Welcome to Scout Secured

A guide for administrators securing homes, shops, and organizations through Scout

Scout Secured empowers administrators to protect their environments, regardless of scale. Whether securing a home network, managing a small business, or supporting a company-wide deployment, this documentation provides the foundation for lasting cybersecurity maturity.


Purpose

This documentation helps administrators adopt Scout Secured in a way that strengthens both their network and their broader security program. It provides the knowledge needed to deploy Scout services effectively, maintain oversight of connected devices, and build consistent protection across every location.

Each section is written to guide administrators toward a more resilient and transparent security posture that fits their unique environment.


Security Maturity Levels

Scout Secured’s approach to security maturity is inspired by the NIST Cybersecurity Framework (CSF) and CIS Critical Security Controls (Implementation Groups): two widely recognized standards used by organizations worldwide.

The following four levels translate those frameworks into practical milestones suitable for homes, shops, and organizations of any size.

Level Description Industry Alignment Color Tag
Level 1: Foundation Establishes the core of a secure environment by deploying Scout routers, enabling VPN protection, and connecting key devices. Focus is on visibility and secure connectivity. NIST Tier 1 (Partial) / CIS IG1 🟢 Green
Level 2: Visibility Expands awareness through monitoring and reporting. Administrators begin reviewing metrics such as incidents, device status, and blocked domains to understand network behavior. NIST Tier 2 (Risk-Informed) / CIS IG1–2 🟡 Yellow
Level 3: Control Introduces governance and policy enforcement. DNS rules, password policies, and IPS actions are tuned to align security posture with organizational goals. NIST Tier 3 (Repeatable) / CIS IG2 🟠 Orange
Level 4: Optimization Focuses on continuous improvement and measurable performance. Administrators refine detection, shorten response times, and use data to drive risk-based decisions. NIST Tier 4 (Adaptive) / CIS IG3 🔵 Blue

Each documentation page indicates which maturity level it supports, helping administrators focus on topics appropriate to their current stage and plan for the next.


Using the Maturity Framework

  • Home users often start at Level 1 (Foundation), focusing on secure setup and content filtering.
  • Shop owners typically progress into Level 2 (Visibility) and Level 3 (Control) as they manage devices and enforce access policies.
  • Larger organizations may aim for Level 4 (Optimization), integrating Scout data into broader security programs or compliance objectives.

This maturity structure provides a clear path from basic protection to adaptive, intelligence-driven security management.


What Scout Secured Provides

Scout Secured integrates several essential security services into a single platform that protects every device connected through it:

  • VPN: Creates encrypted, private network access for users at home or on the road.
  • Blackhole: Filters unwanted or malicious content at the DNS level, blocking ads, trackers, and harmful domains.
  • Sentry: Monitors network traffic for intrusions and actively prevents attacks.
  • Vault: Safely stores and manages credentials using strong encryption.

Together, these tools form a complete network defense system that grows with the administrator’s needs.


How This Documentation Is Organized

  • Getting Started: Initial setup for routers, accounts, and connectivity.
  • Features: Overviews of Scout’s services and how they strengthen security.
  • Dashboard Reference: Detailed explanations of each metric and card, including maturity-level relevance.
  • Settings: Configuration options for organization, devices, and policies.
  • Help: Support and troubleshooting resources.

Building Toward Security Maturity

Scout Secured is designed to help every administrator improve their cybersecurity posture over time.

  1. Identify your current level.
  2. Review documentation relevant to that stage.
  3. Apply best practices to progress to the next level.

Each improvement builds toward stronger protection, clearer visibility, and greater control of your digital environment.



Contacting Support
Organizational Preparation

Related Docs

Getting Started
Features
Dashboard Reference
Help