Establishes the groundwork for managing users, credentials, and access controls before deploying Scout routers.
Overview
Before deploying Scout routers, administrators should confirm core access, policy, and communication decisions. Establishing these fundamentals creates a structured environment for ongoing management and sets the tone for a mature security program.
This stage focuses on defining responsibility, securing credentials, and preparing users for life inside a protected network.
Administrative Setup
Scout provides a secure web dashboard for managing routers, users, and content filtering policies. Administrators should complete the following steps before connecting any Scout hardware.
- Administrator Access
- Identify who requires administrative privileges in the Scout Web App.
- Each designated admin should be added in the portal to receive a magic link for passwordless login.
- Password Management Policy
- Decide whether to leverage the integrated Vault password manager.
- If using Vault, define password complexity and rotation policies, determine how to handle policy infractions, and optionally install the Scout Vault Chrome Extension.
- If not using Vault, verify that your organization’s existing password manager meets modern security standards and evaluate its cost, usability, and compliance impact.
User Preparation
While connected to the Scout-secured network (SSID Bastion by default), users should expect certain categories of content to be restricted. These restrictions are essential for protecting users and minimizing exposure to malicious, explicit, or distracting material.
Typical categories of blocked or limited content include:
- Sponsored search results and web advertisements
- Streaming platforms with embedded ads (for example, Hulu, Disney+)
- Social media “Recommended for You” feeds
- Adult, gambling, or shock content
- Known malicious or deceptive domains
Encourage users to communicate early if they encounter legitimate services being blocked. This builds trust while maintaining protection standards.
Important Notes
- All network traffic within the Scout environment is inspected for potential threats and logged for auditing and analytics.
- Devices connected to the network may be scanned automatically as part of continuous security monitoring.
- After connecting a Scout router, administrators should promptly update the Wi-Fi name and password to secure the environment before onboarding additional users.
- Administrators can manage access directly through the dashboard by blocking or unblocking domains as needed.
- If a domain continues to be incorrectly categorized or is tied to a known service issue, a support request can be submitted for review.