<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>There are a few steps you can take to implement a PDNS. <strong>Watch this video</strong> as Paul walks you through one simple step to get started today.</p> <!--more--> <p>&nbsp;</p> <div class="hs-embed-wrapper" data-service="youtube" data-responsive="true" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 853px; min-width: 256px; display: block; margin: auto;"><div class="hs-embed-content-wrapper"><div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.27%; margin: 0px;"><iframe width="853" height="480" src="https://www.youtube.com/embed/XAe39Q4x8AU?rel=0" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"></iframe></div></div></div> <p>&nbsp;</p> <p>As mentioned before, the importance of having security is night and day when it comes to protecting your systems. There are many security measures you can take and many steps to implement them. But with this one simple step, you can implement PDNS on your systems easily.</p> <p>Don’t wait to start protecting yourself. Let <a href="https://www.threatstop.com/"><span>ThreatSTOP</span></a> stop the threats before they become a problem. Get in touch with one of our experts today and find out more about how we can protect you and your information.</p> <p>&nbsp;</p> <p style="font-weight: bold;">Learn More:</p> <p><a href="/blog/what-dns-security-does-an-enterprise-need" rel="noopener" target="_blank">What DNS Security Does A Typical Enterprise Need?</a></p> <p><a href="/dns-defense-cloud" rel="noopener" target="_blank">DNS Defense Cloud</a>&nbsp;</p> <p><a href="/solutions/threatstop-dns-firewall-overview" rel="noopener" target="_blank">DNS Defense</a>&nbsp;</p> <p style="font-weight: bold; font-size: 16px;">&nbsp;</p> <p style="font-weight: bold;">Video Transcript</p> <p style="font-weight: bold;">Timestamps</p> <p>0:00 Intro<br>0:05 A Simple PDNS Implementation</p> <p>0:05 A Simple PDNS Implementation</p> <p>The real simplest, the simplest protected DNS implementation is to pick your favorite open recursive service, like 9999, and just configure a point at it. All that's happening is it's downloading stuff to block. You don't have to have people looking at the threat intelligence, you just trust them. You don't have to deploy, you know, you don't have to do anything.&nbsp;</p> <p>You change two settings and you got a bunch of protective DNS, not nearly as much as you might hope for. You don't know whether or not you're infected. You just hope it's blocking stuff and it's some protection for no effort, you can go there if you want.</p></span>