# 8. DNS

<figure><img src="https://1888569782-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fj6f1XtdOtNUZVCRH9J44%2Fuploads%2FeDx8I7VKdH241y5ILtBk%2Fimage.png?alt=media&#x26;token=54f6b61d-4c4f-4de4-9703-81326abc369d" alt=""><figcaption></figcaption></figure>

#### 📖 Overview

The **DNS** (Domain Name System) module in ShieldsGuard allows you to manage, edit, and monitor all DNS records associated with your domains — from `A` records to `TXT`, `MX`, `CNAME`, and more.

Whether you're launching a new application, configuring email security, or validating services like Google, Yandex, or Microsoft, this module provides a full-featured, user-friendly interface to handle all DNS-level operations.

> 🛡️ Proper DNS management is the first step in securing and ensuring the availability of your web infrastructure.

#### 🔧 Supported DNS Record Types

| Type    | Purpose                                                 |
| ------- | ------------------------------------------------------- |
| `A`     | Maps a domain or subdomain to an IPv4 address           |
| `AAAA`  | Maps a domain to an IPv6 address                        |
| `CNAME` | Points a subdomain to another domain                    |
| `MX`    | Defines mail exchange servers for email delivery        |
| `TXT`   | Used for verifications (SPF, DKIM, DMARC, Google, etc.) |
| `NS`    | Defines name servers for the domain                     |
| `SRV`   | Specifies services with protocol, port, and weight      |
| `PTR`   | Used for reverse DNS lookups                            |

#### ⚙️ DNS Editing Workflow

1. Go to **DNS module**
2. Click **Create DNS**
3. Select the record type (A, TXT, etc.)
4. Enter:
   * **DNS Name** (e.g., `@`, `www`, `api`)
   * **IP/Value** depending on record type
   * **TTL** (or keep it auto)
5. Click **Create**
6. Entry appears in the DNS record table

> ✏️ You can edit any record later or delete it with one click.

***

#### 🚨 Best Practices

| Practice                                | Reason                                                |
| --------------------------------------- | ----------------------------------------------------- |
| Always set TTL > 300 for stable records | Reduce DNS lookup overhead                            |
| Keep `@` and `www` records consistent   | Ensure root and subdomain both resolve properly       |
| Use SPF/DKIM/DMARC for all domains      | Prevent email spoofing and phishing                   |
| Monitor TTL on validation records       | Google, Microsoft, Yandex validations often use TTL 1 |
| Avoid wildcard CNAMEs unless needed     | They can override valid subdomain records             |

***

> 🎯 The DNS module gives you full control of how your domain resolves and behaves — from performance to security and compliance. One misconfigured record can break access or create a vulnerability — with ShieldsGuard, you're always in control.
