Docs / Policies & Filtering / Active Directory group policies
Browse Policies & Filtering
Policies & Filtering

Active Directory group policies

Apply ScoutDNS policy by Active Directory group membership so the policy follows the user across devices. No domain-controller access required; AD info is collected by the roaming agent.

Updated Aug 23, 2025 • 4 min read

ScoutDNS can enforce policy by Active Directory group membership so the policy follows the user, not the device. Useful when:

  • The same shared device serves different users with different access needs.
  • Roaming users move between devices and you want a single source of truth (the AD group) driving filtering.
  • You want different policies for Sales, Engineering, Service Desk, etc. without touching each device.

[!NOTE] For Microsoft Entra ID (formerly Azure AD) group-based policy, see Configure Entra ID based policies instead. This article covers on-prem Active Directory.

How AD sync works (no domain-controller access)

ScoutDNS does not connect directly to your domain controllers. There’s no sync VM, no service account, no LDAP bind.

Instead, the roaming agent collects the domain, user, and group information directly from each client device when a user logs in. That data is uploaded to ScoutDNS and used to build a Persona, the object that maps AD groups to policies.

This means three things matter:

  1. Devices must run the ScoutDNS roaming agent. If you haven’t deployed agents yet, start there.
  2. A user has to sign in at least once on an agent-equipped device for their groups to be discovered.
  3. Group visibility is bounded by what your users actually log into. Groups that no agent-equipped user belongs to won’t appear.

Step 1: Enable user policies on device profiles

AD group policy is layered on top of device profiles. The profile sets a default policy; AD groups override it for matching users.

  1. Open the relevant Device Profile in the Admin Console.
  2. Toggle Enable User Policies on.
  3. Save.

Enabling User Policies on a Device Profile

[!IMPORTANT] The profile’s default policy is the fallback for any user who is not in any AD group with an assigned policy. Pick a sensible default, that’s what unmapped users will get.

Step 2: Create a Persona

A Persona defines how AD groups map to policies for a given domain.

  1. Users → Configure → New Persona.
  2. On the Settings subtab, name the Persona.

Creating a new Persona

Bind a domain

Open the Active Directory subtab and bind a domain to the Persona.

Binding an AD domain to a Persona

[!NOTE] A single Persona can bind to one domain only. A domain can only be bound to one Persona. If you have multiple AD domains, create one Persona per domain.

Map groups to policies and set priority

Once the domain is bound, every AD group discovered through your roaming clients becomes available:

  1. Move the groups you want to use from the left column to the right.
  2. For each group, pick the policy that applies.
  3. Set a priority (1 = highest). Priority resolves multi-group conflicts when a user is in more than one mapped group.

Group-to-policy mapping with priority

Any AD security group can be selected for policy assignment.

Save the Persona. ScoutDNS applies the new mapping immediately for matching users on the next DNS query.

If your account uses the Organizations tab (multi-tenant), link the Persona to the relevant organization so user reporting and the Users tab align correctly. This is the same pattern as linking Sites (for network deployments) and Profiles (for roaming clients).

Linking a Persona to an Organization

[!TIP] Create the Persona from inside an Organization view to auto-link it to that organization. Saves a manual step later.

Was this article helpful?
Still stuck? Open a ticket and we'll follow up by email.
Open a ticket
Last updated Aug 23, 2025