
Overviews
How it works?
Connect Control D account
Link your Control D account using API credentials to enable automated management of DNS policies, network controls, and security configurations.
Manage DNS filtering rules
Create and modify filtering policies that block or allow specific domains, categories, or content types based on organizational security requirements and compliance needs.
Configure access policies
Set up network access controls that define which users, devices, or locations can access specific resources or content categories through automated policy deployment.
Monitor network activity
Track DNS queries, blocked requests, and network usage patterns to identify security threats, policy violations, or unusual activity requiring attention.
Update security profiles
Modify user or device security profiles based on role changes, threat intelligence, or compliance requirements without manual configuration across individual endpoints.
Manage device configurations
Deploy DNS settings and network policies to registered devices, ensuring consistent security posture across all endpoints in your organization.
Handle threat responses
Implement automated responses to detected threats or policy violations, including temporary blocks, alerts, or escalation to security teams for investigation.
Generate compliance reports
Create detailed reports on network activity, policy enforcement, and security incidents to demonstrate compliance with organizational or regulatory requirements.

Configure
Build
Automated threat response system
Build workflows that detect malicious domains or security threats through network monitoring, then instantly update DNS filtering rules to protect all users and devices across your organization.
“You can’t do this anywhere else.”



















































Your stack,
connected.

