DDI Central security framework

DDI-Led Defense-in-Depth Security for DNS and DHCP

Secure the services every endpoint already trusts. Four coordinated layers—DNS Firewall, Threat Intelligence, Anomaly Detection, and Zero-Touch Containment—turning DNS and DHCP into active security controls for the modern enterprise.

  • Block malicious domains at the DNS layer
  • Ingest curated & STIX/TAXII threat feeds
  • Detect DNS & DHCP anomalies with ML
  • Quarantine risky clients automatically
Threat landscape

The four moves attackers love

DNS and DHCP are where modern breaches actually begin. Every attacker plays one of four hands.

Redirect

DNS hijack, rogue records, resolver abuse — attackers choose your destination for you.

Disrupt

NXDOMAIN storms, query floods, DHCP exhaustion — availability destroyed at the protocol layer.

Impersonate

Spoofed leases, rogue DHCP, DHCP replay, MAC churn — attackers claim a trusted identity.

Hide

DGA, fast-flux, IP-only C2, lookalike domains — malware disappears into DNS noise.

Strategic stakes

The earliest security decisions in your network should not be the weakest

DNS decides where traffic goes. DHCP decides how devices connect. Treated as plumbing, risk moves quietly. Integrated with IPAM as a complete DNS, DHCP, and IPAM (DDI) platform, these services become governed security controls that stop threats earlier, limit spread, and lower containment costs through policy-driven automation.

DNS

Where every device asks the way.

If attackers steer the resolver, they steer every device on your network. Govern resolution and you govern direction.

DHCP

Where every device joins the network.

DHCP decides who joins and what configs they receive. Lose the lease, lose the blast radius.

Most attacks do not announce themselves. They arrive as a domain lookup, a lease request, or a pattern that looks ordinary — until it is too late.

The cost

What it actually costs to leave DNS and DHCP outside your security strategy

The earliest decisions in your network do not show up in dashboards — they show up in dwell time, audit findings, and the questions executives ask after an incident. Scroll the chapters. The visual moves with you.

The DDI strategy

From scattered services to one security control plane

Watch the shift unfold — how complexity spreads, visibility fragments, and control weakens, and how DDI Central restores clarity across DNS and DHCP.

The layers

A guided briefing on the four layers that turn DNS and DHCP into a security control plane

Walk the strategy the way a security leader would: one continuous posture, four coordinated enforcement layers, each closing a specific gap — so control begins earlier, visibility stays whole, and response moves at the speed of the network.

Layer 1Filter

DNS Firewall

Instant filtering of known-bad domains and policy-based DNS control via RPZ.

Inside Layer 1 →
Layer 2Gain Intel

Threat Intelligence

Live, curated domain and IP intelligence with confidence-scored enforcement.

Inside Layer 2 →
Layer 3Predict

Anomaly Detection

ML-driven screening of DNS and DHCP behavior to catch emerging threats.

Inside Layer 3 →
Layer 4Contain

Zero-Touch Containment

Automated quarantine across DNS, DHCP, or both — based on risk severity.

Inside Layer 4 →
A technical deep dive

Operational depth, layer by layer.

Open any layer for the underlying capability detail.

Layer 1 DNS Firewall — capabilities
  • Response Policy Zones (RPZ): block, redirect, sinkhole, passthru, NXDOMAIN, NODATA.
  • Response Rate Limiting protects authoritative services from amplification and floods.
  • Per-view, per-client policy enforcement with custom redirect targets.
  • Security analytics on blocked queries, sources, and patterns.
Layer 2 Threat Intelligence — capabilities
  • Curated feeds from ManageEngine CloudDNS and supported vendors.
  • Standards-compliant STIX/TAXII ingestion for custom intelligence.
  • Confidence scoring drives automatic enforcement thresholds.
  • Forensic trail per indicator: who, what, when, source, action.
Layer 3 Anomaly Detection — capabilities
  • ML baselines for DNS query volume, entropy, NXDOMAIN ratio, and lookalikes.
  • DHCP behavioral signals: starvation, rogue servers, MAC churn, lease anomalies.
  • Scored evidence for prioritized investigation.
  • Continuous baseline tightening to reduce noise.
Layer 4 Zero-Touch Containment — capabilities
  • Quarantine via DNS, DHCP, MAC blocking, or any combination.
  • Configurable severity thresholds for risk-based automation.
  • Full activity trails captured for every containment action.
  • Auto-triage workflows that free analysts from manual prioritization.
Layer 1 · Filter

DNS Firewall: stop known threats before they resolve

DDI Central's DNS Firewall intercepts queries before they reach dangerous destinations. With RPZ-driven policy enforcement, security teams block, redirect, or sinkhole known-bad destinations and keep users away from malicious domains before access is established.

  • Block recognized malicious or suspicious domains at the DNS layer.
  • Redirect users to safe destinations with custom policy responses.
  • Add policy-based control with RPZ to block, redirect, or sinkhole risky queries.
  • Protect authoritative services against overload with response rate limiting.
"Known bad should never become active risk."

Malicious query intercepted · Resolution denied · Exposure prevented

Layer 2 · Gain Intel

Threat Intelligence: give your DNS layer live awareness

Curated, real-time threat feeds enrich every resolution decision. STIX/TAXII compatibility means your resolver gets the same intelligence your SOC already trusts — and acts on it automatically.

  • Ingest curated, real-time threat feeds from trusted sources.
  • Support custom STIX/TAXII-based threat intelligence.
  • Leverage vendor-approved confidence scores and categorizations to stratify risk and prioritize the highest-confidence threats for blocking first.
  • Maintain a forensic trail for investigation, compliance, and post-incident analysis.
"If the world knows the threat, your resolver should know it too."

Live feeds enter · Confidence scores rise · High-risk domains are enforced automatically

Layer 3 · Predict

Anomaly Detection: catch what signatures have not seen yet

Machine learning establishes a baseline of normal DNS and DHCP behavior, then surfaces deviations the moment they appear — DGA traffic, beaconing, lease anomalies, MAC churn. Early signal. Less noise. Smaller blast radius.

  • Surface novel attack patterns before threat feeds catch up.
  • Tighten ML baselines over time to expose true incidents.
  • Prioritize investigation with scored evidence instead of instinct.
  • Detect DHCP starvation, rogue servers, and identity churn.
"When the indicator does not exist yet, behavior still leaves a trail. Patterns emerge before incidents do."
Signal intakePattern & behaviorScored anomalyDNSx9kq2m-7z-domain.coma1.b2.c3.d4.example.comcdn.update.ioDHCPLease requestClient ID / DUIDMAC ↔ IP mapPattern scanx9kq2m-7z-domainEntropyHigh entropySubdomainBehavior engineBaselineBehavior deviationTunnellingSubdomain burstAmplificationDuplicate DUIDLease churnDHCP starvationDNS anomaly score: 92/100. Driven by Tunnelling, Subdomain burst, and Amplification signals.DNS anomaly92/100severityTunnelling · subdomain burstWhy score 92/100 Tunnelling — covert data over DNS Subdomain burst — DGA-like fan-out Amplification — abnormal response ratio3 high-severity signals correlatedDHCP anomaly score: 87/100. Driven by Duplicate DUID, Lease churn, and DHCP starvation signals.DHCP anomaly87/100severityDuplicate DUID · lease churnWhy score 87/100 Duplicate DUID — same client ID, two leases Lease churn — unstable rebinding pattern DHCP starvation — pool exhaustion attempt3 high-severity signals correlated
Layer 4 · Contain

Zero-Touch Containment: do not just detect. Contain immediately

Block the destination. Block the resolver. Deny network admission. DDI Central quarantines suspicious clients across DNS, DHCP, or both — automatically, based on configurable severity thresholds — while keeping security teams in control.

  • DNS quarantine + DHCP quarantine + MAC blocking in one action.
  • Configurable severity thresholds for risk-based isolation.
  • Auto-triage frees analysts and accelerates validation.
  • Forensic trails captured automatically for every action.
"Attackers do not wait. Your containment should not either."
Proof & trust

DDI-powered correlation turns alerts into arrests

If you can't bind query → lease → device → user, you can't contain. DDI Central holds the binding chain.

90%Shrinkage in attackers' dwell time
100%Auto-triage coverage
4Coordinated layers
0Manual handoffs in containment
Hostname
DHCP Lease
IP · MAC
DNS History
User

One binding chain. Every action attributable. Every decision auditable.

"Who had this IP last week?"

Historical lease attribution on demand — instantly surface which device or user owned any address at any point in time.

"Which domains did this IP resolve?"

DNS resolution timeline for every address — full query history enriched with identity context.

"Where else did this hostname appear?"

Lateral movement tracing across scopes — follow a threat actor's footprint across your entire network.

One operational stack

How the defense-in-depth stack operationalizes the 6 security decisions

Incidents don't fail at detection. They fail at decisions. A defense strategy becomes valuable only when it helps teams make the right security decisions consistently. In DDI Central, the defense-in-depth stack brings together DNS Firewall, Threat Intelligence, Anomaly Detection, and Zero-Touch Containment to operationalize six key security decisions at the DNS and DHCP layer.

  1. 01Control

    Can security enforcement be governed centrally?

    The stack gives teams a centrally governed way to define and apply DNS and DHCP security controls across environments. Instead of fragmented enforcement, protection is coordinated through one operational layer.

  2. 02Data

    Do we have the right DNS and DHCP signals in real time?

    The stack works on live DNS and DHCP activity as its decision substrate. Query behavior, lease activity, policy hits, anomaly indicators, and known threat signals become the operational data behind every action.

  3. 03Policy

    Can we actively block, redirect, and regulate malicious activity?

    This is where enforcement becomes real. DNS Firewall applies controls such as DNS sinkholing, RPZ, and RRL, while Threat Intelligence continuously strengthens enforcement with known malicious domain intelligence.

  4. 04Visibility

    Can we surface suspicious behavior early enough to act?

    The stack improves visibility by combining Threat Intelligence for known bad infrastructure and Anomaly Detection for suspicious DNS and DHCP behavior that static policies alone may miss.

  5. 05Automation

    Can we contain threats quickly without waiting for manual response?

    With Zero-Touch Containment, the stack moves from detection to action. Suspicious or risky activity can trigger containment workflows automatically, helping reduce attacker dwell time and limiting exposure earlier.

  6. 06Assurance

    Can we prove what happened and how the stack responded?

    An effective defense layer must also be verifiable. Policy hits, anomaly detections, threat-intel-driven blocks, and containment actions together create an evidence trail that supports investigation, validation, and post-incident review.

One control plane

Wherever users go, policy is already there

Users roam. Perimeters disappear. DDI Central enforces the same defense-in-depth posture across every environment.

DDI Central · Policy planeData centerCore DNS & DHCPBranch edgeMPLS · SD-WANRoaming or Remote UsersFull-tunnel VPNCloud & remote siteDistributed access
One policy plane → consistent DNS & DHCP enforcement across every connection path.
The outcomes

What enterprises gain when control starts earlier

The path from signal to action becomes shorter, cleaner, and more decisive.

01

Lower exposure

Known threats blocked earlier. Suspicious behavior surfaced faster. Risky clients isolated before lateral movement grows.

02

Faster decisions

Move from alerting to automated action at the DNS and DHCP layers — without waiting for human bottlenecks.

03

Stronger resilience

Layered prevention, intelligence, behavior, and containment — a unified DDI security posture by design.

04

Reduced risk

Audit-friendly visibility into what was blocked, when, and why — with a forensic trail attached to every decision.

05

Scalable control

One control plane across HQ, branches, cloud, roaming users, and IoT — policy that travels with the user.

FAQ

Questions executives and architects ask first.

What is DDI-led defense in depth?

A layered approach to securing DNS, DHCP, and IP address management — so known threats can be blocked, unknown behavior can be detected, and compromised clients can be contained automatically.

How does DDI Central improve DNS security?

Through DNS firewall-based domain blocking, RPZ-driven policy control, threat intelligence feed ingestion, anomaly detection, and DNS-based quarantine workflows — coordinated in one control plane.

Can DDI Central detect unknown DNS and DHCP threats?

Yes. Its anomaly detection engine uses machine learning to identify suspicious DNS traffic and DHCP client behavior before such activity is formally recognized by threat feeds or authorities.

Does DDI Central support automated threat containment?

Yes. DDI Central can quarantine suspicious clients and domains automatically when severity thresholds are exceeded, and admins can configure containment through DNS, DHCP, or both.

Does DDI Central support STIX/TAXII threat intelligence feeds?

Yes. The platform supports ManageEngine CloudDNS and other supported vendors, plus standards-compliant STIX/TAXII sources.

The next step

Govern the doorway to your digital business

DDI-led defense in depth gives security teams earlier control over the services every endpoint already trusts. Harder to disrupt. Harder to misuse. Faster to defend.