Edge Setup
Edge uses a Chromium-style secure DNS feature. The wording can vary slightly by version, but the setup path stays in the browser privacy and security settings.
At a glance
Best for
People who use Microsoft Edge and do not want to change system DNS.
Protocol
DoH
Coverage
Browser-only
Setup time
1 minute
Main input
https://dns.easyhns.com/dns-query
Edge Setup stays focused on the shortest accurate path for this platform.
Guide summary
Before you start
Check 01
Use a current Edge build.
Check 02
Managed work devices may lock this setting.
Use the right field for the right input.
URL fields need the full DoH URL. Hostname fields need the DoT hostname only. IP fields need the raw address only.
Custom provider URL
https://dns.easyhns.com/dns-query
Paste this into Edge's secure DNS provider field.
Short steps, no filler.
Follow the route in order, then verify the active DNS setting before changing another layer.
Step 01
Open the privacy and security screen
In Edge, go to Settings and more, then Privacy, search, and services.
Step 02
Enable Secure DNS
Scroll to the Security section and turn on Use secure DNS to specify how to lookup the network address for websites.
Step 03
Pick the Easy HNS provider
If your version shows a provider selector, choose the custom option and paste https://dns.easyhns.com/dns-query. If the UI wording differs, search Settings for secure DNS and use the custom provider field there.
How to verify
Open a Handshake domain in Edge after saving the provider.
If Edge keeps using cached lookups, restart the browser once.
Troubleshooting
If you cannot edit Secure DNS, the browser may be controlled by work or school policy.
If the custom field is hidden, update Edge and search Settings for secure DNS rather than navigating manually.
Important note about Handshake website security warnings
Using Easy HNS gives you convenient access to Handshake domains, but standard browsers may still show security warnings for some Handshake websites.
Why? Because most mainstream browsers do not natively validate Handshake trust and DANE/TLSA in the same way they validate the conventional HTTPS web.
As a result:
- some Handshake websites may load over HTTP;
- some may show a browser warning or missing secure indicator;
- this is often a browser trust-model limitation, not automatically proof that the website is malicious.
If you want a stronger Handshake-native browsing experience with DANE/TLSA support, use Fingertip for desktop.
Using a VPN?
Easy HNS still works well with VPNs, but browser Secure DNS can override router or system DNS, and some VPN apps force their own resolver. Use 51.24.7.1 only in IP fields, use https://dns.easyhns.com/dns-query only in DoH fields, and verify which layer is actually winning.
Setup guide
Chrome
Use Chrome Secure DNS and point it at the Easy HNS DoH URL.
Protocol
DoH
Scope
Browser-only
Time
1 minute
Setup guide
Brave
Brave follows the same Secure DNS pattern as other Chromium browsers, with its own settings page.
Protocol
DoH
Scope
Browser-only
Time
1 minute
Setup guide
Windows
Add Easy HNS as a custom DoH template first, then select it in Windows network settings.
Protocol
DoH
Scope
System-wide
Time
4 to 6 minutes