Docs / Policies & Filtering / Working with allow and block lists
Browse Policies & Filtering
Policies & Filtering

Working with allow and block lists

Create custom allow/block lists to override category decisions for specific domains, globally across your org or scoped to a single policy.

Updated Aug 23, 2025 • 4 min read

Sometimes you need to fully block or allow a specific domain regardless of how ScoutDNS categorizes it, a vendor whose domain is mis-categorized, an internal tool that needs to bypass category filtering, or a domain you want to deny across the entire org. Custom allow/block lists (called “White/Black Lists” in the UI) handle this.

A list can be global (applies to every policy in your account) or standard (attached to one or more specific policies). Lists can hold allow entries, block entries, or both.

Custom Lists tab in the Admin Console

Create a list

  1. Open the Custom Lists page.
  2. Click New W/B List in the top right.
  3. Name the list and add a description so other admins know its purpose.
  4. (Optional) Toggle Global if the list should apply across every policy.
  5. Save.

You can mark multiple lists as Global if you want to organize them by purpose (e.g. “Global allow, internal tools” + “Global block, known phishing”).

Creating a new custom list

Add entries

Each list has an Allow tab and a Block tab. Add domains to whichever side applies.

Domain syntax

EntryMatches
aol.comThe apex domain only, does not match subdomains
*.aol.comSubdomains only, does not match the apex
yahoo.com AND *.yahoo.comApex plus every subdomain (the typical “fully block this site” pattern)

[!IMPORTANT] Entries must be domains, not URLs, not http://... prefixes, not paths. ScoutDNS filters at the DNS layer, which only sees the hostname.

A few worked examples:

  • Blocking *.yahoo.com blocks news.yahoo.com but allows yahoo.com.
  • Blocking yahoo.com blocks yahoo.com but allows mail.yahoo.com.
  • To fully block the whole site, add both yahoo.com and *.yahoo.com.

Adding allow/block entries to a list

How lists are evaluated

When a DNS query arrives, ScoutDNS evaluates list entries in this order. The first match wins.

  1. Global allow list, highest precedence, beats everything else
  2. Global block list
  3. Standard allow list (attached to the policy in use)
  4. Standard block list (attached to the policy in use)

In short: allow always beats block at the same scope, and global always beats standard. A global allow entry will permit a domain even if a standard block entry would otherwise block it.

Attach a list to a policy

Global lists are applied automatically, no policy assignment needed. Standard lists only take effect when attached to a specific policy.

  1. Open the Policy tab → select the custom policy.
  2. Click Edit Policy in the top right.
  3. In the White/Black List field, pick one or more standard lists to apply.
  4. Save.

Selecting a policy to attach a list to

Attaching custom lists in the policy editor

[!NOTE] Custom lists cannot be assigned to default (read-only) policies. Copy a default policy first if you need list overrides, see Working with policies.

Was this article helpful?
Still stuck? Open a ticket and we'll follow up by email.
Open a ticket
Last updated Aug 23, 2025