Docs / Admin Console / Configurable objects and their associations
Browse Admin Console
Admin Console

Configurable objects and their associations

How ScoutDNS's object model fits together: Allow/Block lists, Policies, Organizations, Sites (WAN/LAN), and Profiles, and the rules for which objects can attach to which.

Updated Mar 31, 2025 • 4 min read

ScoutDNS uses an object-based configuration model. A small number of object types compose into every deployment shape, from a single-site small business to a multi-tenant MSP. This article explains each object and what it can attach to.

Quick reference

ObjectWhat it isAttaches to
Allow/Block ListPer-domain overrides for policy decisionsOne or more Policies (or marked global)
PolicyThe rulebook: categories, applications, threats, Safe Search, etc.WANs, LANs, Profiles, Persona groups
OrganizationContainer for multi-tenant segmentationSites, Profiles, organization-scoped objects
SitePhysical location grouping WANs and LANsAn Organization (if enabled)
WAN / LANNetwork within a SiteA Site; carries one Policy and one Block Page
ProfileGroup of devices running the roaming agentAn Organization (if enabled); carries one Policy and one Block Page
PersonaAD or Entra ID group-to-policy mappingA Domain/Tenant and an Organization

Allow/Block lists

Allow/block lists hold per-domain overrides. They can be global (apply across every policy automatically) or standard (attached to specific policies). See Working with allow and block lists for syntax and evaluation order.

Attachment rules

  • One list can be assigned to one policy.

    One list, one policy

  • One list can be assigned to multiple policies.

    One list, many policies

  • One policy can hold multiple lists.

    Many lists, one policy

Policies

Policies are the rulebooks that govern end-user devices: which categories, applications, and threats are blocked; whether Safe Search is enforced; what the block page looks like, etc. Full reference in Working with policies.

Attachment rules

  • A policy is assigned to WANs and LANs within a Site (for network-based deployments).

    Policy assigned to a WAN

  • A policy is assigned to Profiles (for roaming clients).

    Policy assigned to a Profile

  • A policy is assigned to Persona group entries (for AD/Entra-group-based filtering).

  • A policy holds zero or more allow/block lists for domain-level overrides.

Organizations

Organizations are container-like objects that group Sites and Profiles for multi-tenant segmentation. The Organizations tab is enabled by default for MSP accounts and available for Enterprise accounts on request.

Attachment rules

  • Sites and Profiles are assigned to Organizations.
  • Policies, allow/block lists, and block pages can be tagged to an Organization (created from inside the org view) so external Org Operators can manage them.

Organizations as the top-level container

Sites

Sites represent physical locations and group the WAN/LAN networks at each location. Both WAN Forwarding and LAN Relay deployments live here. See the Quickstart for the basic site/WAN setup.

Attachment rules

  • Sites are assigned to Organizations when the tab is enabled.

    Sites under an Organization

  • WANs and LANs are created inside a Site.

    WANs and LANs inside a Site

  • Each WAN and LAN gets one Policy.

  • Each WAN gets one Block Page (LANs inherit from the WAN).

    Block page attached to a WAN

Profiles

Device Profiles group devices running the roaming agent under a common policy. Each device belongs to exactly one profile.

Attachment rules

  • Profiles are assigned to Organizations when the tab is enabled.

    Profile under an Organization

  • Each Profile carries one Policy.

  • Each Profile carries one Block Page.

    Block page on a Profile

  • Client devices are assigned to a Profile during install (via the install key) and can be reassigned later.

    Clients assigned to a Profile

Putting it together

A typical deployment with all of the objects in play:

All objects in a single deployment

[!TIP] When designing your setup, start at the policy layer and work outward. Policies are the durable assets, sites, profiles, and personas come and go but a well-tuned policy gets reused everywhere.

Was this article helpful?
Still stuck? Open a ticket and we'll follow up by email.
Open a ticket
Last updated Mar 31, 2025