Information
Without re-authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity.
In addition to the re-authentication requirements associated with session locks, organizations may require re-authentication of devices, including, but not limited to, the following other situations:
(i) When authenticators change;
(ii) When roles change;
(iii) When security categories of information systems change;
(iv) After a fixed period of time; or
(v) Periodically.
DNS does perform server authentication when DNSSEC or TSIG/SIG(0) are used, but this authentication is transactional in nature (each transaction has its own authentication performed). So this requirement is applicable for every server-to-server transaction request.
Solution
Log on to the DNS server using the Domain Admin or Enterprise Admin account or Local Administrator account.
Press Windows Key + R, execute dnsmgmt.msc.
On the opened DNS Manager snap-in from the left pane, expand the server name and then expand Forward Lookup Zones.
From the expanded list, click to select the zone.
Once selected, right-click the name of the zone, and from the displayed context menu, go to Properties.
On the opened domain's properties box, click the General tab.
If the Type: is not Active Directory-Integrated, configure the zone for AD-integration.
Select 'Secure only' from the Dynamic updates: drop-down list.