Our team frequently visits customer offices, and we've had to disable mDNS to enhance security, which unfortunately prevents the use of Miracast for connecting to wireless displays. I'm fine with enabling mDNS on our private or internal networks as we have control and can manage risks effectively. However, I want to avoid fully enabling mDNS in public networks due to potential security threats. Our employees are asking if there's a way to activate Miracast without opening mDNS broadly. How do other companies manage this situation? Is there a best practice for enabling Miracast while minimizing the risks associated with mDNS on public networks?
3 Answers
It's essential to consider the security implications of opening up mDNS. Rather than solely relying on network numbers, you might want to look into identifying and segmenting your networks more intelligently. User mistakes can often be the most significant threat here. Maybe a guest network for devices needing Miracast can help without exposing your main business systems.
Enabling mDNS could pose risks if not handled properly. While it generally helps in local DNS resolution, poorly designed apps could exploit it if they make unqualified queries without proper authentication, leading to security breaches. Make sure any app using mDNS verifies the server to prevent unauthorized access. Some networks without proper isolation could also be vulnerable to ARP poisoning.
You might want to check Microsoft's recommended best practices for using mDNS in enterprises; it seems like you might be taking a backward approach. In my experience, I set up Miracast on a separate Guest VLAN that was isolated from the main network, which worked out well. That way, the risks were contained.

True! VLANs make a big difference. Just be cautious with the setup, as some displays just connect without touching the main network, which can be hit or miss.