Event details
Dive deep into Zero Trust DNS, a new security feature that enables enterprise IT administrators to natively enforce domain-name-based network access controls on their Windows endpoints. Learn how to deploy it using network shell (netsh) and get a recommended deployment plan to help you secure your Windows endpoints without impacting employee productivity.
This session is part of the Microsoft Technical Takeoff: Windows + Intune. Add it to your calendar, click Attend for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event.
4 Comments
- Heather_Poulsen
Community Manager
Thanks for joining today’s session on “Zero Trust DNS: Securing Windows one connection at a time” at Microsoft Technical Takeoff. Q&A will remain open through Friday so keep your comments and questions coming! Up next: AMA: Secure and manage AI and agentic capabilities in Windows.
- Heather_Poulsen
Community Manager
Welcome to “Zero Trust DNS: Securing Windows one connection at a time” at Microsoft Technical Takeoff. Q&A is open now and throughout the week. Please post any questions or feedback here in the Comments. [Note: If your organization’s policies prevent you from seeing the video on this page, you can also tune in on LinkedIn.]
- C00kieMonsterBrass Contributor
Any issues or conflicts with Zscaler (ZIA, ZPA, and GRE tunnels), NAT64, DNS64, and/or IPv6-only networks?
- AditiPatange
Microsoft
Thanks for the question!
ZTDNS operates at the Windows Filtering Platform layer and enforces policy at connection time, before any application traffic is established. Because of this, it’s generally complementary to solutions like SSE like Zscaler as long as they support encrypted DNS and use the system resolver. Traffic to allowed destinations can be routed through GRE tunnels or proxies if the gateway is also resolved by the trusted resolver.
ZTDNS is also compatible with IPv6‑only environments, including NAT64/DNS64 deployments.