Three Apple features can interfere with DNS-based content filtering: Screen Time, Safari Private Browsing protections, and iCloud Private Relay. Learn how to identify and fix each conflict so CleanBrowsing works reliably on all Apple devices.
Apple devices include several privacy and parental-control features that can interfere with DNS-based content filtering services like CleanBrowsing. Three features cause the most problems:
| Feature | What It Does | How It Breaks DNS Filtering |
|---|---|---|
| Screen Time iOS 12+, macOS Catalina+ |
Built-in parental controls with web content restrictions | Intercepts DNS requests at the device level, overriding network-based DNS filtering |
| Safari Private Browsing Protections iOS 17+, macOS Sonoma+ |
"Advanced Tracking and Fingerprinting Protection" in Safari’s Private Browsing mode | Routes DNS queries through Apple’s servers in Private Browsing tabs, bypassing your network DNS |
| iCloud Private Relay iCloud+ subscribers |
Encrypts and proxies all Safari traffic through two relay servers | Completely bypasses network DNS — all DNS resolution happens on Apple’s relay servers |
Each feature must be addressed separately. The sections below cover the problem, symptoms, and fix for each one.
Apple’s Screen Time feature, available on iOS 12+ and macOS Catalina+, includes a Content & Privacy Restrictions module with its own Web Content filtering. When this feature is active, it intercepts DNS requests at the device level — similar to how CleanBrowsing and other DNS-based content filtering services work.
Since Screen Time operates at the device level, it takes precedence over network-level DNS filtering, creating two competing filter systems that interfere with each other.
Both Screen Time and CleanBrowsing attempt to control web traffic by intercepting DNS requests:
When both are active, Screen Time’s device-level interception overrides the network configuration. This can cause DNS queries to bypass CleanBrowsing entirely, or create unpredictable behavior where some requests are filtered by Screen Time and others by CleanBrowsing.
You may be experiencing a Screen Time conflict if you notice:
nslookup -type=txt iptest.whois.dnscontest.cleanbrowsing.org 185.228.168.10 on the device does not return CleanBrowsing filter informationDisable Screen Time’s Web Content filtering and rely solely on CleanBrowsing for content filtering. This eliminates the device-level interception and allows network-based DNS filtering to function as intended.
Why this is the right approach:
After changing this setting, verify CleanBrowsing is working by visiting a domain that should be blocked, or run a DNS debug check.
Verify the fix by opening Terminal and running:
nslookup -type=txt iptest.whois.dnscontest.cleanbrowsing.org 185.228.168.10
The response should confirm you are using a CleanBrowsing filter.
Starting with iOS 17 and macOS Sonoma, Safari includes an Advanced Tracking and Fingerprinting Protection feature that activates in Private Browsing mode. When enabled, Safari routes DNS queries through Apple’s own resolvers instead of your configured network DNS.
This means that when a user opens a Private Browsing tab in Safari, their DNS requests bypass CleanBrowsing entirely. Sites that should be blocked will load normally in Private Browsing, even though filtering works correctly in regular Safari tabs.
Key details:
Disable the Advanced Tracking and Fingerprinting Protection feature so Safari uses your configured DNS in all browsing modes.
Alternative approach: If you want to keep the privacy protections but prevent DNS bypass, you can disable Private Browsing entirely through Screen Time: Settings → Screen Time → Content & Privacy Restrictions → Content Restrictions → Web Content → ensure Private Browsing is not available. This prevents users from opening Private Browsing tabs in the first place.
iCloud Private Relay is a privacy service available to iCloud+ subscribers (any paid iCloud plan). When enabled, it encrypts all Safari web traffic and routes it through two separate relay servers before reaching the destination website.
How Private Relay breaks DNS filtering:
Private Relay is different from a VPN — it only affects Safari and certain system services, not all network traffic. However, since Safari is the default and most-used browser on Apple devices, this effectively disables DNS filtering for most web browsing.
How to tell if Private Relay is active:
Disable iCloud Private Relay so Safari uses your configured network DNS for all requests.
If you only want to disable Private Relay on specific networks (such as your home or office Wi-Fi where CleanBrowsing is configured):
This keeps Private Relay active on other networks while allowing CleanBrowsing to work on your filtered network.
If you manage devices through an MDM solution (Jamf, Mosyle, Intune, etc.), you can deploy a configuration profile that disables Private Relay across all managed devices. Use the com.apple.relay.managed payload with RelayEnabled set to false. This prevents users from re-enabling the feature.
For reliable DNS filtering on Apple devices, use these settings:
| Feature | Setting | Why |
|---|---|---|
| Screen Time → Web Content | Unrestricted Access | Prevents DNS interception conflict |
| Screen Time → App Limits / Downtime | Use as desired | No conflict with DNS filtering |
| Safari → Advanced Tracking Protection | Off | Prevents DNS bypass in Private Browsing |
| iCloud → Private Relay | Off (or per-network) | Prevents Safari DNS bypass via relay servers |
| Network DNS | CleanBrowsing IPs | Handles all content filtering |
After applying all fixes, verify that DNS filtering is working correctly:
nslookup -type=txt iptest.whois.dnscontest.cleanbrowsing.org 185.228.168.10
The response should confirm you are using a CleanBrowsing filter.