Installation guides Installation and configuration Allow/Denylists And Named Lists "Named Lists" is the feature for Education, Hotspot, Office, and Enterprise billing plans. This feature comes in handy when you need to add the same list of domains to the different policies (filtering profiles). You can create or edit one named list and then apply it to any of your filtering policies. Named lists also increase the limit for the allow and deny lists in accordance with your billing plan. You can manage lists of allowed or blocked hosts and domains for all of your profiles or group of profiles. Navigate to the "Allowlist" or "Denylist" tab to create a new named list. Find the "Create list" button and enter the name of the new list into the "List name" box on the right and click "Create list". It will appear at the bottom of the page. Click the Cogwheel button on the right, then click "Save" to add the newly created named list to the multiple policies (profiles). The same steps work for the Denylist section. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.General Setup via OpenVPN Some devices are not yet supported by the SafeDNS Agent or cannot have it installed for various reasons. In this case, you can configure the SafeDNS filtering via the third-party app OpenVPN. ⤵Download OpenVPN OpenVPN creates a VPN connection using the SafeDNS Configuration file that contains all settings of chosen filtering policy. OpenVPN does not change or hide your Public IP, as regular VPN services do, it only receives filtering rules from your dashboard. Multiple devices can use the same filtering policy, but each device should use its own Configuration file. Devices filtered via OpenVPN remain protected in any network. The installation process is the same for all platforms: you need to download the Configuration file, install OpenVPN, and import the Configuration file. Guides for the platforms supported by OpenVPN Windows Filtering Setup via OpenVPN Mac Filtering Setup via OpenVPN Linux Filtering Setup via OpenVPN iOS and Android Filtering Setup via OpenVPN Schedule Setup Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario. However, greater flexibility brings more complexity to the setup of a schedule. Schedule logic: selected custom Policy (profile) is applied at the selected time; Default policy is applied at all other times. This system allows a much more flexible schedule, that you can apply in advanced scenarios such as: Turning off the internet on schedule, with the filtered internet at the other time. This option is often used by parents to limit kids during school hours. Filtering of unproductive websites at the workplace, with unfiltered access during lunch break, and before and after the workday. This type of scheduling is suitable for use within organizations. Filtered internet in the hours when the computer is used by a child, with different filtering rules in the hours when the computer is used by adults. Schedule setup To set the schedule, you must create an additional Policy (profile) for which the schedule will be enabled. Log in to your SafeDNS Dashboard Go to Settings > Policy Enter the name of the policy (e.g. "Schedule"), and click "Create policy". After creating a policy, you can start setting up the schedule. Go to Settings > Schedule. Select the newly created policy "Schedule" from the dropdown menu on the left. Set the time at which the policy "Schedule" should be active. The rest of the time the Default policy will be active. The appearance and functionality of the Schedule depend on your service plan. Switch on the Schedule is enabled on the right. Click "Save". After setting the schedule, you need to apply it to your network or individual computers. If you use the SafeDNS Agent, you need to open Settings > Policy and set the "Schedule" policy as active. If you use an unattended installation of the Agent for computers in a corporate network, you will need to reinstall it with the scheduling policy as the main policy parameter. If your filtering is set up at the router/modem, proxy, or gateway, you need to bind your external  (public) IP address to the custom "Schedule" policy. Go to Settings > Devices Navigate to your IP address/DynDNS and click on the edit icon on the right. Change the Policy to the custom "Schedule" using the dropdown menu. Click on the green checkmark on the right to apply changes. After the settings are applied, the Schedule will be active. You can have multiple policies with different schedules for different users and networks, but note that the switch will always be between the current policy and the "Default" policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Possible problems with the schedule Scheduled settings switch at the wrong time Make sure that you have the correct time zone applied. In the Dashboard, click on the Cogwheel icon in the top right corner, select the correct time zone and click "Save changes". Please note that settings take 5-7 minutes to apply. Because of the cache of DNS queries at the system level and in the browser, your computer can not immediately respond to the newly applied settings. To eliminate this, we recommend disabling automatic control of the browser cache. The schedule is not working at all Make sure that you have followed all steps above. If everything is done correctly and the problem persists, please contact our technical support.Block Page Setup The block page is displayed when a user is trying to access a website blocked by the filtering rules. SafeDNS provides instruments to customize the block page. For example, you can add your logo and contact details on the block page, and an explanation why the website site is blocked. Creating custom block page To create a custom block page, do the following: Log in to SafeDNS Dashboard. Navigate to Settings > Advanced and scroll down to the block page section. Click "Add new". Enter the name of the new block page and choose its type from the dropdown menu. Click "Add". Block page types Standard block page - default SafeDNS block page. Personal block page - simple block page with the customizable image and description. HTML block page - block page with the HTML support.The following variables are supported: $website - shows the address of a blocked website. $domain - shows the domain part of the $website. $reason - shows the reason of the block, supports language prefix. $category - shows the filtering category(-ies) of the blocked $domain, supports language prefix. You can add a language prefix to translate the $reason and $category variables (e.g $fr:reason, $ar:category).List of available languages: sq (Albanian), ar (Arabic), es (Spanish), sv (Swedish), tr (Turkish), it (Italian), en (English), ur (Urdu), pt_BR (Brazilian Portuguese), fr (French), de (German). HTML blockpage example Website Blocked

You have been denied access to this website. For further info please contact YOUR@EMAIL.COM

$website $reason

If the categories are listed incorrectly, press the 'Report' button below.

Please change the "//YOUR.WEBSITE/YOUR-LOGO.PNG" and "YOUR@EMAIL.COM" in the lines 25, 27, and 33 accordingly. Hidden block page with the emulation of the website error - block page that imitates browser's website error. Empty DNS answer, as if the blocked website does not exist - block page that imitates NXDOMAIN browser error. The availability of a certain block page type depends on your billing plan. You can always edit the block page type by clicking on the pencil icon to the right. Applying custom block page To create a custom block page, do the following: Navigate to Settings > Policy. Click on the pencil icon to the right from the filtering policy. Select the custom block page from the dropdown menu. Click on the green check mark to save the changes. Please note that the SafeDNS TLS certificate should be installed on each end device where you want HTTPS pages to display correctly. Without the certificate, block page will be displayed for HTTP websites only. SafeDNS Root CA certificate installation guide.NAT DNS Setup This feature is not available for the Safe@Home plan. Network Address Translation or NAT is frequently used in corporate networks. It allows network owners and administrators to:• decrease the number of static IPs• secure local networks• prevent unwanted external access to the local hosts• hide the entire internal network structure NAT DNS is a SafeDNS service feature designed to apply different filtering policies to different networking hardware (routers, gateways, etc.) behind NAT with one public IP. Your networking hardware should be set up according to the SafeDNS instructions. NAT DNS setup Enter the Dashboard > Settings. Assign the Public IP of a NAT device to one of the existing filtering policies under the “IP addresses / DynDNS” section. (to use NAT DNS you must have 2 or more policies). Manually or via DHCP set up the target DNSes on the end devices (routers or gateways behind NAT).List of target DNS addresses: 195.46.39.101195.46.39.102195.46.39.103195.46.39.104195.46.39.105 In the Dashboard > Settings, scroll down to the bottom, and assign policies to the Target IPs (one IP = one policy). Click on the green checkmark to apply settings. After that, all devices behind NAT will be filtered by the chosen policy. You can view the stats for each Target IP by selecting its policy in the Stats tab. This feature works only for networks behind NAT. If you use a proxy server, the NAT DNS filtering option will not work, because in proxy server’s settings will be applied instead. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Top-level Domains Blocking If you want to block any top-level domain, just add it without a leading dot to your Denylist. For example, if you want to block access to all websites in the RU domain zone, add ru to your Denylist. Internationalized country code top-level domains should be added to the Denylist list in the IDN form: 中国 (Chinese IDN ccTLD), рф (Russian IDN ccTLD), etc. A full list of top-level domains can be found on the IANA website and Wikipedia. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.DSL/Wi-Fi routers Router Setup The first step is the same for both Static and Dynamic IP address configurations: change your router’s DNS servers to SafeDNS addresses - 195.46.39.39 and 195.46.39.40 Router with Static IP address configuration Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add". You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Router with Dynamic IP address configuration In case you have a Dynamic IP address, you need to configure the DynDNS/DDNS on the router using a Dynamic DNS service. Most modern routers provide their own DynDNS services. We recommend using them. Here's an example of the DynDNS menu on the TP-Link router with the TP-Link service provider: You only need to create a DynDNS record in the router interface. Then skip to Step 6 below. If your router does not have its own DynDNS service provider, we recommend using third-party NO-IP DynDNS. 1. In the router setting, go to DynDNS/DDNS settings, 2. Check the DynDNS service available for your router. If available, we recommend using the No IP DynDNS service provider. 3. Go to the website noip.com and sign up. 4. In your No-IP account, create a hostname (any name you can think of). 5. Go back to your router and configure DDNS/DynDNS. Select No-IP as "Service provider". Type in the created hostname in the "Hostname" field. Type in your No-IP account credentials as "Username" and "Password", and click "Save". If everything is correct, DynDNS/DDNS settings will apply. 6. Go to SafeDNS Dashboard > Settings > Devices and copy your DynDNS hostname to the "IP addresses / DynDNS" box, choose a policy, and click "Add". Once added, you will see it in the DynDNS section of the Dashboard. You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Configuring the filter using the DDclient. In rare cases when your router does not have a DynDNS/DDNS setting and your IP is Dynamic,  you need to use third-party software - DDclient - on the PC connected to the network: Set up DNS servers in your router: 2. Install DDclient on a PC connected to the network. Once DDclient is installed, all devices connected to the same network will be filtered by the same rules.Router Setup (IPv6) The first step is the same for both Static and Dynamic IP address configurations: change your router’s DNS servers to SafeDNS addresses - 2001:67c:2778::3939 and 2001:67c:2778::3940 Go to the router’s settings page, click the "Advanced" tab, and choose IPv6 in the left menu. Choose "IPv6 setup" and type in SafeDNS IPv6 addresses. Router with static IP address configuration Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add". We recommend to add the whole IPv6 router subnet - first 4 segments with /64 at the end. Example: 2600:1005:b062:61e4::/64 instead of 2600:1005:b062:61e4:1111:2222:3333:4444. You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Router with Dynamic IP address configuration In case you have a Dynamic IP address, you need to configure the DynDNS/DDNS on the router using a Dynamic DNS service. Most modern routers provide their own DynDNS services. We recommend using them. Here's an example of the DynDNS menu on the TP-Link router with the TP-Link service provider: You only need to create a DynDNS record in the router interface. Then skip to Step 6 below. If your router does not have its own DynDNS service provider, we recommend using third-party NO-IP DynDNS. 1. In the router setting, go to DynDNS/DDNS settings. 2. Check the DynDNS service available for your router. If available, we recommend using the No-IP DynDNS service provider. 3. Go to the website noip.com and sign up. 4. In your No-IP account, create a hostname (any name you can think of). 5. Choose the IPv6 type and create the hostname. Make sure that the "IPv6 Address" field is containing your IPv6 address: 6. Go back to your router and configure DDNS/DynDNS Select No-IP as "Service provider". Type in the created hostname in the "Hostname" field. Type in your No-IP account credentials as "Username" and "Password", and click "Save". 7. Go to SafeDNS Dashboard -> Settings -> Devices and copy your DynDNS hostname to the "IP addresses / DynDNS" box, choose a policy, and click "Add". Once added, you will see it in the DynDNS section of the Dashboard. You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Configuring the filter using the DDclient In rare cases when your router does not have a DynDNS/DDNS setting and your IP is Dynamic, you need to use third-party software - DDclient - on the PC connected to the network: 1. Set up DNS servers in your router: 2. Install DDclient on a PC connected to the network. Once DDclient is installed, all devices connected to the same network will be filtered by the same rules.Keenetic Router Setup SafeDNS service in Keenetic routers is implemented as an operating system component. You can add or remove this Internet Safety service from the system and turn it on or off completely, without affecting the parameters of the main Internet connection: SafeDNS will work behind any NAT and with a dynamic IP address. It is not possible to run SafeDNS, Cloudflare DNS, and AdGuard DNS services at the same time. Only one of them can be used. Before setting up the Internet safety service, register your home network devices according to the instruction Connected devices registration. Setup 1. Select "SafeDNS" in the 'Service' field on the "Internet safety" page. 2. Enter your SafeDNS account's parameters by clicking "Log in" in the "SafeDNS account" section. If you do not have a SafeDNS account yet, click "Create account". 3. Enter your SafeDNS account e-mail/login and password. 4. Assign filtering policies in the "Assignment of protection policies to devices" section. You can assign filtering policies to permanent home network devices (registered in Keenetic) and the default policy for all unregistered devices. Your devices connected to the Keenetic router are now filtered with the assigned SafeDNS filtering policies. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Unifi/Ubiquiti Router Setup How to set up SafeDNS on the Unifi – Ubiquiti environment.Start the Unifi Controller Application and wait for the load. Once it is loaded, start the browser.Open the Settings menu from the Dashboard: Browse the Networks menu and select the option either Create New Network or Edit. It depends on the requirements, if you are creating a new setup, there might be no networks created – then you need to create a new network. If you are starting to use SafeDNS on the existing network – then select the Edit option: The following configuration can be used as an example of your Local Network setup. Set the following DHCP Name Server addresses: 195.46.39.39 and 195.46.39.40 After adding SafeDNS Name Servers, Press the Save button and wait for the provisioning process of the Unifi access points – it may take a while. Router with Static IP address configuration Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add". You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Router with Dynamic IP address configuration In case you have a Dynamic IP address, you need to configure the DynDNS/DDNS on the router using a third-party Dynamic DNS service. 1. In the router setting, go to DynDNS/DDNS settings. 2. Check the DynDNS service available for your router. If available, we recommend using the No IP DynDNS service provider. 3. Go to the website noip.com and sign up. 4. In your No-IP account, create a hostname (any name you can think of). 5. Go back to your router and configure DDNS/DynDNS. Select No-IP as "Service provider". Type in the created hostname in the "Hostname" field. Type in your No-IP account credentials as "Username" and "Password", and click "Save". If everything is correct, DynDNS/DDNS settings will apply. 6. Go to SafeDNS Dashboard > Settings > Devices and copy your DynDNS hostname to the "IP addresses / DynDNS" box, choose a policy, and click "Add". Once added, you will see it in the DynDNS section of the Dashboard. You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Configuring the filter using the DDclient. In rare cases when your router does not have a DynDNS/DDNS setting and your IP is Dynamic,  you need to use third-party software - DDclient - on the PC connected to the network: 1. Set up DNS servers in your router: 2. Install DDclient on a PC connected to the network. Once DDclient is installed, all devices connected to the same network will be filtered by the same rules.Verizon Router Setup The first step is to locate the network configuration on your router and set the SafeDNS server- 195.46.39.39 and 195.46.39.40To do that, click on the icon My Network and browse the Network Connection option: My Network > Network Connections Locate in the connection list the Broadband Connection with the status: Connected: On the next screen locate the Settings button and press it: Change the DNS server option by selecting the “Use the Following DNS Server Addresses” Once the option is changed, the fields are activated where you can set the SafeDNS DNS servers: 195.46.39.39 and 195.46.39.40. Mikrotik Router Setup The first step is the same for both Static and Dynamic IP address configurations: change your router’s DNS servers to SafeDNS addresses - 195.46.39.39 and 195.46.39.40To do that, open the configuration page of the Mikrotik router, and browse the following option:Menu > IP >DHCP Server > Networks Select the “Network” used by the DHCP server and change/add the SafeDNS addresses - 195.46.39.39 and 195.46.39.40. Replace the DNS servers if there was configured any: Router with Static IP address configuration Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add". You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Router with Dynamic IP address configurationMikrotik Routers has the embedded feature of the Dynamic DNS setup named VPN Access.It can be activated easily from the router with no configuration needed on any DDNS service. Open the main page of the router – the Quick Set Menu and scroll down to the VPN setup: Activate the VPN access and set the VPN Password. Click the button Apply Configuration in order to save and activate the settings. Copy the VPN address to the clipboard. Go to SafeDNS Dashboard > Settings > Devices paste the VPN address the "IP addresses / DynDNS" box, choose a policy, and click "Add". Once added, you will see it in the DynDNS section of the Dashboard. You have successfully configured your router. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.OpenWRT Router Setup If you have static IP or use a DynDNS service you can set up SafeDNS on your OpenWRT router just like any other router using this guide. Only OpenWRT versions 17 or lower are supported. Setup DDNS client. Select in menu System > Software. 2. Click Update lists. 3. Type luci-app-ddns in Download and install package and click OK. 4. Click Status in the menu to refresh the menu. New item Services and subitem Dynamic DNS will appear in the menu. 5. Fill out the form on page Dynamic DNS: In Custom update-URL insert - https://[USERNAME]:[PASSWORD]@www.safedns.com/nic/update?hostname=[DOMAIN] In Hostname type any unique name for your router In Username type login for SafeDNS site, in Password type password for SafeDNS site. Click Save & Apply 6. Enable and start DDNS service. 7. Select in menu System > Startup 8. Click the Disabled button for ddns service, then click Start. 9. Check the string appearing in the system log (Status > System log): user.notice ddns-scripts-myddns: Update successful 10. Navigate to Network > Interfaces, WAN. 11. In Use custom DNS servers add 195.46.39.39 and 195.46.39.40. Click Save & Apply. After that, you can continue configuring your filtering options in the SafeDNS Dashboard. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.DD-WRT Router Setup If you have static IP or use a DynDNS service, you can set up SafeDNS on your DD-WRT router just like any other router using this guide. Alternatively, you can configure the SafeDNS filter on a DD-WRT router using its native firmware: 1. Go to the “Setup” tab > “Basic setup” > find the section “Network Address Server Settings” and set 195.46.39.39 and 195.46.39.40 as DNS servers. Select the "Forced DNS Redirection" to force all DNS requests from the network to use SafeDNS servers, even if the end device has custom DNS servers. 2. In the "WAN Setup" section check the "Ignore WAN DNS" option. 3. Go to the DDNS tab.4. Select Custom for DDNS Service type.5. Type in www.safedns.com in the DYNDNS Server field.6. Type in your login (email) from the SafeDNS account in the User Name field.7. Type in your password in the Password field.8. Type in any name (hostname) in the Host field.9. Type in /nic/update?hostname= in the URL field.10. Save and apply settings. If all settings are correct, you will see the successful update of your address in the DDNS Status block. After that, you can continue configuring your filtering options in the SafeDNS Dashboard. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Huawei iMaster NCE Campus Setup Prerequisites Sign up for a Reseller account by contacting the SafeDNS Sales team (sales@safedns.com). Create a sub-account for each tenant or group of tenants, implementing the multi-tenant capability of SafeDNS. Configure the filtering rules for each tenant. Receive the public Subscription API key from the SafeDNS manager.To read more about API methods, please check the Subscription API documentation. Setup Connect a SafeDNS account to iMaster NCE controller Navigate to System > System Settings > Third-Party Service > DNS Interconnection Parameters. Fill information in the following fields: DNS IP-Address Main: 195.46.39.39 DNS IP-Address Secondary: 195.46.39.40 Account: sub-account to connect to SafeDNS Public key: public Subscription API key Activate URL-Filtering Select a site in iMaster NCE controller, on which you want to use URL Filtering Navigate to Provision > Physical Network > Site Configuration. Select a site from the site drop-down list in the upper left corner. Navigate to the Site Configuration tab. Navigate to AP > Advanced. Enable DHCP. Set DHCP server parameters. Enable Third-party URL Filtering. (Optional) Update TLS certificate A SafeDNS certificate is used for unidirectional authentication between iMaster NCE-Campus and a third-party SafeDNS server.This operation is involved in URL filtering by SafeDNS. By default, the SafeDNS certificate is preinstalled on iMaster NCE-Campus. Contact SafeDNS if you need an updated certificate. Log in to iMaster NCE Campus as the system administrator. Navigate to System > System Management > Certificate Management. Select Service Certificate Management Select CampusCfgService_SafeDNS. Click on the Trust Certificate tab. Click Import. Set Certificate Format to DER. Select the certificate file and click Submit. Wait for 2 minutes. Restart the CampusCfgService service for the certificate to apply: Log in to the management panel. Navigate to Product > System Monitoring > Service tab. Search for CampusCfgService. Select the service. Click Stop. Click Start. Log in to the iMaster NCE Campus and check whether the certificate file is successfully uploaded to the following path: /opt/oss/NCECAMPUS/apps/CampusCfgService/controller/configuration/safedns Multi-policy filtering on OpenWRT OpenWRT Filtering Module Setup The SafeDNS module for OpenWRT routers allows setting up the filtering on any router that supports OpenWRT firmware. Every end device on the network can be assigned with individual filtering settings. Only OpenWRT version 21, and versions 17 or lower are supported. If you are installing version 21, make sure to read the Uninstallation notes at the bottom OpenWRT versions 17 and lower OpenWRT versions 17 and lower To make sure that your router has OpenWRT firmware, check the list of compatible OpenWRT routers. 1. Log in to the web interface of the router as administrator. 2. Go to System > Software 3. Choose the Configuration tab 4. Comment or remove the line option check_signature 1 to disable packet signature verification. 5. Add line src/gz safedns http://mirror.safedns.com/openwrt/17/ar71xx/generic/packages to the field "Custom feeds", as shown in the screenshot, where "ar71xx" – is your router architecture type. If you have another architecture please change it to the correct one: 6. Go to the Actions tab and click "Update lists" Wait for the update process to finish. 7. Find the "safedns" package in the filter and click "install" 8. Refresh the page after this. 9. Go to Services > SafeDNS 10. Enter your SafeDNS credentials and log in to get the list of available filtering policies. In the "Default profile" field choose the filtering policy which will be applied as a default for all of your devices connected to the router. 11. You can also set a specific filtering policy for any device. To do this, click Add, choose the device, and select the filtering policy. Save the settings. After that, you can continue configuring your filtering options in the SafeDNS Dashboard. OpenWRT version 21 1. Log in to the web interface of the router as administrator. 2. Go to System > Software 3. Press the Configure opkg... button 4. Comment or remove the line option check_signature 1 to disable packet signature verification. 5. Add line src/gz safedns http://mirror.safedns.com/openwrt/21/YOUR_ROUTER_ARCHITECTURE/custom to the field "Custom feeds", as shown in the screenshot, where "YOUR_ROUTER_ARCHITECTURE" – is your router architecture type. If you have another architecture please change it to the correct one: 6. Go to the previous menu and press "Update lists" Wait for the update process to finish. 7. Find the "luci-compat" package in the filter and click "install" 8. Find the "luci-app-safedns" package in the filter and click "install" Refresh the page. 9. Go to Services > SafeDNS 10. Enter your SafeDNS credentials and log in to get the list of available filtering policies. In the "Default profile" field choose the filtering policy which will be applied as a default for all of your devices connected to the router. 11. You can also set a specific filtering policy for any device. To do this, click Add, choose the device, and select the filtering policy. Save the settings. After that, you can continue configuring your filtering options in the SafeDNS Dashboard. Version 21 uninstallation notes This version of the module contains a bug, that doesn't set the DNS server port to the default value. You need to do it manually, otherwise, the Internet connection will not work. 1. Navigate to Network > DHCP and DNS > Advanced settings. 2. Scroll down to the DNS server port field and delete the "0". Leave the field empty and press the "Save & Apply" button. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Compatible OpenWRT Routers Brand Model Version 3Com 3CRWER100-75 4G Systems AccessCube (MeshCube) 7Links PX-4885 8devices Carambola 2 8devices Carambola 1 A-Link RRAP ADI Engineering Pronghorn SBC250 ALFA Network AP120c ALFA Network Hornet-UB / AP121 / AP121U ALFA Network AP121 ALFA Network N2 ALFA Network N5 ALFA Network W502U / R36 ALFA Network AP96 ARC Flex FreeStation 5 v1 Abicom International Freedom CPE Rev 05 Abicom International Scorpion450 Rev 02 Accton WR6202 Accton MR320 1A Actiontec GT701 C, D Actiontec GT704WG 1A Actiontec MI424WR A Actiontec MI424WR C Actiontec MI424WR D Actiontec GT784WNV 5A Agestar NSB3AS Airlink 101AR670W Airlink 101AR725W Airlink 101AR430W Alcatel-Sbell RG100A-AA Rev 0 Allnet ALL0258N Allnet ALL0305 Allnet ALL0256N Allnet ALL0239-3G Allnet ALL5003 Allnet ALL0277 Allnet ALL0258 Allnet ALL5002 Allnet ALL0315N Alpha Networks ASL-26555 Arcadyan / Astoria ARV452CPW Arcadyan / Astoria ARV752DPW22 EasyBox 803A Arcadyan / Astoria ARV4518PWR 1 Arcadyan / Astoria ARV4518PW R01A Arcadyan / Astoria ARV4525PW Arcadyan / Astoria ARV7510PW22 Arcadyan / Astoria ARV7518PW Arcadyan / Astoria ARV7519RW22 Livebox 2.1 Arcadyan / Astoria VGV7510KW22 o2 Box 6431 Arcadyan / Astoria ARV7510PW Arduino.cc Yun Arduino.cc Tian Asia RFAWM003 Asia RFAWM002 Asmax AR 1004g 1 Asus RT-N12 B1 Asus RT-N13U 1 Asus RT-N15U Asus RT-N16 Asus RT-N56U v1 Asus RT-N66U B1, B2 Asus WL-320gP Asus WL-500g Premium v1 Asus WL-500g Premium v2 Asus WL-550gE Asus RT-N10 1 Asus RT-N13U B1 1 Asus RT-N15 Asus RT-G32 B1 Asus RT-G32 C1 Asus WL-HDD2.5 Asus RT-N10+ 1 Asus RT-N12 D1 Asus WL-500b v1 Asus RT-N14U 1 Asus WL-330gE Asus WL-520gU Asus WL-600g Asus WL-500W Asus WL-500g Deluxe Asus WL-500g Asus RT-N10+D1 1 Asus WL-320gE Atmel ATNGW100 Aztech HW550-3G BT Home Hub 5 Type A BT Home Hub 2 Type A BT Home Hub 2 Type B Barix Barionet 1000 1 Belkin F7C027 Belkin F9K1115 v2 (AC 1750 DB) v2 Belkin F5D8235-4 v2 Belkin F5D8235-4 v1 Buffalo WZR-300HP A0A3, B0A0, B0A1 Buffalo WBMR-HP-G300H Buffalo WHR-G300N v2 Buffalo WHR-HP-GN v1 Buffalo WLAE-AG300N v1 Buffalo WLI-TX4-AG300N v1 Buffalo WZR-HP-AG300H v1 Buffalo WZR-HP-G300NH v1 Buffalo WZR-HP-G300NH2 A0A0, A0A1, A1A0, C1A0 Buffalo WZR-1750DHP(D) Buffalo WZR-600DHP2 Buffalo WZR-600DHP Buffalo WHR-G301N v1 Buffalo WBMR-G54 Buffalo WLI-TX4-G54HP Buffalo WZR-HP-G450H v1 Buffalo WHR-HP-G300N v1 Buffalo WHR-HP-G54 Buffalo WHR-G54S v1, v2 Buffalo WHR-G125 Buffalo WMR-300 COMFAST CF-E316N v2 COMFAST CF-WR800N v1 Cisco VEN401 Cobalt Networks Qube 2 Cobalt Networks Raq 2 Compex WP54 6E Compex WP54g 6E Compex WP543 6.00E+03 Compex WPJ558 6A06 Compex WPJ344 6A06 Compex WPJ531 7A03 Compex WPE72NX 7A07 Compex WPJ72Z 7B06 Compex WP546HV 6B08 Compex WP543AHV 6.00E+03 Compex MMC543HV 6.00E+03 Compex MMC543AHV 6.00E+03 Compex WPJ342 7A05 Compex WPE727A07 Comtrend CT-5621 Comtrend VR-3025un Comtrend AR-5387un Comtrend HG-536+ Comtrend CT-5361 Comtrend CT-536+ Comtrend CT-6373 Comtrend AR-5381u Comtrend VR-3025u Comtrend WAP-5813n Comtrend CT-5365 Creator Ci40 (Marduk) 02KZ/5+ D-Link DSL-524T A1 (EU) D-Link DSL-584T A1 (EU) D-Link DSL-2650U/BRU/D D1, D2 (RU) D-Link DSL-2740B/1B C2 D-Link DSL-2740B/1B C3 D-Link DSL-G684T A1 (EU) D-Link DVA-G3810BN/TL A1 D-Link DIR-615 H1 D-Link DAP-1350 A1 D-Link DIR-300 A1 D-Link DIR-505 A1, A2 D-Link DSL-2750B D1 D-Link DIR-615 I3 D-Link DIR-615 I1 D-Link DIR-615 C1, C2 D-Link DSL-2740B/1B F1 D-Link DIR-320 B1 D-Link DIR-615 D1 D-Link DSL-G624T A1 (EU) D-Link DIR-300 B1, B2, B3 D-Link DIR-300 B5, B6, B7 D-Link DIR-601 A1 D-Link DIR-835 A1 D-Link DCS-930L/DCS-932L B1 D-Link DGL-5500 rev A1 D-Link DIR-601 B1 D-Link DIR-615 E2, E3 D-Link DIR-320 A1 D-Link DIR-860L B1 D-Link DIR-600 A1 D-Link DIR-600 B1 D-Link DIR-600 B2 D-Link DIR-615 D3, D4 D-Link DWL-2100AP A2 D-Link DIR-615 E1 D-Link DIR-885L A1 D-Link DIR-810L B1 D-Link DIR-645 A1 D-Link DIR-825 B1, B2 D-Link DIR-825 C1 D-Link DIR-615 E4 D-Link DNS-120 A2 D-Link DSL-2640U B2 D-Link DIR-620 D1 D-Link DSL-504T C3 D-Link DIR-620 A1 D-Link DSL-2740U C2 D-Link DIR-320 A2 D-Link 2750B T1 D-Link DIR-600 B5E D-Link DSL-2640B B2 Davolink DV-201AMR Devolo dlan pro wireless 500 plus Devolo dLAN pro 1200+ WiFi ac Dovado Tiny AC Dragino MS12 EasyLink M-150 EasyLink M-mini Edimax BR-6104K / BR-6104KP A Edimax BR-6475nD A Edimax PS-1208MFg Embedded Wireless Dorin Platform Rev 1.2 EnGenius ESR6650 EnGenius ECB1750 v1 EnGenius ESR1750 v1.1.0 EnGenius ESR-9753 EnGenius EPG5000 v1.0.0 Evaluation boards / unbranded boards A5-V11 Evaluation boards / unbranded boards XDX-RN502J Evaluation boards / unbranded boards Atheros PB44 Fon Fonera+ FON2201 Fon Fonera 2.0n FON2303A Fon Fonera 2.0g FON2202 Fon La Fonera FON2100, FON2200 Freecom FSG-3 GL.iNet AR300 v3 GL.iNet AR150 GL.iNet 6408A v1.0 GL.iNet GL-MT750 GL.iNet GL-MT300A v1.3 GL.iNet GL-MT300N V1 GL.iNet 6416A v1.0 GL.iNet GL-M9331 Core (Domino Core) Gainstrong MiniBox v1.0 Gainstrong Oolite v1.0 Gateway 7001 a+g Gateway 7001 g Gateway Micro Server QXXXX Gateworks Avila GW2342 Gateworks Avila GW2348-2 Gateworks Avila GW2348-4 Gateworks Avila GW2355 Gateworks Avila GW2357 Gateworks Cambria GW2350 Gateworks Cambria GW2358-4 Gateworks Laguna GW2380 Gateworks Laguna GW2382 Gateworks Laguna GW2387 Gateworks Laguna GW2388 Gateworks Laguna GW2391 Gateworks Ventana GW5100 Gateworks Ventana GW5200 Gateworks Ventana GW5220 Gateworks Ventana GW5300 Gateworks Ventana GW5310 Gateworks Ventana GW5400 Gateworks Ventana GW5410 Gateworks Ventana GW5510 Gateworks Ventana GW5520 Gateworks Avila GW2347 HAME MPR-A2 v1 HAME MPR-A1 Hi-Link HLK-RM04 v1 Hi-Link HLK-RM04 v2 HiWiFi HC6361 HiWiFi/Gee HC5861 HiWiFi/Gee HC5761 HiWiFi/Gee HC5661 HooToo HT-TM02 (TripMate Nano) v1.5 HooToo HT-TM01 (TripMate) HooToo HT-TM04 (TripMate Elite) Huawei HG622 Huawei HG655d Huawei HG520v Huawei HG553 Huawei HG556a A, B Huawei HG556a C Huawei HG655b Intellidesign Hyrax PCP-100 A Iomega iConnect JCG JHR-N825R JCG JHR-N805R JCG JHR-N926R Kingston MLW221 Kingston MLWG2 Lemaker Banana Pro Lenovo Y1 v1 Lenovo Y1S v1 Linksprite pcDuino V3 Linksys E1000 2.0, 2.1 Linksys EA3500 Linksys EA6300 v1 Linksys WAG354G Linksys WAG354G v2 Linksys WRT54GS 1.0, 1.1, 2.0 Linksys WRT320N v1 Linksys WRT400N 1 Linksys WRT600N 1.1 Linksys WRT1900AC v2 (cobra) Linksys WRTU54G-TM Linksys AG241 v1 Linksys AG241 v2 Linksys AG241 v2b Linksys E3000 1 Linksys E3200 1 Linksys WRT160NL 1.0 (CUR01), 1.6 (CUR06) Linksys WRT1200AC v1 (caiman), v2 (caiman) Linksys WRT1900AC v1 (mamba) Linksys E1700 Linksys E1000 1 Linksys E2000 1 Linksys E4200 1 Linksys E4200 v2 Linksys E900 1 Linksys EA4500 v1 Linksys NSLU2 Linksys WAG54G v1.1 Linksys WRT150N v1 Linksys WRT310N v2 Linksys WRT350N v2 2.0, 2.1 Linksys WRT54G 2.0, 2.2, 3.0 Linksys WRT54G-TM 1 Linksys WRT54G3GV2(-VF) 1 Linksys WRT54G 1 Linksys WRT54G 1.1 Linksys WRT610N 2 Linksys WRT610N v1.0 Linksys WRT54G 3.1 Linksys WAG54G v2 Linksys WAG54G v3 Linksys E1200 v2 Linksys WRTSL54GS 1.0, 1.1 Linksys WRT54G 4 Linksys WRT54GL 1.0, 1.1 Linksys WRT54GS 3 Linksys WRT1900ACS v1 (shelby), v2 (shelby) Linksys E2500 v1 MQMakerWiTi Board v2.0 MeLE M9 MediaTek LinkIt Smart 7688 Medion MD86587 v1 Meraki Z1 Meraki Mini Meraki MR16 Meraki MR12 Meraki MR24 Meraki MX60 Meraki MX60W Mercury MW4530R v1 Mercury MW150R v8 MikroTik RB951G-2HnD MikroTik RB750GL MikroTik RB750UP MikroTik RB493G MikroTik RB450G MikroTik RB435G MikroTik RB450 MikroTik RB532 MikroTik RB411 MikroTik RB411AH MikroTik RB411U MikroTik RB433 MikroTik RB433AH MikroTik RB493 MikroTik RB532A MikroTik RB951Ui-2HnD MikroTik RB433UAH MikroTik RB411UAHR MikroTik RB750Gr3 Multilaser RE027 v1 NetComm NB6 RTA1320 Rev1 NetComm NB6PLUS4W Rev1 Netgear DG834G v3 Netgear DG834G v4 Netgear DG834GT Netgear DGN3500 Netgear DGN3500B Netgear DGND3700 v1 Netgear EX2700 Netgear R6100 Netgear R7000 Netgear R7500 Netgear WAG302 v1 Netgear WG302 v1 Netgear WG302 v2 Netgear WNDAP360 1 Netgear WNDR3400 v1 Netgear WNDR3400 v2 Netgear WNDR3700 v3 Netgear WNR854T Netgear WNR2200 v3 Netgear WNR3500L v1 Netgear WPN824N Netgear R6250 Netgear R8000 Netgear D7800 Netgear DG834G v1, v2 Netgear DGND3800B Netgear R6300 v2 Netgear WNDR3300 v1 Netgear WNDR37AV v1 Netgear WNCE2001 Netgear WNDR3400 v3 Netgear WNDR3700 v4 Netgear WNDR4000 Netgear WNDR4300 v1 Netgear WNR834B v2 Netgear WNR1000 v3 Netgear WNR2000 v1 Netgear WNR2000 v3 Netgear WNR2000 v4 Netgear WNDR3700 v2 Netgear DGN2200 v1 Netgear WGT634U Netgear WNR2000 v2 Netgear WNDR3800 v1 Netgear WNR612 v2 Netgear WNDR3700 v1 Netgear WAG302 v2 Netgear WNR1000 v2 Netgear WPN824N NA Netgear R7900 Netgear WNDR3800 1CHNAS Netgear DM200 v1 Netis WF-2881 Netis M1200AC Nexx WT1520 Nexx WT3020A Nexx WT3020AD Nexx WT3020F Nexx WT3020H NuCom R5010UN v2 OMYlink OMY-G1 OlimexOlimex A20-OLinuXino-MICRO Olimex iMX233-OLinuXino-MINI-WiFi Olimex iMX233-OLinuXino-MINI Olimex iMX233-OLinuXino-NANO Olimex iMX233-OLinuXino-MICRO Olimex iMX233-OLinuXino-MAXI Olimex Olimex A13-OLinuXino-WIFI Olimex Olimex A10-OLinuXino-LIME Olimex RT5350F-OLinuXino-EVB Rev. A Olimex A20-OLinuXino-LIME On Networks N150R Open-Mesh MR900 v1 Open-Mesh OM2P OpenEmbed SOM9331 v1 Option Globesurfer III PC Engines ALIX 2d2 PC Engines ALIX 2d5 PC Engines ALIX 2d13 PC Engines ALIX 3d1 PC Engines ALIX 3d2 PC Engines ALIX 3d3 PC Engines ALIX 6f2 PC Engines WRAP PC Engines ALIX 1c PC Engines ALIX 1d PC Engines ALIX 2d0 PC Engines ALIX 2d1 PC Engines ALIX 2d3 PC Engines ALIX 2d4 Pacific Networks RT150M v1 Petatel PSR-680W Pirelli AliceGate AGPF Pirelli FastWeb DRG A226M Planex MZK-W300NH Planex MZK-W04NU Planex DB-WRT01 Pogoplug Pogoplug V2 POGO-E02 Pogoplug Pogoplug Mobile POGO-V4-A1-01 Pogoplug Pogoplug V4 POGO-V4-A3-01 Poray Poray PRP-X5/X6 QEMU (i386) qemu-system-i386 0.12.5 QEMU (malta) qemu-system-mips(el) 0.12.5 QEMU (realview) qemu-system-arm 0.12.5 QEMU (x86_64) qemu-system-x86_64 >2.0 Qi hardware Ben.Nanonote Qihoo hardware C301 Raspberry Pi Foundation Raspberry Pi B+ Raspberry Pi Foundation Raspberry Pi A Raspberry Pi Foundation Raspberry Pi B Raspberry Pi Foundation Raspberry Pi 2 B RavPower RP-WD02 Redwave RW2458N / AeroMAX 5 Rosewill RNX-N150RT Rosewill RNX-N300RT Rosewill RNX-N360RT SFR (Société Française de Radiotéléphonie) Neufbox4 (NB4) SFR (Société Française de Radiotéléphonie) Neufbox6 (NB6) SMC SMCWBR11S-3GN SMC SMC7908ISP-A STORYLiNK SAP-G3200U3 Sagem F@ST2604 Sagem F@ST2704 V2 Sagem F@ST2404 Sagem F@ST2504n v.6 Seagate DockStar Seagate NasRaq Sercomm IP1006RR v2 SimpleTech SimpleShare Sitecom WL-341 v3 001 Sitecom WL-351 v1 002 Skyline SL-R7205 SolidRun ClearFog Prov 2.1 Sparklan WCR-150GN Synopsys AXS101 Software Development Platform 1.1 Synopsys AXS103 Software Development Platform 1.1 T-Com / Telekom Speedport W 303V Typ B T-Com / Telekom Speedport W 701V T-Com / Telekom Speedport W 500V TP-Link TL-WDR4900 2.0 (CN) TP-Link TL-WDR3320 2 TP-Link TL-CPE210 v1 TP-Link TL-WA801ND v2 TP-Link TL-WA830RE v1 TP-Link TL-WA830RE v2 TP-Link TL-WA850RE v1 TP-Link TL-WA860RE v1 (EU) TP-Link TL-WR703N v1 TP-Link TL-MR10U v1 TP-Link TL-MR12U 1 TP-Link TL-WR710N 1.1 (EU) TP-Link TL-MR3220 V2 TP-Link TL-MR11U 1 TP-Link TL-MR13U 1 TP-Link TL-WR740N v4.20, v4.21, v4.22, v4.25, v4.26, v4.27, v4.28 TP-Link TL-WR743ND 2 TP-Link TL-WR941ND v5 TP-Link TL-WR1041N v2 TP-Link TL-WR1043ND v3.x TP-Link TL-MR3420 v1, v1.1, v1.2, v1.3 TP-Link TL-WR841N(D) v10 TP-Link TL-WR841N(D) 5 TP-Link TL-WR720N v4 (CN) TP-Link TL-WR841N(D )7 TP-Link TL-WR841N(D) 8 TP-Link TL-WR841N(D) 9 TP-Link TL-WR841N(D) 1, 1.5 TP-Link TL-WA901ND v1 TP-Link TL-WA901ND v2 TP-Link TL-WA901ND v3 TP-Link TL-WA750RE v1 TP-Link TL-WDR3500 1 TP-Link Archer C50 v1 TP-Link TL-WR743ND 1, 1.1 TP-Link TL-MR3220 1 TP-Link TL-WA701ND v1-v1.1 TP-Link TL-MR3020 v1 TP-Link TD-W8970 v1, v1.2 TP-Link TL-WR720N v3 (CN)14.07tl-wr720n TP-Link TL-WR710N 2.0 (EU) TP-Link TL-WA701ND 2 TP-Link TL-MR3040 v1 TP-Link TL-CPE510 v1 TP-Link TL-WR710N 1.2 (EU) TP-Link TL-WR710N 2.1 (EU) TP-Link TL-WR1043ND v1.x TP-Link TL-WR1041ND v2 TP-Link TD-W8960N v1 TP-Link TL-WR940N 1 TP-Link TL-WDR4300 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7 TP-Link TL-WDR4900 1.0, 1.3 TP-Link TL-MR3040 v2 TP-Link TL-WDR4310 1 TP-Link TL-WDR6500 v2 TP-Link TL-MR3420 v2, v2.1, v2.2, v2.3, v2.4 TP-Link TL-WR941ND v6 TP-Link TL-WR740N v5 (EU) TP-Link TL-WR841N(D) 3 TP-Link TL-WA730RE v1 TP-Link TL-WR741ND 1, 1.8 TP-Link TL-WR741ND v5 TP-Link TL-WR1043ND v2.x TP-Link TL-WA5210G v1 TP-Link TL-WA7510N v1 TP-Link TL-WR2543ND v1.0 TP-Link TL-WR841N(D) v11 TP-Link TL-WR741ND v4.x TP-Link TL-WR740N v6 TP-Link TL-WR810N 1.1 (EU) TP-Link TL-WR810N 1.0 (US) TP-Link TD-W8968 v3 TP-Link Archer C7R WDR7500 3.0 (CN) TP-Link TL-WR710N 1.0 (US) TP-Link TL-WR740N v4.23, v4.24 TP-Link TL-WR740N 1 TP-Link TL-WR740N v3 TP-Link TL-WR842ND v2 TP-Link TL-WR842ND v1 TP-Link TL-WR941ND v3.2 TP-Link TL-WR941ND v2 TP-Link TL-WR941ND v3 TP-Link TL-WR941ND v4 TP-Link Archer C20i AC750 v1 TP-Link Archer C5 AC1200 1.2 TP-Link Archer C7 AC1750 1.0, 1.1 TP-Link Archer C7 AC1750 2 TP-Link TL-WR740N 2.1(BR) TP-Link TL-WDR3600 1.1, 1.2, 1.3, 1.4, 1.5 TP-Link Archer C20 v1 Telsey Alice W-Gate Telsey CPVA502+ Telsey CPVA502+W Telsey CPA-ZNTE60T Teltonika RUT5XX Teltonika RUT500 Tenda W306R v2.0 Trendnet TEW-712BR 1 Trendnet TEW-691GR 1.0R Trendnet TEW-673GRU 1.0R Trendnet TEW-823DRU v1.0R Trendnet TEW-692GR 1.0R Trendnet TEW-732BR 1.0R Trendnet TEW-652BRP 1.0R, 1.1R Trendnet TEW-632BRP 1.0R, 1.1R Turris CZ.NIC Turris Omnia US Robotics USR9108 A Ubiquiti AirGrid M5 Ubiquiti AirRouter Ubiquiti Bullet M Ubiquiti EdgeRouter Lite Ubiquiti LiteStation 2 Ubiquiti NanoStation 5 Ubiquiti NanoStation Loco5 Ubiquiti NanoStation Loco M2 Ubiquiti PicoStation 2 Ubiquiti RouterStation Ubiquiti RouterStation Pro Ubiquiti UniFi APi Ubiquiti NanoStation Loco2 Ubiquiti NanoStation M5 xw Ubiquiti NanoStation M5 xm Ubiquiti AirGateway Ubiquiti AirGrid M2 Ubiquiti PicoStation 5 Ubiquiti LiteStation 5 Ubiquiti NanoStation M2 Ubiquiti NanoStation 2 Ubiquiti PicoStation M2HP Upvel UR-336UN VMware VMware x86 virtual machine 2015 latest WIZnet WizFi630A WRTnode WRTnode 1 Wallys DR344-NAS27 Western Digital My Net Wi-Fi Range Extender Western Digital My Net N600 Western Digital My Net N750 Widemac SL-R7205 Xiaomi MiWiFi Mini R1CM Xiaomi MiWiFi Nano ZBT WR8305RT ZBT WA-05 ZBT WG3526 ZBT WE526 (WE1626) ZBT WG2626 3 ZLMnet F8 v1.3 ZTE ZXDSL 531B(II) ZTE ZXHN H108N v1 Zcomax ZCN-1523H-2-8 H/W:0.4 Zcomax ZCN-1523H-5-16 H/W:0.2 ZyXEL NBG-419N 1 ZyXEL NBG6616 A00 ZyXEL P-2812HNU-F1 ZyXEL WAP3205 v11 ZyXEL NBG6716 A01 ZyXEL P-2812HNU-F3 ZyXEL P-870HW-51a v2 ZyXEL Keenetic v1 ZyXEL NSA310 1b jjPlus JA76PF2 unbranded VoCore v1.0 Windows OS SafeDNS Agent for Windows Setup Video tutorial #1: SafeDNS Agent Installation Video tutorial #2: SafeDNS Agent Settings and Features What is Agent created for The Agent software is designed to automatically launch and manage the SafeDNS web filtering service on Windows-based computers. The Agent should be installed on the PC when you have a private (local) or a dynamic public address, or you want to have a separate web filtering policy for each Windows-based computer within your network. Attention! If you want to configure the SafeDNS web filtering service for the entire network, you can find information about the available settings in the Instructions section of our website. Agent Installation Log into your SafeDNS account using your email/login and password.If you have already downloaded the Agent, skip to Step 3. Navigate to Help > Tools and click on the "Download Agent" button under "Agent for Windows". Make sure your current Windows user account has Administrator rights. Run the SafeDNS-Agent-Setup.exe file and install the Agent on your computer following the program prompts.If you see a Windows SmartScreen alert, click More options > Run anyway to start the installation. After the successful installation, the Agent will be launched automatically. Agent Unattended Installation You can install the Agent in an unattended automatic way. This allows you to automatically install and launch the service, manage the filtering policies and collect web traffic statistics on several individual computers within your network. Learn how to install the Agent in unattended mode. Getting Started with Agent Log in to the Agent using your SafeDNS email/login and password.If you forgot your password, click "Forgot my password". After successful login, the Home page of the program will be shown.This page contains: Current status of the filtering service in the center. Active filtering policy at the top. On/Off filtering slider button at the bottom. You can temporarily shut down the filtering by clicking on the slider button at the bottom of the window. You will be asked for a password if the settings are password protected. Content Filtering Settings To set up your filtering rules go to the Content filtering settings section. Please note that settings take 5-7 minutes to apply.In some cases, you will need to clear the cache of your browser. If you have more than one filtering policy, you can select the needed one at the top of the window (paid plans only). Click on the Plus button to proceed to the Policy section where you can create a new policy. In the Categories tab, you can see a full list of content categories of your current filtering policy. In this tab, you can block or allow any of them. The red cross indicates blocked categories and the green checkmark indicates allowed categories. You can also block or allow an entire group of categories by clicking on the group name. The gray cross near a group name means that some categories are blocked and some of them are allowed. In the Exceptions tab, you can create Allow/Denylists for individual websites (domains). Domains in Denylist will always be blocked even if the category of these domains is allowed. Domains in Allowlist will always be accessible even if the category of these domains is blocked.To block a group of subdomains, add the main domain (e.g. google.com) to the Denylist and all subdomains on this domain will be blocked (drive.google.com, translate.google.com, photos.google.com, etc). You can also create Named Allow/Denylists and apply them to one or several different policies (this option is available in Dashboard only). Learn more about how to create named lists. For the correct performance of your Internet Service Provider’s local resources such as media archives, online TV services, or your company’s local resources such as file share servers, printers, etc., add a local domain and IP address of this domain in the Aliases tab. You can manage additional settings such as Force Safe Search, Force Restricted Mode for YouTube, and Use the Allowlist only in the Additional settings tab. All domains which are not added to the Allowlist will be blocked when Use the Allow List only option is active. Creating Additional Filtering Policies The Default filtering policy cannot be deleted.You can also create additional policies (paid plans only) and use them to apply different filtering policies for: a different user accounts on the same PC, different PCs with the SafeDNS Agent installed. To create a new filtering policy follow these steps:1. Go to the Policy Section on the Settings page. 2. Type the name of the new policy in the Create policy field. After that, click the Plus button on the right to create a policy. Now you can change settings for a new filtering policy in Settings > Content filtering. You can use the Cogwheel icon near the policy’s name, to open the Content filtering settings of this policy. To delete a policy, press the Cross icon near the policy’s name. You can set up one of your policies as active in the Active policies dropdown menu. Binding Local Users to the Filtering Policies If you have several filtering policies, you can bind local users on your PC to these policies. The selected policy will be applied to the selected Windows user after they log into the system. To bind a user to a filtering policy, go to the Local user tab in the Policy section. Check the Bind local users to the policies box to activate binding. Choose the necessary Windows user in the User dropdown menu. Then select the preferred policy from the Policy dropdown menu and press the Plus icon. To unbind a Windows user from a policy, press the Cross icon near the user’s name. To turn off local users’ binding, uncheck the Bind, local users, to the policies box. Filtering Schedule Additional policies can be used for a filtering Schedule. It allows you to apply different settings or limit web access at certain time periods in a single day. Schedule configuration is available in the Dashboard on the SafeDNS website only. Learn how to set up a filtering schedule. Password Protection Actions such as changing settings, Agent uninstall, filtering suspension, and policy changing, are by default protected by your password. Password protection can be deactivated in Settings > Common settings. To turn off password protection, uncheck Protect settings with the password box. We recommend it only if you're the sole user of your computer. You can also manage additional settings, such as show agent icon in the system tray, and Automatically check for updates. Agent's Tray Icon Options You can use Agent’s tray icon to stop filtering or change the active policy.Right-click on it and choose the necessary action. You can temporarily switch the filtering off for 10 minutes, 30 minutes, 1 hour, and until start or reboot. You can also change the active filtering policy from the tray icon. If your settings are password-protected, you will be asked to enter the password. To hide Agent's icon in the system tray uncheck the Show Agent icon in the system tray box in Settings > Common settings. If You Have Issues If you have issues with the SafeDNS service or the Agent, feel free to contact our technical support. You can find our contacts on the Help page in the Agent. The Get support button will redirect you to the support form on the SafeDNS website. The Check for updates button allows you to automatically download the most recent version of the SafeDNS Agent. If SafeDNS Support asks you to send a system report, you can get it in the Agent. To get the report click the System information button on the Help page. This operation can take a few minutes. After that, copy the report and send it to the Support team via the feedback form. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.SafeDNS Agent for Windows Setup (beta) What is Agent created for The Agent software is designed to automatically launch and manage the SafeDNS web filtering service on Windows-based computers. The Agent should be installed on the PC when you have a private (local) or a dynamic public address, or you want to have a separate web filtering policy for each Windows-based computer within your network. Attention! If you want to configure the SafeDNS web filtering service for the entire network, you can find information about the available settings in the Instructions section of our website. Agent Installation Log into your SafeDNS account using your email/login and password.If you have already downloaded the Agent, skip to "Getting Started with Agent". Navigate to Main, scroll down, and click the "beta release" button under "Windows". Make sure your current Windows user account has Administrator rights. Run the SafeDNS-Agent-Setup.exe file and install the Agent on your computer. You will see the warning about SafeDNS Certificate installation, please click Next. Agent Unattended Installation You can install the Agent in an unattended automatic way. This allows you to automatically install and launch the service, manage the filtering policies, and collect web traffic statistics on several individual computers within your network. Learn how to install the Agent in unattended mode. Getting Started with Agent 1. Log in to the Agent using your SafeDNS email/login and password.If you forgot your password, click this link to reset your password: https://www.safedns.com/auth/forgot 2. Set up the security PIN that will be used later to restrict access to the Agent. 3. Enter the PIN once again to sign in to the Agent. Agent overview 1. In the main window of the Agent you can view your account information, current IP address, your Billing Plan, and the Subscription expiration date.All filtering rules changes can be made in the SafeDNS Dashboard. Use the Policy menu to view and change the current filtering Policy. Filtering can be stopped in Agent using the "Filtering enabled" button at the right top corner of the app. Please note that settings take 5-7 minutes to apply.In some cases, you will need to clear the cache of your browser. 2. The system information menu shows brief information about the Agent, current filtering policies, and network interfaces. The information in this menu can be copied to the clipboard by clicking the "Copy to clipboard" button. 3. The Debug menu displays the results of the diagnostic commands required for troubleshooting. To send the debug information to SafeDNS, click the "Send report" button. Additional settings To ensure the Agent was installed correctly, please navigate to the "Settings" tab in the SafeDNS Dashboard and scroll to the bottom. If you see the record with the Device name and your IP address, it means that the filtering is working. After that, you can adjust the filtering Policy according to your needs. You can select categories to block in the SafeDNS Dashboard under the Categories tab. Don't forget to click the "Save changes" button. The setup is finished!A blocked website will display an error message that the Access is closed. If the filtering doesn't work according to your policy settings, clear the cache of your browser using this guide. Please note, that settings take 5-7 minutes to applyStats and filtering status update hourly Uninstallation To uninstall the Agent please quit it first. Then click Start, type Control Panel, and open it. Select Category in View by dropdown menu. All settings in the Control Panel will be divided into categories. Click Uninstall a program. Find SafeDNS Agent in the list of all programs, click it once, and click Uninstall Click Yes in appeared window of deletion confirmation If the User Account Control window appears and asks "Do you want to allow this app to make changes to your device?', then click Yes Click OK and the SafeDNS agent will be successfully uninstalled. Windows Filtering Setup via OpenVPN Please note, that this filtering option works via the third-party app OpenVPN. If you encounter any issues, please contact our Technical Support. 1. Open the SafeDNS Dashboard and navigate to Settings > Devices. 2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add. Choose a filtering policy before adding a VPN connection, if needed. 3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Press the "Cloud download" icon. Multiple devices can use the same filtering policy, but each device should use its own VPN certificate. You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy. 4. Download OpenVPN. 5. Install OpenVPN from the downloaded file. 6. Follow the on-screen instructions to finish the installation process. 7. Dismiss the warning window if it appears. 8. Import the Certificate to the OpenVPN application by right-clicking on the application in the System Tray, then Import > Import file. Alternatively, you can copy/move the Certificate into the folderC:\Program Files\OpenVPN\config. The Certificate has the following name format: safedns-123456.ovpn 9. Start the OpenVPN app by double-clicking on its icon in the system tray, or from the Start menu. OpenVPN icon in the system tray 10. Wait until the VPN connection is established. Your Windows device is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Windows 11 DNS Setup Step-by-step guide 1. From the Taskbar panel, right-click on the Wi-Fi (or LAN) icon and select Network and Internet settings: 2. Select Advanced network settings. 3. Scroll down and select More network adapter options 4. Right-click on the current internet connection, and select Properties. If the system shows the security notification, click Yes. 5. We recommend disabling Internet Protocol Version 6. This will simplify the installation process and will have no effect on the quality of your internet connection. After that, select  Internet Protocol Version 4, and click on Properties. 5. Select the option Use the following DNS server addresses, and enter the following SafeDNS addresses: Preferred DNS server: 195.46.39.39Alternate DNS server: 195.46.39.40 6.  Click the OK button to save your settings, and Close the network properties window. 7. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP-address or DynDNS" box. Click "Add". You have successfully configured the SafeDNS for Windows 11. Troubleshooting Please note that Windows may still be using the addresses saved in the local DNS cache. It is recommended to clean it using the following steps: 1. Press "Start" 2. Search for "cmd" and open the suggested application 3. Enter and run the following command in the opened window ipconfig /flushdns Learn more about how to clear DNS cache. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Windows 10 DNS Setup Video tutorial Watch this video tutorial to learn how to deploy SafeDNS on a Windows-based PC with static IP without the installation of any software Step-by-step guide 1. From the Taskbar pane, right-click on the Wi-Fi (or LAN) icon and select Open Network and Sharing Center: 2. Select Change adapter settings. 3. Right-click on the current internet connection, and select Properties. If the system shows the security notification, click Yes. 4. We recommend disabling Internet Protocol Version 6. This will simplify the installation process and will have no effect on the quality of your internet connection. After that, select  Internet Protocol Version 4, and click on Properties. 5. Select the option Use the following DNS server addresses, enter the following SafeDNS addresses: Preferred DNS server: 195.46.39.39Alternate DNS server: 195.46.39.40 6.  Click the OK button to save your settings, and Close the network properties window. 7. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP-address or DynDNS" box. Click "Add". You have successfully configured the SafeDNS for Windows 10. Troubleshooting Please note that Windows may still be using the addresses saved in the local DNS cache. It is recommended to clean it using the following steps: 1. Press "Start" 2. Search for "cmd" and open the suggested application 3. Enter and run the following command in the opened window ipconfig /flushdns Learn more about how to clear DNS cache. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Windows 7 DNS Setup Step-by-step guide 1. From the Taskbar pane, right-click on the Wi-Fi (or LAN) icon and select Open Network and Sharing Center: 2. Select Change adapter settings. 3. Right-click on the current internet connection, and select Properties. If the system shows the security notification, click Yes. 4. We recommend disabling Internet Protocol Version 6. This will simplify the installation process and will have no effect on the quality of your internet connection. After that, select  Internet Protocol Version 4, and click on Properties. 5. Select the option Use the following DNS server addresses, enter the following SafeDNS addresses: Preferred DNS server: 195.46.39.39Alternate DNS server: 195.46.39.40 6.  Click the OK button to save your settings, and Close the network properties window. 7. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add". You have successfully configured the SafeDNS service for Windows 7. Troubleshooting Please note that Windows may still be using the addresses saved in the local DNS cache. It is recommended to clean the cache by following these steps: 1. Press "Start" 2. Search for "cmd" and open the suggested application 3. Enter and run the following command in the opened window ipconfig /flushdns Learn more about how to clear DNS cache. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mac OS SafeDNS Agent for macOS Setup Installation requirements: macOS 12 (Monterey) or higher. Getting started Log in to your SafeDNS account with your registration email and password. Navigate to the Getting Started widget on the main page of the Dashboard and select the macOS button. Click on the download link below and wait for the Agent to download. Alternatively, you can use the direct link to download the Agent from the SafeDNS website - SafeDNS macOS Agent. Installation 1. After downloading, open the Downloads directory and double-click on the downloaded package to start the installation process. 2. If you see a message before installing that says “macOS can’t verify the developer of AgentSafeDNS.pkg…”, please hold the Control button, right-click on AgentSafeDNS.pkg, and click Open in the opened context menu. 3. In the appeared dialogue, click Open and follow the instructions of the installer. During the installation process you will be asked to enter the administrator password. First launch 1. After installation, launch the SafeDNS Agent from the Launchpad.The Agent will be accessible by clicking on the icon in the system tray after the launch. 2. Enter your SafeDNS account credentials in the opened window. If you don’t have an account yet, please choose a suitable plan and register using the registration page. 3. Set up the security PIN that will be used later to restrict access to the Agent. 4. Enter the PIN once again to sign in to the Agent. Agent overview 1. In the main window of the Agent you can view your account information, current IP address, your Billing Plan, and the Subscription expiration date.All filtering rules changes can be made in the SafeDNS Dashboard. Use the Policy menu to view and change the current filtering Policy. 2. The system information menu shows brief information about the Agent, current filtering policies, and network interfaces. The information in this menu can be copied to the clipboard by clicking the "Copy to clipboard" button. 3. The Debug menu displays the results of the diagnostic commands that are required in case of troubleshooting. To send the debug information to SafeDNS, click the "Send report" button. Additional settings To make sure the Agent was installed correctly, please navigate to the "Settings" tab in the SafeDNS Dashboard and scroll to the bottom. If you see the record with the Device name and your IP address, it means that the filtering is working. After that, you can adjust the filtering Policy according to your needs. You can select categories to block in the SafeDNS Dashboard under the Categories tab. Don't forget to click the "Save changes" button. The setup is finished!A blocked website will display an error message that the Access is closed. If the filtering doesn't work according to your policy settings, clear the cache of your browser using this guide. !Please note, that settings take 5-7 minutes to apply.!Stats and filtering status update hourly. Uninstallation To uninstall the Agent please quit it first. Then find SafeDNS Agent in the Applications folder: Open the folder AgentSafeDNS and run the packet "Uninstall-AgentSafeDNS".After that, enter the administrator password in the Terminal window, and the Agent will be deleted. Mac Filtering Setup via OpenVPN Please note, that this filtering option works via the third-party app OpenVPN.If you encounter any issues, please contact our Technical Support. 1. Open the SafeDNS Dashboard and navigate to Settings > Devices. 2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add. Choose a filtering policy before adding a VPN connection, if needed. 3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Press the "Cloud download" icon. Multiple devices can use the same filtering policy, but each device should use its own VPN certificate. You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy. 4. Download the OpenVPN client from the Tunnelblick website 5. Open the disk image from the Downloads folder and double-click the Tunnelblick.app icon. 6. Follow the on-screen instructions. 7. Run Tunnelblick.app from the Applications folder. 8. Add the downloaded SafeDNS Certificate file to the "Configurations" menu and click "Connect". 9. Wait until the VPN connection is established. Your Mac is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mac DNS Setup 1. Navigate to the Mac OS "System Preferences". 2. Click on the "Network" in the "Internet & Wireless" section of the opened window. 3. Choose an active connection from the list and click the "Advanced" button. 4. Select the "DNS" tab, add SafeDNS servers 195.46.39.39 and 195.46.39.40, and click "OK". 5. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add". Your Mac is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Linux OS SafeDNS Agent for Linux Setup Installation requirements: Debian 9, Ubuntu 18–22, PopOS, CentOS 7.Requires the following billing plans: Safe@Home, Safe@Office, Family, Pro, Pro+ Getting Started 1. Log in to your SafeDNS account with your registration email and password. 2. Navigate to the Getting Started tab on the main page of the Dashboard and select the Linux button. Choose and download the needed package: .rpm or .deb. .rpm package Use the following command for the installation from the Terminal app: sudo rpm -Uvh /home/user/Downloads/safedns-agent-1.3.1-x86_64.rpm Please note, that the path to the file and/or package name might be different. .deb package For experienced users. You can use this command to install from the Terminal app: sudo dpkg -i /home/user/Downloads/safedns-agent-1.3.1-x86_64.deb Please note, that the path to the file and/or package name might be different. 1. Open the “Downloads” folder: 2. Run the downloaded file and install the Agent. Enter the Admin password if prompted. 3. You will see the following window once the installation finishes: Agent Setup 1. Restart your system. The Agent icon will appear in the system tray. 2. Open the Agent by clicking on the icon in the system tray. !On Debian 9, click on the black line in the bottom right corner, if the tray icon is hidden. 3. Enter your SafeDNS account credentials in the opened window. 4. Set up the security PIN that will be used later to restrict access to the Agent: 5. Enter the PIN once again to sign in to the Agent: Agent Overview The main window of the Agent. Here you can view your account information, current IP address, your Billing Plan, and Subscription expiration date. Use the Policy menu to view and change the current filtering Policy. The system information menu shows brief information about the Agent, current filtering policies, and the network interfaces. The information in this menu can be copied to the clipboard by clicking the "Copy to clipboard" button. The Debug menu displays the results of the diagnostic commands that are required in case of troubleshooting. To send the debug information to SafeDNS, click the "Send report" button. Additional settings To ensure the Agent was installed correctly, please navigate to the "Settings" tab in the SafeDNS Dashboard and scroll down to the bottom. If you see the record with the Device name and your IP address, it means that the filtering is working. After that, you can adjust the filtering Policy according to your needs. You can select categories to block here.Don't forget to click the "Save changes" button. The setup is complete! A blocked website will display an error message that the Access is closed: If the filtering doesn't work according to your policy settings, clear the cache of your browser. Please note, that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Uninstallation For the .rpm package, use the following command: sudo rpm -e agentsafedns For the .deb package, use the following command: sudo apt-get remove agentsafedns Enter "y" if prompted to confirm the Agent removal.Linux Filtering Setup via OpenVPN Please note, that this filtering option works via the third-party app OpenVPN.If you encounter any issues, please contact our Technical Support. 1. Open the SafeDNS Dashboard and navigate to Settings > Devices. 2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add. Choose a filtering policy before adding a VPN connection, if needed. 3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Press the "Cloud download" icon. Multiple devices can use the same filtering policy, but each device should use its own VPN certificate. You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy. Some Linux distributions have the OpenVPN application pre-installed. In this case, skip to Step 5. 4. Install the OpenVPN application on your device with the following command: sudo apt install openvpn 5. Enter the administrator account password and approve the installation if prompted. 6. Copy the downloaded Certificate to /etc/openvpn 7. Start OpenVPN with the following command: sudo openvpn –config /etc/openvpn/safedns-123456.ovpn 8. Enter the administrator account password if prompted. If the connection is established correctly, you will see the following notification: Your Linux device is now filtered with the SafeDNS filtering policy. You can check the OpenVPN connection with the ifconfig command. OpenVPN interface has the name tun: Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Linux DNS Setup The first step is the same for both Static and Dynamic IP address configurations: change your system’s DNS servers to SafeDNS addresses - 195.46.39.39 and 195.46.39.40 If you configure the network through NetworkManager, it will be sufficient to add SafeDNS servers there. 1. Open the settings of the current Network Interface. 2. Add SafeDNS servers: 195.46.39.39 and 195.46.39.40. Please note, that servers should be separated by a comma. Otherwise, you need to find out which application is used for the network settings and add SafeDNS servers there. Static IP address Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add". Your Linux device is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Dynamic IP address Install and configure ddclient. ddclient package is shipped with most Linux distributions. If your Linux distribution doesn’t have ddclient, you can download it from GitHub. After ddclient is installed, you need to insert the next configuration in its config file (/etc/ddclient.conf or /etc/ddclient/ddclient.conf): daemon=300syslog=yesssl=yesprotocol=dyndns2server=www.safedns.comuse=webweb=http://www.safedns.com/nic/myip# Replace with your email and password for www.safedns.comlogin=you@yourmail.compassword=your_password# Enter any name for your device.# If you have several computers with dynamic IPs their names must differ.laptop Reboot your device and start ddclient. If the similar string is shown in the system logs (/var/log/syslog, /var/log/daemon.log or /var/log/messages), ddclient is successfully configured: Aug 14 12:49:13 laptop ddclient[4105]: SUCCESS: updating laptop: good: IP address set to 18.26.28.10 Your Linux device is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mobile & tablet SafeDNS App for Android Setup SafeDNS Agent is an application that allows you to use SafeDNS filtering on mobile devices running Android. Supported Android versions: 5 or higher.Supported devices: Samsung, Pixel, Lenovo ⤵SafeDNS Agent - App on Google Play Alternative .apk installation file download: https://safedns.com/downloads/safedns-2_1_6_3-debug.apk Getting started 1. Install the app from Google Play, and run the SafeDNS Agent app. 2. Press the "Get started" button. 3. Press "Sign in" if you already have a SafeDNS account, and go to Step 5. Otherwise, press "Register". 4. Fill in the required fields and press "Register". 5. Enter your SafeDNS account email (or username) and password, and press "Sign in". 6. Create and confirm a PIN code for quick access to the application. 7. Press "Download certificate" to install the SafeDNS root certificate. This step is necessary for the correct display of the block page on HTTPS sites. Please note that the filtering still works without the installed certificate. 8. Press "Activate now" and "Activate device admin" to enable the feature that prevents unauthorized users from deleting the application and disabling filtering on the device. 9. Press "Allow now", then find the SafeDNS app in the suggested list and set the permission switch to ON. 10. Press "Allow now", then find the SafeDNS app in the suggested list and set the permission switch to ON. 11. Press "Allow now", then tap "Ok" to allow SafeDNS Agent to create a VPN connection. 12. Press "Go to website" to visit the SafeDNS Dashboard and set up the filtering. If the filtering is already configured, swipe this screen to the left and press "Got it" to complete the installation. App settings If you want to change the filtering settings after installing the application, open the SafeDNS Agent application and enter your PIN code. You will be taken to the main screen of the application. Here you can disable filtering using the slider, change the filtering policy (after installation, the Default policy is applied), or go to the SafeDNS Dashboard. To go to the Dashboard, press on the three bars in the upper left corner and pick "Filtering settings". In your Dashboard, you can configure filtering categories, manage exceptions in Allow/Deny lists, and much more. After setting up the filtering, check its operation by trying to access one of the sites you blocked. If you see the block page instead of the site, everything is configured correctly. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Android DNS Setup Please note, that the Android user interface varies depending on the device model. 1. Open the "Settings" app and navigate to the Wi-Fi menu. 2. Press on arrow icon of your current Wi-Fi connection. 3. In the Network Details press on the "IP settings – DHCP". 4. Select the Static option and add the following addresses to DNS1 and DNS2 fields: 195.46.39.39 and 195.46.39.40 Once the addresses are added, press the checkmark icon to save the settings. 5. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add". Your Android device is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mobile Devices Filtering Setup Please note, that this filtering option works via the third-party app OpenVPN.If you encounter any issues, please contact our Technical Support. iPhone and iPad 1. Open the SafeDNS Dashboard and navigate to Settings > Devices. 2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add. Choose a filtering policy before adding a VPN connection, if needed. 3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Click the "Letter" icon to send the configuration file to your SafeDNS account email. Multiple devices can use the same filtering policy, but each device should use its own VPN certificate. You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy. 4. Install the OpenVPN client from the App Store (the app is free of charge). 5. Open the received email on your mobile device and press on the Certificate. Choose a Certificate to open with the OpenVPN app. 6. Press the green plus icon to add the OpenVPN certificate. 7. Activate the "Connection" switch to establish the VPN connection. Your device is now filtered with the SafeDNS filtering policy. Android Devices 1. Open the SafeDNS Dashboard and navigate to Settings > Devices. 2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add. Choose a filtering policy before adding a VPN connection, if needed. 3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Open your SafeDNS Dashboard on your mobile device, and press the "Cloud download" icon.Alternatively, you can click the "Letter" icon to send the configuration file to your SafeDNS account email. Multiple devices can use the same filtering policy, but each device should use its own VPN certificate. You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy. 4. Install the OpenVPN app from Google Play (the app is free of charge). 5. Open the installed app and import the downloaded Certificate using the Android File Manager.If you sent the certificate to your e-mail in step 3, open the attached file with OpenVPN Connect. 6. Press "Connect" after the Certificate is imported. Your device is now filtered with the SafeDNS filtering policy. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Network Analyzer Guide This guide shows how to troubleshoot the internet issues on iOS and Android devices using Network Analyzer. Installation To run the diagnostics, please download and install the Network Analyzer app from the Google Play:https://play.google.com/store/apps/details?id=net.techet.netanalyzerlite.an Or from the App Store:https://apps.apple.com/us/app/network-analyzer/id562315041 How to use the app Once the Application installed, please run it and open the Tools tab: Select the Query type: DNS and the Settings: TXT. Set the query address: black.safedns.com and press the Start button. This is an example of the correct response: The first underlined part shows the public IP address of your network. The second underlined part shows the ID of your filtering policy that can also be found here - https://www.safedns.com/cabinet/policy/ Troubleshooting If you haven't added the IP address to the SafeDNS Dashboard, the second underlined number will show “0”. If the response contains the status message only, it usually means that DNS servers are  not configured on your router or your device. Advanced How To Check The Filtering Status Since our filter is DNS-based, the best way to check the filtering is the nslookup command. Here you will find the checking methods for different platforms. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes. Windows Take a look at the video guide. Open the "Start" menu Type "cmd" Select the suggested application - Command Prompt Enter and run the command nslookup -q=txt black.safedns.com or nslookup -q=txt black.safedns.com 127.0.0.1 if you are using the SafeDNS Agent To check via IPv6 (if it was set up), use the command nslookup -q=txt black.safedns.com 2001:67c:2778::3939 Correct results should show your external IP address ("ip"), policy ID ("p"), and also SafeDNS Agent ID ("t") in case it is installed. If you see the results similar to screenshot 01, it means that the filtering is active. If the "p":0, check if the IP address in the Dashboard > Settings > Devices is added correctly. If you see the results similar to screenshot 02, it means that the filtering is not configured, and the primary and secondary DNS servers on your device or router are set up incorrectly. Please check your DNS settings. Linux Navigate to "Menu" Run the "Terminal" app Enter and run the command host -t txt black.safedns.com To check via IPv6 (if it was set up), use the command nslookup -q=txt black.safedns.com 2001:67c:2778::3939 Correct results should show your external IP address ("ip"), policy ID ("p"), and also SafeDNS Agent ID ("t") in case it is installed. If you see the results similar to screenshot 03, it means that the filtering is active. If the "p":0, check if the IP address in the Dashboard > Settings > Devices is added correctly. If you see the results similar to screenshot 04, it means that the filtering is not configured, and the primary and secondary DNS servers on your device or router are set up incorrectly. Please check your DNS settings. Mac Launch "Spotlight" with ⌘ + SPACE or by clicking on the magnifying glass in your menu Search for and launch the "Terminal" app Enter and run the command host -t txt black.safedns.com To check via IPv6 (if it was set up), use the command nslookup -q=txt black.safedns.com 2001:67c:2778::3939 Correct results should show your external IP address ("ip"), policy ID ("p"), and also SafeDNS Agent ID ("t") in case it is installed. If you see the results similar to screenshot 05, it means that the filtering is active. If the "p":0, check if the IP address in the Dashboard > Settings > Devices is added correctly. If you see the results similar to screenshot 06, it means that the filtering is not configured, and the primary and secondary DNS servers on your device or router are set up incorrectly. Please check your DNS settings. How to Clear DNS Cache DNS cache refers to the temporary storage of information about previous DNS lookups on a router, machine's OS, or web browser.Keeping a local copy of a DNS lookup allows your router, OS, or browser to quickly retrieve it and thus a domain can be resolved to its corresponding IP much more efficiently. However, sometimes it can cause a problem when the new filtering settings conflict with the information saved in the cache. Usually, the problem resolves after clearing the cache on a browser level. Browser level Chrome, Edge, Opera, Firefox, and many others Press Ctrl + Shift + Delete simultaneously on the keyboard to open the appropriate window. Select "Cache" and click "Clear".Please note, that you don't need to delete cookies and saved passwords. Alternatively, you can use the browser's Settings menu, search for the "cache" setting, and select the suggested option. Safari Click on Safari on the top menu bar. Click Preferences. Click the Privacy tab. Click Manage Website Data... Click Remove All. Click Remove Now. Go to the Safari menu on the top menu bar. Select Quit to close Safari and save your changes. iOS, iPadOS Safari browser:1. Go to Settings (the app with the gear icon).2. Scroll down until you see Safari. Tap it.3. Press Clear History and Website Data.4. Press Clear History and Data again in the warning notification. Chrome browser: 1. On your iPhone or iPad, open the Chrome app.2. At the bottom, press More ...3. Press History > Clear browsing data.4. Select Cookies, Site Data and Cached Images and Files.5. Press Clear browsing data. Android Long press on the app in the app menu. Select App info in the pop-up window. Press Storage usage in the app's info page. Press Clear cache. System level Windows Open the Start menu and type cmd. Right-click on the suggested Command Prompt app and choose the Run as administrator option. Type ipconfig /flushdns inside the terminal window. Press Enter. Mac Search for the Terminal in the applications list or press CMD+Space. Enter the following command:sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponder Press Enter. If prompted, type your administrator account password. Press Enter again to submit your password. Linux Search for the Terminal in the applications list or press Ctrl+Alt+T. Enter the following command:sudo systemd-resolve --flush-caches Press Enter. If prompted, type your administrator account password. Press Enter again to submit your password. iOS, iPadOS, Android Turn Airplane mode on Reboot device Turn Airplane mode off Router level Reboot the router using the router's interface. Alternatively, turn the router off by pressing its power button, wait for 15 seconds, and turn the router back on.How to troubleshoot access to domains using Network Tools This guide shows how to troubleshoot the issue when a domain is loading partially or some additional services from the main domain are not accessible. Prerequisites: Browser with the support of the Developers Tools. All popular modern browsers have this feature. How to troubleshoot: Start the browser and press F12, or go to Menu > Tools > Browser Tools > Web Developer Tools. Path to the Developer Tools might be different in various browser Navigate to the Network Tab. The list below shows all the items from the page that were loaded or blocked.The list will be empty if the Network tab is opened after the page is loaded. In this case, refresh the page. The HTTP status can have different values, including: 200 (OK) — the access was not blocked and the item has been loaded. 451 — Unavailable for Legal Reasons. Blocked icon — the access was forbidden and the item had not been loaded. Using these statuses, you can identify the blocked domain. Example: The access to facebook.com is not blocked, and the Facebook logo has been loaded.However, all other data on the page was not loaded, because it is located on the blocked fbcdn.net domain. To unblock this domain, please check its category here: https://www.safedns.com/check/After that, navigate to the SafeDNS Dashboard and unblock that category. If you want to keep the category blocked, you can add this domain to Allowlist instead.How to check domain category You can always check your domain category here. Agent Unattended Installation New Agent, versions 1.4.1+ (Windows only) Installation To initialize the unattended installation, run the installer with /verysilent switch in the command line. You can use the additional keys: /login=< login > /password=< password > /pin=< pin code >  to specify your login, password, and pin code.Pin-code can be any 4-digit number that will be used instead of a password to access the Agent interface. It can be different for different devices.It is mandatory to use the /login, /password, and /pin keys together. If only one of the keys is used, login, password, and pin will be requested via GUI at the first launch.Example: /verysilent /login=email@email.com /password=StrongPass /pin=1234 Keys from the old Agent will be added in the subsequent releases. Uninstallation To initialize the unattended uninstallation, run the uninstaller with /verysilent switch in the command line. Old Agent, versions 2.6.0.0 – 3.4.1.5 To initialize the unattended installation, run the installer with /S switch in the command line (S must be uppercase). You can use the additional keys: /login=< login > and /pass=< password > to specify your login and password.Example: safedns-agent-setup /S /login=email@email.com /pass=qwertyIt is mandatory to use the /login and /pass keys together. If only one of the keys is used, both login and password will be requested via GUI at the first launch. /prof=< profile > to specify the filtering policy.Example: safedns-agent-setup /S /login=email@email.com /pass=qwerty /prof=My policyIf the key is not used or the wrong policy is specified, a new policy will be created. /conn=< interface > to specify the network interface which needs to be protected.Example: safedns-agent-setup /S /login=email@email.com /pass=qwerty /conn=Wi-Fi /pall to protect all network interfaces.If both /conn and /pall are used, then only the former takes action. If neither key is used, only the default network interface will be protected. /dupd turns off automatic checks for the new versions of the Agent. /darun disables automatic startup of the SafeDNS Agent GUI when the system starts (no icon will be shown in the system tray). This switch does not affect the SafeDNS Agent system service. /D=< path > to specify the installation directory (D must be uppercase). It must be the last option used in the command line and must not contain any quotation marks, even if the path contains whitespace characters.Example: safedns-agent-setup /S /login=email@email.com /pass=qwerty /D=c:\program files (x86)\SafeDNS AgentOnly absolute paths are supported. /nogui disables installation of the graphical user interface (GUI). When you use the key, all components will be installed, except for the dns-agent.exe file. You must specify the login and password with this key Don't enclose options containing whitespace characters in quotation marks (i.e. /prof=My policy). Old Agent, special version for Active Directory This version supports all commands above and one additional key: /DNS=< IP address > to specify the DNS forwarder.Example: safedns-agent-catserver-setup /S /login=email@email.com /pass=qwerty /DNS=192.168.0.1 SafeDNS and Active Directory This guide explains how to set up the SafeDNS service in the Active Directory environment both with the SafeDNS Agent and in the Dashboard. Installation of the Special Version of SafeDNS Agent We've built the Special Version of the SafeDNS Agent, that can be used in the AD environment and networks with any local non-public DNS records. Overall, it is the same version of the usual Agent with the same set of features. The only difference is that it works with your local DNS server or AD server directly, and not with the SafeDNS servers. Therefore, all non-public DNS/AD resources will be available by default, without any additional action. ⤵Download the Special Version of the Agent. Manual Setup in the Dashboard Another way to gain access to AD resources is to use special options available on Office/Enterprise plans. You must add SafeDNS DNS-servers addresses - 195.46.39.39 and 195.46.39.40 - to the DNS forwarder on your Primary Domain Controller (and secondary, if applicable), so all devices in a filtered network receive SafeDNS IP addresses as the DNS. After this you need to add your external IP address to the dashboard. Navigate to Dashboard -> Settings -> Devices and add your external IP in the section "IP addresses/DynDNS". Grant access to local resources. 1. Navigate to Dashboard -> Settings -> Advanced -> Active Directory. 2. Enter and add your AD domain in the form. 3. Enter and add the name of the PDC (Primary Domain Controller) and its IP address in the local network. 4. Add secondary domain controllers, if applicable. You can change the PDC by clicking on the pencil icon on the right. 5. Set aliases for all required local resources in the Aliases table below. Enter the name of a local resource and its local IP address. 6. Wait about 5-7 minutes until all local resources become accessible. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Web Filtering Bypass Prevention Common recommendations: Block the Proxies & Anonymizers category. Block the Firefox/Chrome Secure DNS feature in the VPN and Proxy section of AppBlocker. Make sure that all of your users have restricted operating system rights. If a user has no administrator rights, it will be impossible for them to delete the SafeDNS Agent, install any VPN/proxy, change the "hosts" file, or change the DNS server in the network settings. Prohibit access to any other DNS. If devices connect to the internet via a gateway or router, prohibit access to all DNS servers, except the SafeDNS public DNS servers. We recommend excluding the 195.46.39.0/24 network as well, as this is a whole SafeDNS network. If you are using a caching server in your corporate network, exclude its address instead. Prohibit access to HTTP proxies. To do that, restrict packet transfer to all IP addresses by TCP and UDP protocols on ports 3128 and 8080 in the firewall settings of your router. Prohibit access to DNS over TLS. To do that, restrict packet transfer to all IP addresses, except SafeDNS network 195.46.39.0/24, on TCP port 853. Disable IPv6 protocol. Even though SafeDNS does support IPv6 addresses, we generally recommend disabling this protocol on your router or in the network settings of your device. Please note, that this will not have any effect on the quality of your internet connection. Recommendations for system administrators: Set up DNS requests rerouting to the SafeDNS public DNS server or to the caching server of your corporate network. Prohibit access to any external proxy servers. Restrict direct access to any website via its IP address. Restrict connection to unknown external VPN servers. Restrict running any unknown application. Restrict using any unknown hardware. DD Client Setup This guide explains how to install ddclient software in the case when you have a Dynamic IP address and your router does not have a Dynamic DNS feature. Before you start Redirect your DNS requests to our DNS server as described in: - Windows 7 DNS setup guide (Steps 1-6).- Windows 10 DNS setup guide (Steps 1-6). Install and configure DDclient software Install DDclient (download link). Click "Next" until your reach the "Select Dynamic DNS server" window (see screenshot above). Enter any preferred name in the "Client hostname" field. Enter www.safedns.com in the "Dynamic DNS server". Select HTTPS in the "Connection". Select dyndns2 in the "Dynamic DNS protocol". Enter your SafeDNS account login in the "Dynamic DNS username". Enter your SafeDNS password in the "Dynamic DNS password". Continue clicking "Next" until the setup process is finished. After the installation Check if the IP address is successfully bound to service in the ddclient.log file. There should be a line like this: SUCCESS: updating my computer name: good: IP address set to 18.26.28.10 On Windows 10 you can find the log file here: C:\Windows\ServiceProfiles\NetworkService\AppData\Local\ddclient.log On Windows 7: C:\windows\ServiceProfiles\NetworkService\AppData\Local\ddclient.log C:\windows\ServiceProfiles\LocalService\AppData\Local\ddclient.log C:\Users\username\AppData\Local\ddclient.log On Windows XP: C:\Documents and Settings\LocalService\Local Settings\Application Data\ddclient.log C:\Documents and Settings\NetworkService\Local Settings\Application Data\ddclient.log C:\Documents and Settings\username\Local Settings\Application Data\ddclient.log If the log file is correct, the DD Client table in Dashboard > Settings > Devices (link) will be updated automatically. Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.DNS-over-TLS Setup The goal of the DNS-over-TLS protocol is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data via man-in-the-middle attacks. With DoT, the content and response of the DNS query are encrypted. Using this feature the SafeDNS service can identify users by their public IP address only. This feature does not work with the SafeDNS Agent or the SafeDNS VPN solution. Before you start, please open your SafeDNS Dashboard > Settings > Devices. Enter your public IP address in the "Enter an IP address or DynDNS" field and click the "Add" button. Windows 10 1. Download and install a Stubby .msi package. 2. Run the Windows Command Prompt as administrator: 3. Go to the Stubby directory using the Command Prompt and open stubby.yml configuration file with Notepad: 4. Set settings following the example below: resolution_type: GETDNS_RESOLUTION_STUBdns_transport_list: GETDNS_TRANSPORT_TLStls_authentication: GETDNS_AUTHENTICATION_NONE tls_query_padding_blocksize: 128edns_client_subnet_private: 0idle_timeout: 100000listen_addresses: - 127.0.0.1@53round_robin_upstreams: 1upstream_recursive_servers:- address_data: 195.46.39.41tls_auth_name: "dns-s.safedns.com"                                             tls_pubkey_pinset:- digest: "sha256"value: kbv1ODr8gP7FV9/h2lp5t3sP4TdYZEwqUYj0mk0IBzg= 5. Run the following command to replace the default DNS server with a local Stubby: PowerShell -ExecutionPolicy bypass -file  "C:\Program Files\Stubby\stubby_setdns_windows.ps1" 6. Run the stubby.bat file 7. Check the filtering. Linux (Ubuntu) 1. Install the Stubby package from a repository: $ sudo apt install stubby 2. Set the configuration file /etc/stubby/stubby.yml as follows: resolution_type: GETDNS_RESOLUTION_STUBdns_transport_list: - GETDNS_TRANSPORT_TLStls_authentication: GETDNS_AUTHENTICATION_NONEtls_query_padding_blocksize: 128edns_client_subnet_private : 0idle_timeout: 100000listen_addresses: - 127.0.0.2@53round_robin_upstreams: 1upstream_recursive_servers:- address_data: 195.46.39.41tls_auth_name: "dns-s.safedns.com"                                               tls_pubkey_pinset:- digest: "sha256"value: kbv1ODr8gP7FV9/h2lp5t3sP4TdYZEwqUYj0mk0IBzg= 3. Change DNS in /etc/resolv.conf file to 127.0.0.2: nameserver 127.0.0.2 4. Start the filtering service service stubby start 5. Check the filtering. MacOS 1. Download and install the Stubby Manager package. If you get a security alert, click on "Open Anyway" in the security settings. 2. Launch a Stubby Manager app after installation and click the "Advanced" button. 3. Set the configuration file as follows: resolution_type: GETDNS_RESOLUTION_STUBdns_transport_list: - GETDNS_TRANSPORT_TLStls_authentication: GETDNS_AUTHENTICATION_NONEtls_query_padding_blocksize: 128edns_client_subnet_private : 0idle_timeout: 100000listen_addresses: - 127.0.0.1@53round_robin_upstreams: 1upstream_recursive_servers:- address_data: 195.46.39.41tls_auth_name: "dns-s.safedns.com"                                                       tls_pubkey_pinset:- digest: "sha256"value: kbv1ODr8gP7FV9/h2lp5t3sP4TdYZEwqUYj0mk0IBzg= 4. Apply the settings and click "Start". 5. Open "Network Properties" and set 127.0.0.1 as the DNS server. 6. Check the filtering.SafeDNS Root Certificate For HTTPS Pages About the certificate Root certificate or SSL certificate is the main part of the website security. SSL certificate is required for the correct operation of sites with a secure (HTTPS) connection. If you have issues with displaying the SafeDNS block page (your internet browser shows a message "Unable to access the site"), you need to download a SafeDNS certificate and configure it to use in your browser. Please note that the certificate should be installed on each end device where you want HTTPS pages to display correctly. ⤵Download SafeDNS certificate If the browser starts installing the certificate after you click on the button, cancel it, right-click on the button and choose "Save as…" Windows (Chrome, Edge, Opera browsers) For Mozilla Firefox, see the next section. 1. Open the Start menu, type in 'Control Panel', and open the suggested app. 2. Open Internet Options. 3. Navigate to the Content tab and click Certificates. 4. Navigate to the Trusted Root Certification Authorities tab, and click Import. 5. Click Next in Certificate Import Wizard. 6. Click Browse and select a downloaded SafeDNS certificate file. 7. Make sure that the certificate is placed in the store Trusted Root Certification Authorities. 8. Close the window by clicking on Finish. 9. Click on Yes when Security Warning appears. 10. Close Certificate Import Wizard by clicking OK. Mozilla Firefox (all platforms) 1. Click on the Menu button in the top right corner of the browser and select Settings. 2. Choose Privacy & Security in the left menu, scroll to the bottom of the page, and click View Certificates. 3. Select the Authorities tab and click Import. 4. Select the downloaded SafeDNS Certificate, tick the box Trust this CA to identify websites, and click OK. Mac OSX 1. Press the hotkey CTRL + SPACE and type 'Keychain' in the Spotlight search. Open the Keychain Access application. 2. Navigate to Login > System. 3. Drag and drop the downloaded SafeDNS certificate on the right side of the Keychain Access application where the rest of the certificates are stored. 4. Double-click on the SafeDNS certificate and select Properties certificate. In the opened window, choose when to use this certificate, and select 'Always trust'. Close the window. 5. Make sure that the SafeDNS certificate is marked as trusted for this account in the Keychain Access application. iPhone and iPad 1. Download the SafeDNS certificate. 2. Allow the website to open Settings. 3. Tap Install. 4. Tap on Install in the system warning window. 5. Tap Install in the confirmation window. 6. Tap Done. 7. Navigate to Settings > General > About > Certificate Trust Settings8. Enable full trust for the SafeDNS Root CA certificate Android Menu items and the system interface might be different on your device. 1. Open the Settings app. 2. Start typing "certificate" in the search box. 3. Choose the option related to the certificate installation, a new window will open. 4. Choose "Install certificates from storage". 5. Press "CA certificate". 6. Follow the on-screen instructions to install the certificate. Chromebooks and Google Workspace In case the .crt certificate is not accepted, export it as a .pem file and import it into Workspace Admin. Troubleshooting If you don't see the block page on HTTPS pages after the certificate installation, or there is a browser warning about an invalid certificate, please, try reinstalling the certificate. If the issue remains, ⤵contact our technical support teamMore SafeDNS Global Anycast Network SafeDNS Global Anycast Network consists of servers located throughout the world to ensure a fast and reliable DNS resolving from any point worldwide. List of SafeDNS Categories ID Category Description 2 Unknown websites All uncategorized websites. Most of them are technical domains that are parts of many websites. They are not categorized intentionally in some cases.We generally recommend blocking Unknown websites only when you need access to certain websites. 3 Malware Sites spreading malware 4 Phishing & Typosquatting Sites deceiving internet users (e.g. fake pages, scams, fraud) 5 Online Ads Advertising systems and banner networks 6 Drugs Sites advertising or selling drugs 7 Tasteless Sites containing excessive amounts of tasteless language or unmoderated forums 8 Academic Fraud Sites with plagiarism, academic fraud, etc. 9 Parked Domains Sites without any content that are temporarily placed at the domain registrar; are often used for virus propagation 10 Hate & Discrimination Sites spreading the propaganda of aggression, racism, terrorism 11 Proxies & Anonymizers Sites containing ways to bypass content filters 12 Botnets & C2C Malicious websites 13 Adult Sites Adult content, mostly about sex but without pornography 14 Alcohol & Tobacco Sites selling or containing information about alcohol and tobacco 15 Dating Dating websites 16 Pornography & Sexuality Sites containing pornography in any form 17 Astrology Occult and astrology sites 18 Gambling Casinos, lotteries, and other gambling systems 19 Child Sexual Abuse (IWF) Sites containing child sexual abuse images, criminally obscene adult and child sexual abuse content from a list compiled by Internet Watch Foundation/IWF (UK) 20 Torrents & P2P Torrent trackers and peer-to-peer networks 21 File Storage File-sharing sites, file archives 22 Movies & Video Online movies and videos 23 Music & Radio Internet radio and music archives 24 Photo Sharing Archives of photos, photo galleries 26 Chats & Messengers Online chats and instant messengers, messaging systems servers 27 Forums Web forums 28 Games Computer and videogames websites 29 Social Networks Social networking services (e.g. Facebook) 30 Entertainment Entertainment portals; cafes and restaurants; sites with information about leisure 31 German Youth Protection Sites considered unsafe by the Federal Department for media harmful to young persons (BPjM, Germany) 32 Automobile Sites about cars and other types of transport 33 Blogs Systems of mass hosting, personal websites, blogs 34 Corporate Sites Sites of commercial organizations 35 E-commerce Online shops 36 Education Websites of educational institutions, educational portals 37 Finances Sites of banks and other financial institutions 38 Government Official government sites 39 Health & Fitness Sites of hospitals, medical centers, and health care organizations; health portals 40 Humor Humorous and entertaining sites, often tasteless 41 Jobs & Career Job portals 42 Weapons Websites about weapons and army 43 Politics, Society, and Law Political news; political parties and organizations; legal organizations; laws 44 News & Media News agencies, media sites 45 Non-profit Sites of non-profit organizations 46 Portals Common portals 47 Religious Sites of religious and anti-religious organizations 48 Search Engines Google, Bing, DuckDuckGo, etc. 49 Computers & Internet Sites about IT, software, internet, and computers 50 Sports Sites about sports or sports organizations 51 Science & Technology Scientific organizations sites; science news 52 Travel Sites about tourism and travel 53 Home & Family Sites about home, family, and hobbies 54 Shopping Sites with shopping unrelated to online stores 55 Arts Museums, art portals, and galleries 56 Webmail Webmail systems 57 Real Estate Sites with information about sales and purchases of the real estate 58 Classifieds Classifieds 59 Business Sites about businesses and economics 60 Kids Sites for children 63 Trackers & Analytics Web analytics systems, including user tracking 65 Child Sexual Abuse (Arachnid) Sites containing child sexual abuse material from a list compiled by the Canadian Centre for Child Protection (CAN) as part of its Project Arachnid 66 Cryptojacking Sites illegally mining cryptocurrencies 67 Online Libraries Sites of online libraries 70 DGA DGAs are algorithms detected in various malware families, which are used to periodically generate a large number of domain names that can be used as a default with their management and control servers. 71 Ransomware Sites spreading ransomware 72 Generative AI Sites of well-known AI services, chatbots, and text/picture generators 100 Contentless Domains These sites may lack any meaningful or legitimate content, making their purpose unclear or unreliable, and due to their dubious nature, they pose potential risks to users List of AppBlocker apps Category Description CyberSecurity Shodan Search engine that lets users search for various types of servers connected to the internet using a variety of filters. Zscaler Standalone cloud proxy, that monitors your organization's traffic enabling you to set policies for blocking transactions. Tor Software for enabling anonymous communication. Ecosystem Applications WeChat Chinese instant messaging, social media, and mobile payment app developed by Tencent. Apple Apple Inc. online services. Cisco Cisco Systems Inc. online services. Google Google online services. Microsoft Microsoft Corporation online services. Entertainment YouTube Online video sharing and social media platform. Amazon Prime Video Video on-demand, streaming and rental service of Amazon. Disney+ Video on-demand, streaming service of The Walt Disney Company. Netflix Streaming service and production company. File Sharing 4shared File-sharing website. BitTorrent Client BitTorrent client used for uploading and downloading files via the BitTorrent protocol. Box Cloud based file hosting and collaboration tool. Dropbox Cloud based file hosting service. FASTdrive UK-based cloud storage. FileFactory Online file storage service. Leechers Paradise Service that provides downloads from various file hostings. NZB.su Usenet file downloader. MediaFire Online file hosting and cloud storage. OpenTrackr BitTorrent peer tracker software. qBittorrent Client Cross-platform free and open-source BitTorrent client. ShareFile Content collaboration, file sharing and sync software. Syncthing Peer-to-peer file synchronization application. Syncplicity File share and synchronization service. The Pirate Bay Online index of digital content of entertainment media and software. torrent.eu.org BitTorrent tracker. Xender File transfer application. uTorrent Client BitTorrent client used for uploading and downloading files via the BitTorrent protocol. Zer0day Tracker BitTorrent tracker. Financial Ethermine Cryptocurrency mining pool. Flypool BEAM Cryptocurrency mining pool. Flypool Ravencoin Cryptocurrency mining pool. Flypool Ycash Cryptocurrency mining pool. Flypool Zcash Cryptocurrency mining pool. Games Xbox network Online multiplayer gaming and digital media delivery service created and operated by Microsoft. Sony PlayStation Network Digital media entertainment service provided by Sony Interactive Entertainment. Nintendo network Nintendo's online services. GOG Digital distribution platform for video games and films. Steam Video game digital distribution service and storefront. Fortnite Online video game. Epic Games Store Digital video game storefront. PUBG-mobile Mail GMX Email service provided by Global Mail eXchange. ProtonMail End-to-end encrypted email service. Hushmail Encrypted web-based email service. SendGrid Customer communication platform for transactional and marketing email. Thunderbird Email client by the Mozilla Foundation. Yahoo Mail Email service by Yahoo, Inc. Messaging Slack Messaging program for the office and personal use. Skype Telecommunications application. Discord VoIP, instant messaging and digital distribution platform. Disqus Blog comment hosting service. ICQ Cross-platform instant messaging and VoIP client. Kakao Talk Mobile messaging app for smartphones by Kakao Corporation. KIK Instant messaging mobile app. Pushover Push notification service on smartphones and computers. Rocket.Chat Enterprise communication and collaboration platform. Signal Encrypted instant messaging service. Tencent QQ Chinese instant messaging service and web portal. Zalo Vietnamese messaging service. Viber Japanese VoIP and instant messaging service. Facebook messenger Instant messaging app and platform by Meta. Telegram Cloud-based instant messaging service. WhatsApp Instant messaging and VoIP service by Meta. Portal Baidu Chinese search engine and online services. Daum South Korean web portal. Hao123 Chinese online listings portal. Mail.Ru Russian web portal. So 360 Chinese search engine. Sogou Chinese search engine. Sohu Chinese web portal. TouTiao Chinese news and information content platform. Yahoo Web services provider. Remote Desktop RemotePC Remote access and remote control software application. AnyDesk Remote desktop application. TeamViewer Remote access and remote control computer software. BeyondTrust Identity management / access management, and remote access software. VNC Remote access software. Zoho Assist Indian web-based business tools. Chrome Remote Desktop Remote desktop software tool by Google. Splashtop Remote desktop software and remote support software. Webex Web conferencing, videoconferencing, and unified communications service. GoTo (Logmein) Cloud-based remote work tools. ISL light Remote support software. Social networks Snapchat Instant messaging app and multimedia services. Instagram Photo and video sharing social networking service by Meta. Facebook Online social media and social networking service by Meta. Twitter Microblogging and social networking service. TikTok Chinese video hosting service. Pinterest Image sharing and social media service. LinkedIn Business and employment-oriented online service. Technology GitLab DevOps software package service. GitHub Software development and version control service. Sourceforge Software control and management service. VoIP/Conferencing 3CX VoIP software. Houseparty Group video chatting app. LINE Instant communications application. Blue Jeans Network Cloud-based video conferencing service. Jive Communications Online conferencing service. RingCentral Cloud-based communication and collaboration services. Telehop Voice services, and VoIP. Twilio Communication tools for making and receiving phone calls, sending and receiving text messages. VoIP.ms Communication services. Voyant Cloud-based telecommunication services. Zoom Video Videotelephony software. Google Voice Telephone service by Google. Microsoft Teams Business communication platform by Microsoft. FreeConferenceCall Online conference call services. Ooma Phone service provider for business and home. VPN And Proxy CyberGhost VPN Online traffic encryption service. Hide.me VPN VPN service. Hola VPN Peer-to-peer VPN service. NordVPN VPN service. Surfshark VPN service. Avast SecureLine VPN VPN service. Wireshark Guide This guide shows how to troubleshoot the issues when an application or a domain, and Stats are not working properly. Installation Please download and install Wireshark. Choose x32 version, if you don't know the architecture of your operating system:https://www.wireshark.org/download.html According to Wireshark requirements, you will need to install either WinPcap or Npcap capture driver. Please select the option most suitable for you. How to use the app Once Wireshark is installed, the system should be restarted. Please run the Wireshark application with the administrator rights. During the first run you will be prompted to select the source interface. Please select one of the network adapters:Adapter for loopback traffic capture – if you are using SafeDNS Agent.Wi-Fi or Local Area Connection – if the settings are configured on the network level. Configure the capture protocol by typing the dns in the Display Filter field and press the Enter button. This step will filter all network requests to show DNS requests only. Start the application that requires troubleshooting. The screen of Wireshark shows the list of the hostname addresses, their corresponding IP addresses, and additional service information. In the example above, the domain csi.gstatic.com was resolved to the IP address 195.46.39.13 - SafeDNS BlockPage address.This means that the domain csi.gstatic.com is currently blocked either because its category is blocked or because it is on the Denylist. Please note, that SafeDNS BlockPages can use the following addresses:195.46.39.1, 195.46.39.2, 195.46.39.3, 195.46.39.11, 195.46.39.12, and 195.46.39.13. How to solve the issue? Please look up for the category of the domain with the SafeDNS online tool: https://www.safedns.com/check-website After that, check if this category is not blocked in your SafeDNS Dashboard or is not on the Denylist. Using Wireshark to capture DNS requests is usually enough to solve any issues related to DNS web filtering. However, you can also try advanced Wireshark features - network packet capture, packet analyzer, and USB traffic capture. DNSQuerySniffer Guide This guide shows how to troubleshoot the issues when an application or a domain, and Stats are not working properly. Installation Please download and install DNSQuerySniffer. Choose x32 version, if you don't know the architecture of your operating system:https://www.nirsoft.net/utils/dns_query_sniffer.html According to the DNSQuerySniffer requirements, you will need to install either WinPcap capture driver or Microsoft network Monitor Driver. Please find below links to these drivers:http://www.winpcap.org/install/default.htmhttp://www.microsoft.com/downloads/details.aspx?FamilyID=983b941d-06cb-4658-b7f6-3088333d062f&displaylang=en How to use the app Once installed, please run the DNSQuerySniffer with the administrator rights. During the first run, you will be prompted to select the driver for the capture method and the source interface. Please select Raw Sockets method and choose one of the following network adapters:127.0.0.0 – if you are using SafeDNS Agent.192.168.X.X or 10.X.X.X – if the settings are configured on the network level. Start the application that requires troubleshooting. The screen of the DNSQuerySniffer shows the list of the hostname addresses, their corresponding IP addresses, and additional service information. In the example below, the domain csi.gstatic.com was resolved to the IP address 195.46.39.13 - SafeDNS BlockPage address.This means that the domain csi.gstatic.com is currently blocked either because its category is blocked or because it is on the Denylist. Please note, that SafeDNS BlockPages can the following addresses:195.46.39.1, 195.46.39.2, 195.46.39.3, 195.46.39.11, 195.46.39.12, and 195.46.39.13. How to solve the issue? Please look up for the category of the domain with the SafeDNS online tool: https://www.safedns.com/check-website After that, check if this category is not blocked in your SafeDNS Dashboard or is not on the Denylist.Resellers White Labeling - SafeDNS This guide will describe how to deploy a white-labeled edition of SafeDNS service for your customers. Prerequisites To deploy a white-labeled version of the SafeDNS service you should prepare the following images and send them to your Account Manager.: logo for login page (size 270x150, png with transparency) logo for dashboard pages (size 540x108, png) logo for a favicon (size 40x40, png with transparency) After becoming a white-labeled reseller you will be able to define custom text and links to show your customers on the welcome screen (first page of the dashboard). Also please send to your Account Manager information on the name and IP address of the host where your user's dashboard will be accessed by your customers. e.g. control.yourdomain.com Then you should complete the following tasks on your side: Get an SSL certificate for your domain (yourdomain.com in your case) or a single host (control.yourdomain.com). If you will use the certificate for the domain then it should be a wildcarded certificate. Set Nginx or Apache server that will proxy requests to our dashboard (host https://resellers.safedns.com) from your host control.yourdomain.com. We offer such variants to provide full white labeling, not like others where only the entry portal has your URL. Example of Nginx config file server { listen 80; listen 443 ssl; root /var/www/html; ssl_certificate /etc/ssl/private/control.yourdomain.com.combined.pem; ssl_certificate_key /etc/ssl/private/control.yourdomain.com.key; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; server_name control.yourdomain.com; if ( $request_uri ~ ^(/downloads/|/nic/) ) { break; } if ( $scheme = "http" ) { rewrite ^/(.*)$ https://control.yourdomain.com/$1 permanent; } location / { proxy_set_header X-Forwarded-Host "control.yourdomain.com"; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass https://resellers.safedns.com; } } Example of Apache configuration Install apache2: sudo apt-get install apache2 Connect needed modules: sudo a2enmod proxy remoteip Tune configuration file for Apache Web Server: Example of Apache config file: ServerAdmin  serveradmin@control.yourdomain.com Redirect permanent / https://control.yourdomain.com/ ServerName control.yourdomain.com SSLEngine on SSLCertificateKeyFile /etc/ssl/private/control.yourdomain.com.key SSLCertificateFile /etc/ssl/private/control.yourdomain.com.combined.pem ServerAdmin  serveradmin@control.yourdomain.com  SSLProxyEngine On SSLProtocol -all +TLSv1 +TLSv1.1 +TLSv1.2 ProxyPass /  https://resellers.safedns.com/ ProxyPassReverse  /  https://resellers.safedns.com/ RemoteIPHeader X-Real-IP RemoteIPHeader X-Forwarded-For Restart Apache Web Server: sudo service apache2 restart We'll identify requests from your users by the combination of X-Forwarded-Host header and IP address of your host and will show a white-labeled edition for your users. Screenshots of the white-labeled version Login screen: Main page of the Dashboard: Customization page: Further customization Additionally, we offer customization of the dashboard so you can change the dashboard appearance for your users. You can change: Brand data - company name, contact emails Styles – change color scheme and icons Favicon – change favicon logo Dashboard logo – change the dashboard logo Main page content – change the main page content, links to instruction, text, images, etc. Footer content – change the information section at the bottom of the dashboard Links to social networks – add your social media to stay in touch with your customers Logo on the login page – change the logo on the main login page of the White-Labeled portal For sending emails from your domain, connect your email in the “Brand data” section of the “Settings” tab on the SafeDNS dashboard. Then, send your SMTP hostname to SafeDNS support team (support@safedns.com). Set up email sending without authentication from mail.safedns.com IP address in your mail server. Also branding of SafeDNS Agent is available for an additional fee. Please contact your Account Manager to get further information and pricing.OpenDNS and Cisco Umbrella migration OpenDNS to SafeDNS migration In this guide, we will tell you how to migrate from OpenDNS to SafeDNS while keeping all settings and preferences.The guide includes an example of router setup, filtering policy settings migration, and categories migration. 1. Set up the router Change the DNS servers in your router to 195.46.39.39 and 195.46.39.40.Please note, that your router's interface might be different from the one in the picture. 2. Add public IP address Add the public IP address of your network to the SafeDNS Dashboard > Settings > Devices. For your convenience, it is always shown at the top of the page, under "Your IP address". This setting is similar to the OpenDNS's Network Settings section. OpenDNS SafeDNSJust copy your public IP address, paste it into the IP address field, and click "Add". SafeDNS also supports Dynamic IP addresses, DynDNS hostnames, and IPv6.More information about router setup can be found here: https://docs.safedns.com/books/installation-guides/page/router-setupIPv6 router setup: https://docs.safedns.com/books/installation-guides/page/router-setup-ipv6 3. Create a custom filtering policy If you need more than one filtering policy, you can always create a new one in the SafeDNS Dashboard > Settings > Policy tab. Each filtering policy has its settings for the Advanced Settings, filtering Categories, AppBlocker, and Allow/Denylists. 4. Apply filtering categories OpenDNS security settings are built into the SafeDNS filtering Categories. For example, Malware/Botnet protection, and Phishing Attacks options of OpenDNS are identical to SafeDNS Botnets, Phishing & Typosquatting, and Malware categories.These categories are already blocked by default in the SafeDNS Dashboard > Categories tab. The "Allowlist only" feature blocks access to any domain not listed on the Allowlist (see below). SafeDNS also has the "Unknown Sites" category for the new non-categorized domains. Transfer settings from the Web Content Filtering tab of OpenDNS to more than 65+ SafeDNS Categories. OpenDNS SafeDNS Here is a transfer list of content filtering categories of OpenDNS vs SafeDNS. OpenDNS category SafeDNS primary category SafeDNS additional category Academic Fraud Academic Fraud Adult Themes Adult Sites Adware Online Ads Alcohol Alcohol & Tobacco Anime/Manga/Webcomic Adult Sites Auctions Trackers & Analytics Automotive Automotive Blogs Blogs Business Services Business Corporate Sites Chat Chats & Messengers Classifieds Classifieds Dating Dating Drugs Drugs E-commerce/Shopping E-commerce Shopping Educational Institutions Education File Storage File Storage Financial Institutions Finances Forums/Message boards Forums Gambling Gambling Games Games German Youth Protection German Youth Protection Child Sexual Abuse (IWF) Government Government Hate/Discrimination Hate & Discrimination Health and Fitness Health & Fitness Humor Humor Instant Messaging Chats and messengers Jobs/Employment Jobs & Career Lingerie/Bikini Adult Sites Movies Movies & Video Music Music & Radio News/Media News & Media Non-Profits Non-profit Nudity Adult Sites P2P/File sharing Torrents & P2P Parked Domains Parked Domains Photo Sharing Photo Sharing Podcasts Music & Radio Politics Politics Pornography Pornography & Sexuality Portals Portals Proxy/Anonymizer Proxies & Anonymizers Radio Music & Radio Religious Religious Research/Reference Science & Technology Search Engines Search Engines Sexuality Pornography and sexuality Social Networking Social Networks Software/Technology Computers & Internet Science & Technology Sports Sports Tasteless Tasteless Television Movies & Video Tobacco Alcohol & Tobacco Travel Travel Video Sharing Movies & Video File Storage Visual Search Engines Search Engines Weapons Weapons Web Spam Botnets Phishing & Typosquatting Webmail Webmail 5. Set up Allow/Denylists You can always allow or block custom domains using Allow/Denylist.Simply enter a domain you want to allow or deny to the list and click "Add". You can also add domains in bulk using the "Edit as list" button. More information about Allow/Denylists and Named lists can be found here. 6. Explore additional features Advanced settings Here you can enable Safe Search for Google and Bing, force the Restricted mode for Youtube, create a custom Blockpage, set up the filtering in the Active Directory environment, and redirect domains to different IP addresses with the Aliases. Schedule Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario. AppBlocker Here you can block individual applications or ecosystems. It is similar to Categories - just select the app you need to block and press "Save changes". 7. Download the SafeDNS Agent app Our service can also be set up on the individual devices.SafeDNS Agent is available for Windows, Linux, and Android systems. iOS and macOS agents are coming soon. More information about the Agent can be found here:Windows - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-windows-setupLinux - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-linux-setupAndroid - https://docs.safedns.com/books/installation-guides/page/safedns-app-for-android-setupUnsupported mobile devices (yet) - https://docs.safedns.com/books/installation-guides/page/mobile-devices-filtering-setup Support If you have any questions about the migration to SafeDNS, please contact our support team via online chat or by email at support@safedns.comCisco Umbrella to SafeDNS migration In this guide, we will tell you how to migrate from Cisco Umbrella to SafeDNS while keeping all settings and preferences.The guide includes an example of router setup, filtering policy settings migration, and categories migration. 1. Set up the router Change the DNS servers in your router to 195.46.39.39 and 195.46.39.40.Please note, that your router's interface might be different from the one in the picture. 2. Add public IP address Add the public IP address of your network to the SafeDNS Dashboard > Settings > Devices. For your convenience, it is always shown at the top of the page, under "Your IP address". This setting is similar to the Cisco Umbrella's Networks section. Cisco Umbrella SafeDNSJust copy your public IP address, paste it into the IP address field, and click "Add". SafeDNS also supports Dynamic IP addresses, DynDNS hostnames, and IPv6.More information about router setup can be found here: https://docs.safedns.com/books/installation-guides/page/router-setupIPv6 router setup: https://docs.safedns.com/books/installation-guides/page/router-setup-ipv6 3. Create a custom filtering policy If you need more than one filtering policy, you can always create a new one in the SafeDNS Dashboard > Settings > Policy tab. Each filtering policy has its settings for the Advanced Settings, filtering Categories, AppBlocker, and Allow/Denylists. 4. Apply filtering categories Cisco Umbrella security settings are built into the SafeDNS filtering Categories. For example, Malware/Botnet protection, and Phishing Attacks options of Cisco Umbrella are identical to SafeDNS Botnets, Phishing & Typosquatting, and Malware categories.These categories are already blocked by default in the SafeDNS Dashboard > Categories tab. The "Allowlist only" feature blocks access to any domain not listed on the Allowlist (see below). SafeDNS also has the "Unknown Sites" category for the new non-categorized domains. Transfer settings from the DNS Policies page of Cisco Umbrella to SafeDNS Categories. Cisco Umbrella SafeDNS Here is a transfer list of content filtering categories of Cisco Umbrella vs SafeDNS. Cisco Umbrella category SafeDNS primary category SafeDNS additional category Adult Adult Sites Advertisements Online Ads Alcohol Alcohol & Tobacco Animals and Pets Blogs Arts Arts Astrology Astrology Auctions Business E-commerce Business and Industry Business E-commerce Cannabis Drugs Chat and Instant Messaging Chats & Messengers Cheating and Plagiarism Academic Fraud Cloud and Data Centers Computers & Internet Computer Security Security section Computers and Internet Computers & Internet Conventions, Conferences, and Trade Shows Business Cryptocurrency E-commerce Cryptojacking Dating Dating Digital Postcards Computers & Internet Entertainment Dining and Drinking Alcohol & Tobacco DIY Projects Blogs E-commerce DoH and DoT Computers & Internet Dynamic and Residential Computers & Internet Education Education Entertainment Entertainment Extreme Adult Sites Hate & Discrimination Fashion Shopping File Transfer Services File Storage Filter Avoidance VPN, Proxies, and Anonymizers Finance Finance Freeware and Shareware Computers & Internet Gambling Gambling Games Games Government and Law Politics, Society, and Law Government Hacking Phishing & Typosquatting Malware and Ransomware Hate Speech Hate & Discrimination Health and Medicine Health & Fitness Humor Humor Hunting Weapons Illegal Activities Illegal Activity section Illegal Downloads Torrents & P2P Illegal Drugs Drugs Infrastructure and Content Delivery Networks Computers & Internet Internet of Things Computers & Internet Internet Telephony Computers & Internet AppBlocker's VoIP Job Search Jobs & Career Lingerie and Swimsuits Adult Sites Shopping Lotteries Gambling Military Weapons Mobile Phones Computers & Internet Science & Technology Museums Arts Nature and Conservation Blogs News News & Media Non-governmental Organizations Business Non-profit Non-sexual Nudity Adult Sites Not Actionable Contentless Domains Online Communities Forums Social Networks Online Document Sharing and Collaboration File Storage Online Meetings Chats & Messengers Online Storage and Backup File Storage Online Trading Finance E-commerce Organizational Email Webmail Paranormal Astrology Parked Domains Parked Domains Peer File Transfer File Storage Personal Sites Blogs Personal VPN VPN, Proxies, and Anonymizers Photo Search and Images Photo Sharing Politics Politics, Society, and Law Pornography Pornography & Sexuality Private IP Addresses as Host Computers & Internet Professional Networking Computers & Internet Real Estate Real Estate Recipes and Food Health & Fitness Reference Computers & Internet Regional Restricted Sites (Germany) German Youth Protection Religion Religious SaaS and B2B Corporate sites Business Safe for Kids Kids, Home & Family Education Science and Technology Science & Technology Search Engines and Portals Search Engines, Portals Sex Education Adult sites Education Shopping Shopping Social Networking Social Networks Social Science Science & Technology Society and Culture Politics, Society & Law Software Updates Computers & Internet Sports and Recreation Sports Streaming Audio Music & Radio Streaming Video Movies & Video Terrorism and Violent Extremism Hate & Discrimination Tobacco Alcohol & Tobacco Transportation Automotive Travel Travel URL Shorteners Computers & Internet Weapons Weapons Web Cache and Archives Computers & Internet Web Hosting Computers & Internet Web Page Translation Computers & Internet Web-based Email Webmail 5. Set up Allow/Denylists You can always allow or block custom domains using Allow/Denylist.Simply enter a domain you want to allow or deny to the list and click "Add". You can also add domains in bulk using the "Edit as list" button. More information about Allow/Denylists and Named lists can be found here. 6. Explore additional features Advanced settings Here you can enable Safe Search for Google and Bing, force the Restricted mode for Youtube, create a custom Blockpage, set up the filtering in the Active Directory environment, and redirect domains to different IP addresses with the Aliases. Schedule Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario. AppBlocker Here you can block individual applications or ecosystems. It is similar to Categories - just select the app you need to block and press "Save changes". 7. Download the SafeDNS Agent app Our service can also be set up on the individual devices.SafeDNS Agent is available for Windows, Linux, and Android systems. iOS and macOS agents are coming soon. More information about the Agent can be found here:Windows - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-windows-setupLinux - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-linux-setupAndroid - https://docs.safedns.com/books/installation-guides/page/safedns-app-for-android-setupUnsupported mobile devices (yet) - https://docs.safedns.com/books/installation-guides/page/mobile-devices-filtering-setup Support If you have any questions about the migration to SafeDNS, please contact our support team via online chat or by email at support@safedns.com