Blog Post

Networking Blog
4 MIN READ

Zero Trust DNS is Here: Elevating Enterprise Security on Windows 11

AditiPatange's avatar
AditiPatange
Icon for Microsoft rankMicrosoft
Nov 18, 2025

Announcing GA of Zero Trust DNS on Windows 11 Enterprise and Windows 11 Education

When attackers target an enterprise today, they rarely begin with a blunt smash-through-the-front-door intrusion. They begin quietly by resolving a domain.

In most cases, modern malware, phishing kits, and human-operated ransomware operators rely on DNS as the entry point to discover infrastructure, beacon command-and-control, and exfiltrate data. Thus, it is becoming even more important to secure DNS to help protect against increasingly frequent, complex, and expensive cyberattacks.

Enterprises have invested heavily in Protective DNS services with cutting-edge threat intelligence to identify and block malicious domains in real time but if an endpoint device can simply bypass them, the entire Zero Trust posture is weakened.

Today, Microsoft is closing that gap.

 

Introducing Zero Trust DNS (ZTDNS)

We are excited to announce that Zero Trust DNS (ZTDNS) is now generally available on Windows 11 Enterprise and Windows 11 Education editions. ZTDNS is a new enterprise security feature in Windows that helps ensure DNS policy configured on the enterprise DNS server is enforced on the device. This is an important advancement for organizations working to enable that outbound connectivity on managed Windows devices aligns with enterprise authorization and policy.

ZTDNS provides device-level enforcement of an enterprise’s DNS policy, in-box on Windows 11 helping ensure devices only communicate with destinations the organization intends. It doesn’t require installing and managing additional agents or maintaining a “best effort” block list on each endpoint device. With ZTDNS, the enterprise DNS resolver becomes the policy source of truth and Windows becomes the enforcement point. For more information, check out our documentation.

This can be particularly useful for organizations in highly regulated industries, or where compliance with NIST standards is of paramount importance.

 

 

Without ZTDNS, the system DNS client could be pointed to a network-provided malicious DNS server, which can resolve unapproved domains and return incorrect resolutions to redirect the system to attacker’s endpoint. If the malicious DNS server uses encrypted DNS, IT administrators won’t be able to analyze the DNS traffic to prevent or mitigate potential attacks. Applications can use their own DNS client to completely bypass system policies. Also, system remains vulnerable to in-network attackers.

ZTDNS protects against these attack vectors by mandating the use of Windows DNS client and only sending encrypted DNS queries to the trusted DNS servers. Since ZTDNS blocks all outbound connections and local name resolution by default, the system is protected against in-network threats.

 

Why is ZTDNS needed?

In enterprise scenarios, DNS is no longer just a lookup mechanism but a policy decision point. However, without device-level enforcement, attackers can hijack device DNS to:

  • Redirect DNS queries from the device to a malicious or compromised DNS server
  • Use their own encrypted DNS client and bypass system DNS client
  • Bypass DNS completely with direct IP connections

In such cases, organizations lose the ability to control which network destinations the endpoint is allowed to reach even if a Protective DNS service is used.

ZTDNS addresses this by only allowing outbound connections to IP addresses that were resolved by the trusted DNS server for a query issued by the Windows DNS client. More importantly, it achieves this without terminating end-to-end encryption.

 

How does ZTDNS work?

ZTDNS integrates the Windows DNS client with the Windows Filtering Platform to help enforce domain-name-based network lockdown using encrypted DNS. ZTDNS is off by default and can be configured on a Windows 11 device with an enterprise-approved DNS over HTTPS (DoH) or DNS over TLS (DoT) server. When enabled, ZTDNS blocks all outbound IP-based connections by default and only allows outbound connections to IP addresses resolved by the trusted DNS server or those added to the manual exception list by the IT administrator. It mandates the use of encrypted DNS (DoH or DoT) and only trusts the DNS resolutions initiated by the Windows DNS client and answered by the trusted DNS server to create outbound allow exceptions.

This helps provide a strong, enforceable control that aligns with Zero Trust principles: all destinations are untrusted by default unless specifically permitted.

In a nutshell, when configured and enabled, ZTDNS will have the following effects on your Windows 11 device:

  1. Encrypted DNS enforcement (DoH or DoT)
  2. Default deny for outbound IPv4 and IPv6 traffic
  3. Dynamic allow listing of IP addresses returned by trusted DNS servers
  4. Static allow listing of IP addresses approved by the IT administrator via manual exceptions
  5. Centralized logging of permitted and blocked connections

 

Deploying ZTDNS

ZTDNS is available in the latest builds of Windows 11 Enterprise and Windows 11 Education.  

To deploy ZTDNS, enterprises can configure and enable it via:

  • netsh commands
  • JSON configuration

We are also actively developing a Microsoft Intune experience for ZTDNS  and we will share more information when the details are available.

For detailed deployment guidance, check out our official documentation.

 

Join Me at Microsoft Ignite 2025

For customers attending Microsoft Ignite 2025, please join us at session BRK258: Inside Windows Security, from client to cloud to learn more about ZTDNS. Alternatively, you can also visit the Windows Resiliency Initiative & Windows Security booth to discuss ZTDNS in depth.

 

 

Securing the Present, Innovating for the Future

Security is a shared responsibility. Through collaboration across hardware and software ecosystems, we can build more resilient systems secure by design and by default, from Windows to the cloud, enabling trust at every layer of the digital experience.

The updated Windows Security book is available to help you understand how to stay secure with Windows. Learn more about Windows 11 and Copilot+ PCs. To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters.

Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity.

Updated Nov 18, 2025
Version 1.0
No CommentsBe the first to comment