Browser-only

Edge Setup

Edge uses a Chromium-style secure DNS feature. The wording can vary slightly by version, but the setup path stays in the browser privacy and security settings.

At a glance

Best for

People who use Microsoft Edge and do not want to change system DNS.

Protocol

DoH

Coverage

Browser-only

Setup time

1 minute

Main input

https://dns.easyhns.com/dns-query

Edge Setup stays focused on the shortest accurate path for this platform.

Guide summary

People who use Microsoft Edge and do not want to change system DNS.DoHBrowser-onlyEasy1 minute

Before you start

Check 01

Use a current Edge build.

Check 02

Managed work devices may lock this setting.

Exact Values

Use the right field for the right input.

URL fields need the full DoH URL. Hostname fields need the DoT hostname only. IP fields need the raw address only.

Custom provider URL

https://dns.easyhns.com/dns-query

Paste this into Edge's secure DNS provider field.

Step-by-Step

Short steps, no filler.

Follow the route in order, then verify the active DNS setting before changing another layer.

Step 01

Open the privacy and security screen

In Edge, go to Settings and more, then Privacy, search, and services.

Step 02

Enable Secure DNS

Scroll to the Security section and turn on Use secure DNS to specify how to lookup the network address for websites.

Step 03

Pick the Easy HNS provider

If your version shows a provider selector, choose the custom option and paste https://dns.easyhns.com/dns-query. If the UI wording differs, search Settings for secure DNS and use the custom provider field there.

How to verify

Check 01

Open a Handshake domain in Edge after saving the provider.

Check 02

If Edge keeps using cached lookups, restart the browser once.

Troubleshooting

Note 01

If you cannot edit Secure DNS, the browser may be controlled by work or school policy.

Note 02

If the custom field is hidden, update Edge and search Settings for secure DNS rather than navigating manually.

Important note about Handshake website security warnings

Using Easy HNS gives you convenient access to Handshake domains, but standard browsers may still show security warnings for some Handshake websites.

Why? Because most mainstream browsers do not natively validate Handshake trust and DANE/TLSA in the same way they validate the conventional HTTPS web.

As a result:

  • some Handshake websites may load over HTTP;
  • some may show a browser warning or missing secure indicator;
  • this is often a browser trust-model limitation, not automatically proof that the website is malicious.

If you want a stronger Handshake-native browsing experience with DANE/TLSA support, use Fingertip for desktop.

Using a VPN?

Easy HNS still works well with VPNs, but browser Secure DNS can override router or system DNS, and some VPN apps force their own resolver. Use 51.24.7.1 only in IP fields, use https://dns.easyhns.com/dns-query only in DoH fields, and verify which layer is actually winning.