DoH is a protocol introduced in 2018 as a solution to improve DNS security by encrypting queries through HTTPS, which is advertised as a method to prevent your ISP from tracking your activity, allow you to bypass censorship and protect you against DNS data manipulation (MiMT). In the start of 2020, popular web-browser like Mozilla has started to turn DoH by default in the US and others are experimenting it. Microsoft is also considering the addition of DoH in Windows 10.
While bringing encryption is always an important thing, including in oppressive countries, DoH isn't a bulletproof solution and may actually cause more problem than it solve. The rise of service providing DoH, especially US companies like Google or Cloudflare, could harm your privacy by offering additional tracking capabilities (ex : TLS resumption, which allow to reuse a previous encrypted state for future connection to the same server, could be used to track your browser across IP adress changes) and centralizing DNS traffic into popular DoH resolver.
But moreover, programs and malwares could abuse public DoH provider to evade DNS filtering (like Pihole) and communicate with telemetry service or command-and-control server. See Godlua malware.
Theses lists (updated every month) has been created for security purpose ONLY. There are not a tool to prevent your employee from bypassing the fact that you're monitoring/blocking their online activity ! If you suspect your entity to do so, consider using a VPN or Tor Browser.
You can also block
port 853 for DNS over TLS (DoT)
Blocking DoH entirely might not be the best approch for everyone, especially if your company wants the benefits of using encrypted DNS while being able to analyse suspicious communications. This paper demonstrate the possibility of redirecting all traffic from
port 453 to PolarProxy and Security Onion, allowing you to analyse DoH traffic in an unencrypted form.
DoH draft for the IETF ("Privacy Concerns" and "Security Considerations").
* Wall icon drawed by Eucalyp (flaticon.com)