Securing Your DNS

How do you:
  • Prevent unauthorized zone transfers from accessing the Domain Name Server (DNS) database (called a “zone” file),
  • Reduce the exposure to DNS content corruption through either dynamic updates to the zone file or “cache pollution” (also called DNS spoofing or cache poisoning),
  • Identify tools for checking the zone files and delegations for correct entries, and
  • Identify other useful DNS resources.
On thursday 28th of Augast, kindly join Godwin Poriot  as he takes us through this training session.
This Topic  provides DNS operators, “hostmasters”, with suggestions and techniques for securing and improving the operation of their servers. It also guides them to useful tool and information resources. This topic has no applicability to networks that are not using DNS for host name resolution.
Improperly configured DNS servers generally slow or prevent proper connection of client application to their intended servers. Improper configuration can also lead to blocked and possibly miss-delivered e-mail, the “hijacking” of web sites or other services, and in the extreme, the root or administrative compromise of the system on which DNS is running. The services provided by the cooperative operation of DNS servers worldwide are necessary for the proper function of the Internet and for Intranets as well.
————————————————————
To join the training session
————————————————————
  1. Go to https://www.anymeeting.com/280-920-576?rslt=0af1b905-da41-4ced-9224-f28f72039ce7
  2. Enter your email  address
  3. RSVP by clicking YES
  4. Click on the play button.

We Hope to see you there