DNS Monitors
What are DNS Monitors?
DNS monitors continuously check DNS (Domain Name System) records for changes, ensuring your domain configurations remain correct and detecting unauthorized modifications. They track specific DNS record types and alert you when records are added, modified, or removed unexpectedly.
Why DNS Monitoring Matters
Security Protection
- DNS hijacking detection: Catch unauthorized changes to your domain records
- Subdomain takeover prevention: Monitor for malicious subdomain configurations
- Certificate authority monitoring: Track CAA records to prevent unauthorized SSL certificates
Service Continuity
- Email delivery: Ensure MX records remain correct for email flow
- Website availability: Monitor A and AAAA records for IP changes
- Service routing: Track CNAME records that direct traffic to services
Compliance and Auditing
- Change tracking: Maintain records of all DNS modifications
- Compliance requirements: Meet security and regulatory monitoring needs
- Infrastructure oversight: Track DNS changes across your organization
How to Access DNS Monitors
Access your DNS monitors through:
- Main dashboard → DNS Monitors section
- Sidebar navigation → DNS Monitors
- Direct URL: /dns-monitors
Supported DNS Record Types
A Records
- Purpose: Maps domain names to IPv4 addresses
- Example: example.com → 192.168.1.1
- Use case: Monitor main website IP addresses
AAAA Records
- Purpose: Maps domain names to IPv6 addresses
- Example: example.com → 2001:db8::1
- Use case: Monitor IPv6 configurations
CNAME Records
- Purpose: Creates aliases pointing to other domain names
- Example: www.example.com → example.com
- Use case: Monitor subdomain redirections and CDN configurations
MX Records
- Purpose: Specifies mail servers for email delivery
- Example: example.com → mail.example.com (priority 10)
- Use case: Critical for email delivery monitoring
TXT Records
- Purpose: Stores text information for various purposes
- Examples: SPF, DKIM, DMARC, domain verification
- Use case: Monitor email authentication and security records
NS Records
- Purpose: Specifies authoritative name servers for a domain
- Example: example.com → ns1.nameserver.com
- Use case: Monitor name server changes
SOA Records
- Purpose: Contains administrative information about the domain zone
- Information: Primary name server, admin email, serial number, timers
- Use case: Monitor zone configuration and change tracking
CAA Records
- Purpose: Specifies which Certificate Authorities can issue SSL certificates
- Example: example.com → 0 issue "letsencrypt.org"
- Use case: Security monitoring for SSL certificate issuance
Creating a DNS Monitor
Step 1: Navigate to DNS Monitor Creation
- Go to your DNS Monitors page
- Click the "Create DNS Monitor" button
- Complete the DNS monitor creation form
Step 2: Basic Configuration
Monitor Details
- Name: Descriptive name (e.g., "Example.com A Records", "Mail Server MX Monitoring")
- Target: Domain or subdomain to monitor (e.g., example.com, mail.example.com)
- Record Type: Select the DNS record type to monitor
Check Frequency
How often to check DNS records:
- 5 minutes: High-frequency monitoring for critical domains
- 15 minutes: Standard monitoring frequency
- 30 minutes: Regular monitoring for stable configurations
- 1 hour: Low-frequency monitoring for rarely-changing records
- 6-24 hours: Periodic monitoring for stable infrastructure
Step 3: Advanced Settings
Expected Values (Optional)
- Purpose: Alert when DNS records don't match expected values
- Use case: Monitor for specific IP addresses or configurations
- Example: Ensure A record always points to 192.168.1.1
Project Assignment
- Organize DNS monitors by grouping them into projects
- Useful for client-specific or service-specific monitoring
- Helps with team organization and access control
Step 4: Notification Settings
Configure alerts for DNS changes:
- Change notifications: Alert when any DNS record changes
- Value mismatch: Alert when records don't match expected values
- Resolution failure: Alert when DNS queries fail
- Multiple handlers: Use different notification methods for different team members
Understanding DNS Monitor Results
Monitor Status
- 🟢 Up: DNS records are resolving correctly and match expectations
- 🔴 Down: DNS resolution failed or records changed unexpectedly
- 🟡 Changed: DNS records changed but are still resolving
- ⚪ Paused: Monitor is temporarily disabled
DNS Change Detection
The system tracks:
- Record additions: New DNS records that appear
- Record modifications: Changes to existing record values
- Record deletions: DNS records that are removed
- TTL changes: Modifications to Time-To-Live values
Historical Data
- Change history: Complete timeline of all DNS modifications
- Previous values: What the records were before changes
- Change timestamps: Exact timing of modifications
- Change frequency: How often records are modified
Managing DNS Monitors
Viewing Monitor Details
- Click on any DNS monitor name from your list
- View current DNS record values
- See change history and timeline
- Access configuration and notification settings
Understanding Change Logs
Each change log entry contains:
- Timestamp: When the change was detected
- Record type: Which type of DNS record changed
- Old value: Previous record content
- New value: Current record content
- Change type: Added, modified, or deleted
Editing DNS Monitors
- Go to the DNS monitor details page
- Click the "Edit" button
- Modify check frequency, notifications, or expected values
- Save your changes
Pausing and Resuming
- Pause during changes: Temporarily disable monitoring during planned DNS updates
- Maintenance windows: Pause during DNS infrastructure maintenance
- Resume monitoring: Restart monitoring after changes are complete
Common Use Cases and Examples
Website Security Monitoring
Scenario: Monitor your main website's A records for unauthorized changes
- Target: example.com
- Record Type: A
- Expected Value: 192.168.1.100
- Check Frequency: 5 minutes
- Alert when: A record points to any IP other than expected
Email Infrastructure Monitoring
Scenario: Ensure email delivery by monitoring MX records
- Target: company.com
- Record Type: MX
- Expected Values: mail.company.com (priority 10), backup-mail.company.com (priority 20)
- Check Frequency: 15 minutes
- Alert when: MX records change or point to unexpected servers
SSL Certificate Security
Scenario: Monitor CAA records to prevent unauthorized SSL certificates
- Target: secure-app.com
- Record Type: CAA
- Expected Value: 0 issue "letsencrypt.org"
- Check Frequency: 1 hour
- Alert when: CAA records allow unauthorized certificate authorities
Subdomain Monitoring
Scenario: Monitor critical subdomains for configuration changes
- Target: api.service.com
- Record Type: CNAME
- Expected Value: api-servers.amazonaws.com
- Check Frequency: 30 minutes
- Alert when: CNAME points to unexpected destinations
SPF Record Monitoring
Scenario: Monitor email authentication records
- Target: company.com
- Record Type: TXT
- Expected Value: "v=spf1 include:_spf.google.com ~all"
- Check Frequency: 1 hour
- Alert when: SPF record is modified or removed
What to Expect
Initial Setup
- New DNS monitors perform their first check within minutes
- Initial check establishes baseline DNS record values
- Subsequent checks compare against this baseline
- You'll be notified of any differences from the baseline
Ongoing Monitoring
- Regular checks occur according to your configured frequency
- Changes are detected immediately during checks
- Notifications are sent for any detected modifications
- Historical data is stored for trend analysis
Change Notifications
- Immediate alerts: Sent as soon as changes are detected
- Change details: Include old and new values
- Context information: Record type, domain, and timestamp
- Resolution guidance: Information about investigating changes
Common Issues and Troubleshooting
False Positives from DNS Propagation
- Issue: Alerts triggered during legitimate DNS changes
- Solution: Pause monitoring temporarily during planned DNS updates
- Prevention: Coordinate DNS changes with monitoring schedule
Multiple Alerts for Same Change
- Issue: DNS changes detected from multiple monitoring locations
- Cause: DNS propagation delays between different DNS servers
- Solution: Normal behavior - changes propagate at different rates
Missing Change Notifications
- Check notification handlers: Ensure they're configured and enabled
- Test notifications: Use the test feature to verify delivery
- Review monitor settings: Confirm notifications are enabled for the monitor
- Check monitoring frequency: Changes might be detected between checks
DNS Resolution Failures
- DNS server issues: Temporary DNS server problems
- Network connectivity: Monitoring system network issues
- Domain configuration: Actual DNS configuration problems
- Nameserver changes: Authoritative nameserver modifications
Best Practices
Monitor Configuration
- Descriptive naming: Use clear, specific names for each monitor
- Appropriate frequency: Balance detection speed with resource usage
- Critical records first: Start with your most important DNS records
- Expected values: Define expected values for security-critical records
Security-Focused Monitoring
- A and AAAA records: Monitor primary domain IP addresses
- MX records: Critical for email security and delivery
- CAA records: Essential for SSL certificate security
- NS records: Monitor for nameserver hijacking
Notification Strategy
- Immediate notifications: For security-critical records
- Team notifications: Include relevant team members for different record types
- Escalation procedures: Define who to contact for different types of changes
- Documentation: Keep records of legitimate DNS changes
Organizational Approach
- Project organization: Group monitors by domain, client, or service
- Naming conventions: Use consistent naming for easy identification
- Regular reviews: Periodically review and update monitoring configurations
- Change coordination: Inform monitoring team of planned DNS changes
Advanced Monitoring Strategies
Comprehensive Domain Coverage
- Main domain: Monitor all critical record types for your primary domain
- Subdomains: Include important subdomains (www, mail, api, etc.)
- Service domains: Monitor domains used for specific services
- Backup domains: Include disaster recovery and backup domains
Security-First Approach
- Baseline establishment: Document legitimate DNS configurations
- Change approval process: Require approval for DNS modifications
- Incident response: Define procedures for unauthorized changes
- Forensic capability: Maintain detailed change logs for investigation
Integration with Security Tools
- SIEM integration: Feed DNS change data into security systems
- Threat intelligence: Correlate changes with known threat indicators
- Automated response: Trigger automated responses for certain changes
- Compliance reporting: Generate reports for audit and compliance needs
Understanding DNS Propagation
How DNS Propagation Works
- Authoritative servers: Your DNS changes start here
- Recursive resolvers: ISP and public DNS servers cache records
- TTL values: Control how long records are cached
- Global propagation: Changes spread worldwide over time
Monitoring During Propagation
- Expected behavior: Different monitoring checks may see different values
- Propagation timing: Can take minutes to hours depending on TTL
- Temporary inconsistencies: Normal during legitimate changes
- Stabilization: Values become consistent once propagation completes
Compliance and Auditing
Change Documentation
- Complete records: All DNS changes are logged with timestamps
- Before and after values: Full context of what changed
- Change frequency: Track how often records are modified
- Export capability: Generate reports for compliance needs
Security Compliance
- Change detection: Meet requirements for infrastructure monitoring
- Incident response: Provide data for security incident investigation
- Audit trails: Maintain detailed logs for auditor review
- Reporting: Generate compliance reports as needed
Tips for Success
- Start with critical domains: Begin monitoring your most important domains first
- Document baselines: Keep records of legitimate DNS configurations
- Plan for changes: Pause monitoring during planned DNS updates
- Regular review: Periodically verify that monitoring is still relevant
- Team coordination: Ensure DNS change procedures include monitoring considerations
- Security focus: Prioritize monitoring of security-critical record types
- Response planning: Have procedures ready for investigating unexpected changes
- Change validation: Use monitoring data to verify that DNS changes were successful