US English (US)
FR French
DE German
ES Spanish
IT Italian
NL Dutch
JP Japanese

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • Contact Us
English (US)
US English (US)
FR French
DE German
ES Spanish
IT Italian
NL Dutch
JP Japanese
  • Home
  • CyberFOX DNS Filtering
  • Getting Started

DNS Security Center Overview

Written by Owen Parry

Updated at January 30th, 2026

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

  • AutoElevate Knowledgebase
    New to AutoElevate? START HERE General & Troubleshooting Managing Rules Integrations Announcements FAQ Sales & Marketing
  • Password Boss Knowledgebase
    Using Password Boss Business Administration Password Boss Partner Documents
  • CyberFOX DNS Filtering
    Getting Started Filtering Policies Company and Location Setup Roaming Clients Reporting and Logging Troubleshooting
  • Marketing Toolkit
    MSP Marketing & Education Toolkit
  • Changelogs for Autoelevate and Password Boss
  • CyberFOX Product Roadmap
  • Current Status
+ More

Table of Contents

What It Means When You See No Alerts Malware Domains Phishing And Fake Login Pages Botnet And Command‑And‑Control Activity Newly Registered Domains Random‑Looking (DGA) Domains Fast‑Flux Domains Traffic Pattern Alerts Volume Alerts Location Alerts What To Do When You See An Alert

The DNS Security Center provides a clear and easy way to monitor potentially harmful or unusual DNS activity across your network. It highlights categories of behavior that may indicate security risks, malware activity, or misconfigurations. This page explains each alert category in detail so you can understand what it means and when to take action.

The Security Center updates automatically as your network generates DNS traffic, providing real‑time visibility into patterns, threats, and potential issues before they affect your users or business.

 

What It Means When You See No Alerts


When the Security Center shows no alerts, it indicates that your network’s DNS activity is operating normally according to current threat intelligence and behavioral baselines. No alerts do not mean nothing is happening—only that nothing appears suspicious, risky, or outside expected patterns.

A clean dashboard is common during normal operation. The system continuously monitors traffic in real time and automatically alerts if any unusual or potentially harmful activity is detected.

 

Malware Domains


This alert appears when a device on your network attempts to connect to a domain known to distribute harmful software, such as viruses, ransomware, spyware, or trojans. These domains are identified through threat intelligence feeds and global malware reporting sources.

Malware domains typically host executable downloads, malicious scripts, or payload delivery systems. Even a single attempt to reach one of these domains can indicate early signs of compromise, such as a malicious email link being clicked or background software attempting to install without user consent.

If you see repeated attempts from the same device, it may signal an active infection that needs immediate investigation.

 

Phishing And Fake Login Pages


Phishing alerts are triggered when a device requests a domain that impersonates a trusted brand or service. These websites often mimic login pages from companies like banks, email providers, cloud services, or social platforms.

Phishing sites attempt to trick users into entering their credentials or personal information. The DNS Security Center detects these domains using industry‑standard phishing feeds and known attacker patterns, such as lookalike spellings or suspicious hosting sources.

These alerts help you identify potential credential theft attempts, whether caused by a deceptive email or a mistyped URL.

 

Botnet And Command‑And‑Control Activity


A botnet or command‑and‑control (C2) alert occurs when a device attempts to communicate with infrastructure used by attackers to control infected systems. These servers issue instructions to compromised devices, such as extracting data, downloading additional components, or participating in coordinated attacks.

These alerts are particularly important because they often indicate an active infection rather than a simple browsing attempt. Devices generating this type of traffic should be reviewed quickly for malware or unauthorized programs.

The traffic may also be automated, occurring at regular intervals even when the user is not actively using the device.

 

Newly Registered Domains


Cybercriminals frequently use newly created domains because they appear clean to most security tools. These domains are often used for phishing attacks, fraudulent pages, or malware distribution.

When your network contacts a domain that was registered recently, the Security Center flags it as a higher‑risk destination. This does not necessarily mean the domain is malicious, but it does indicate the need for caution, as malicious actors often use newly registered domains to evade detection and reputation checks.

Combining this alert with other indicators, such as phishing or malware, can reveal stronger signs of malicious activity.

 

Random‑Looking (DGA) Domains


Some malware families use domain generation algorithms (DGAs) to create large numbers of random or meaningless domain names. This helps attackers evade security tools by constantly rotating the domains their malware contacts.

DGA domains often appear as long, random strings of letters and numbers. A device sending requests to many such domains may be infected with malware that is attempting to locate or reestablish contact with a control server.

These alerts help you detect infections early, even if the specific domain used for malicious activity has not yet been identified by global threat lists.

 

Fast‑Flux Domains


Fast‑flux networks use rapidly rotating IP addresses to host malicious websites. Attackers rely on this method to evade takedown attempts and hide the true location of their infrastructure.

When a device attempts to access a fast‑flux domain, it suggests that the traffic is likely routed through a botnet or other hostile environment. These domains often host phishing pages, malware installers, or malicious redirect services.

The DNS Security Center identifies these patterns based on how frequently the domain changes its associated IP addresses over short periods of time.

 

Traffic Pattern Alerts


Traffic pattern alerts highlight changes in how your network devices typically behave. These alerts compare current DNS activity with historical trends over the past 15 days in your environment.

Examples of unusual traffic patterns include:

• New categories of websites not normally accessed
• Sudden interest in risky or unknown domains
• Unusual times of access
• Activity inconsistent with a device’s usual behavior

These alerts do not always indicate malicious activity. Sometimes they point to newly installed software, changes in user behavior, or normal business shifts. However, when combined with other alerts, they can be an important early signal of compromise or misconfiguration.

 

Volume Alerts


Volume alerts appear when the number of DNS requests from a device or location increases dramatically compared to normal behavior.

High DNS volume can be caused by:

• Malware scanning or reconnaissance
• Background processes stuck in a loop
• Browser extensions generating excessive requests
• Software updates behaving unexpectedly

While some volume spikes are harmless, repeated or sustained abnormal traffic should be investigated to ensure the device is functioning correctly and is not compromised.

 

Location Alerts


Location alerts occur when DNS requests begin to concentrate in geographic regions your organization does not usually interact with.

Unexpected regional patterns may occur when:

• Malware contacts servers in specific countries
• Users are redirected to unfamiliar regions
• Suspicious websites are being accessed
• Compromised devices attempt to exfiltrate data

Location anomalies do not always indicate malicious intent, but they help highlight unusual behavior that merits further review.

 

What To Do When You See An Alert


When the Security Center generates an alert, consider the following steps:

• Review which device or user triggered the alert
• Verify whether the destination was intentional
• Check the device for unusual programs, browser extensions, or recent downloads
• Follow your internal security procedures if malware is suspected
• Contact support for assistance if you need further guidance

Consistently reviewing alerts helps maintain a secure network and protects against emerging threats.

dns protection security hub

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Understanding DNS over HTTPS (DoH)
  • Uninstalling the CyberFOX DNS Roaming Client
  • Security policy recommendations
Request a Demo
  • Get Pricing
  • Start Trial
  • Contact
  • Support Center
  • Login
Solutions
AutoElevate
  • AutoElevate Overview
  • Remove Admin Privilege
  • Just-in-Time Admin
  • Blocker
Password Manager
  • Password Manager Overview
  • Features
DNS Filtering
  • DNS Filtering Overview
MSPs
IT Departments
  • Overview
  • State and Local Government
  • K-12 Education
  • Manufacturing
  • Higher Education
Resources
  • Resource Center
  • Group Demos
  • Events
  • The Simple 7™
Company
  • About
  • Leadership
  • Culture & Values
  • News & Press
  • Awards
  • Partnerships
  • Referral Program
  • Trust Center
CyberFox Logo

CALL US (813) 578-8200

© 2025 CYBERFOX LLC ALL RIGHTS RESERVED | Privacy Policy | Terms of Service | Sitemap


Knowledge Base Software powered by Helpjuice

//-------------------------------------------------------------------- // RESOLVE DESTINATION URL //-------------------------------------------------------------------- function resolveRedirect(path) { if (STATUS_SLUGS.includes(path)) { return "https://status.cyberfox.com"; } if (REDIRECTS.hasOwnProperty(path)) { return REDIRECTS[path]; } return null; } //-------------------------------------------------------------------- // CLICK HANDLER (Capture Phase) //-------------------------------------------------------------------- document.addEventListener( "click", function (e) { var link = e.target.closest && e.target.closest(LINK_SELECTOR); if (!link) return; // Let modified clicks behave normally (open in new tab, etc.) if (e.metaKey || e.ctrlKey || e.shiftKey || e.altKey) return; // Only left click if (e.button !== 0) return; var href = link.getAttribute("href") || link.href; if (!href || href.startsWith("#")) return; var path = normalizePath(href); var target = resolveRedirect(path); if (!target) return; // Intercept click BEFORE Helpjuice SPA/PJAX e.preventDefault(); e.stopPropagation(); if (e.stopImmediatePropagation) e.stopImmediatePropagation(); window.open(target, "_blank", "noopener"); }, true // capture ); //-------------------------------------------------------------------- // KEYBOARD ACCESSIBILITY (Enter / Space) //-------------------------------------------------------------------- document.addEventListener( "keydown", function (e) { if (e.key !== "Enter" && e.key !== " ") return; var link = document.activeElement.closest && document.activeElement.closest(LINK_SELECTOR); if (!link) return; var href = link.getAttribute("href") || link.href; if (!href || href.startsWith("#")) return; var path = normalizePath(href); var target = resolveRedirect(path); if (!target) return; e.preventDefault(); e.stopPropagation(); if (e.stopImmediatePropagation) e.stopImmediatePropagation(); window.open(target, "_blank", "noopener"); }, true ); })();
Expand