Docs / Integrations & SSO / Entra ID group policies
Browse Integrations & SSO
Integrations & SSO

Entra ID group policies

Apply ScoutDNS policy by Microsoft Entra ID (formerly Azure AD) group membership. Uses a read-only Enterprise App connection, no agent-side AD discovery needed.

Updated Aug 23, 2025 • 5 min read

ScoutDNS can enforce policy by Microsoft Entra ID group membership so the policy follows the user across devices. This article covers Entra ID; for on-prem Active Directory see Active Directory group policies.

How Entra ID sync works

ScoutDNS connects to your Entra ID tenant via an Enterprise Application with read-only Microsoft Graph permissions. Once authorized, the ScoutDNS policy engine matches users from roaming clients to Entra users and groups, and applies the policy you’ve configured in the Persona.

[!NOTE] ScoutDNS only requests the minimum read-only permissions needed to discover users and groups. It does not gain access to emails, messages, calendar data, or any other resource. You can revoke the consent at any time from the Entra admin console.

Users not in any mapped group fall back to the Device Profile default policy.

Step 1: Enable user policies on device profiles

Entra ID group policy layers on top of device profiles. The profile sets the fallback; Entra groups override it for matching users.

  1. Open the relevant Device Profile.
  2. Toggle Enable User Policies on.
  3. Save.

Enabling User Policies on a Device Profile

If you haven’t deployed roaming clients yet, start there.

[!IMPORTANT] The profile’s default policy is the fallback for users who don’t match any Entra group in the Persona. Choose carefully, unmapped users get this.

Step 2: Create a Persona

  1. Users → Configure → New Persona.
  2. Name the Persona on the Settings tab.
  3. Open the Entra ID subtab.

Creating a Persona with the Entra ID subtab

Add and bind a tenant

  1. Click Add Tenant and approve the read-only Enterprise App consent.
  2. Once consent is granted, the tenant appears in the dropdown.
  3. Select it and click Bind.

For multi-tenant accounts, the default tenant binds as the Primary Tenant.

Binding a tenant to a Persona

[!NOTE] A tenant can only be bound to one Persona at a time. To reuse a tenant on a different Persona or account, you must Unbind it from the current Persona first.

Multi-tenant accounts (MSPs)

MSPs running multi-tenant Entra deployments can add additional tenants:

  1. Click Add Tenant.
  2. Enter the Microsoft tenant domain (ends in onmicrosoft.com).
  3. Click Add Tenant. The new tenant appears in the dropdown.
  4. Select and Bind to the appropriate Persona.

Map groups to policies and set priority

After the tenant binds, all Entra security groups become visible.

[!TIP] For large directories, the initial sync can take a few hours to complete. ScoutDNS performs regular background syncs to pick up new groups and users. You can also trigger a manual sync from the UI.

  1. Move groups from Observed Groups to Configured Groups.
  2. Assign a policy per group.
  3. Set a priority (1 = highest). Priority resolves multi-group conflicts when a user belongs to more than one mapped group.
  4. Save.

Group-to-policy mapping with priority

Any Entra security group can be selected for policy assignment.

If your account uses the Organizations tab, link the Persona to the right organization so the Users tab and reporting align, same pattern as linking Sites and Profiles.

Linking the Persona to an Organization

[!TIP] Create the Persona from inside the relevant Organization view to auto-link it.

Was this article helpful?
Still stuck? Open a ticket and we'll follow up by email.
Open a ticket
Last updated Aug 23, 2025