatic and as simple as changing DNS settings. With Securly’s DNS-based filtering solution, any school district’s IT admin can become a life-saving hero in a matter of minutes. CONCLUSION Whitepaper on DNS to Anything- How Securly works 12