Beginner
Lesson 4 of 5 · ~6 min

Allowing a single domain, scope, format, and the note field

Add a properly-scoped Allow list entry to the right policy in the right organisation, with the note field filled in so the next tech knows why it exists.

When the query log triage comes back as “false positive, narrow scope,” the fix is an Allow list entry. DNSFilter has two places to put it: per-policy Allow lists, or organisation-wide Universal lists. Pick the narrowest scope that fits the request.

Where Allow lists live

In the console, per-policy Allow and Block lists live behind tabs inside a Filtering Policy; Universal lists live at the org level under Settings.

DNSFilter Allow List management view with tabs for Settings, Categories, Threats, AppAware, Privacy, Allow List, Block List, and Labs. The Allow List tab is active. The toolbar shows ADD TO LIST and BULK UPLOAD buttons. Existing entries are listed with Domain and Note columns.
The Allow List tab is the only one that applies the writes you're about to make. ADD TO LIST is the helpdesk move; BULK UPLOAD is for migrations.

The cardinal rule, straight from DNSFilter’s documentation: Allow lists always win. If a domain appears on the Universal Allow list for the organisation, or on the Allow list of any policy that applies to a query, no category block, threat feed, or block-list entry can override it. That’s why scope discipline matters so much, a Universal Allow opens the door for everyone in the org.

The format

Entries are Fully Qualified Domain Names (FQDN). Format examples:

  • cdn.supplier.example, exact subdomain only.
  • supplier.example, apex. Apex-vs-subdomain matching is covered in the policy-design lesson; for frontline work, allowlist the exact FQDN you saw blocked.

The size caps are different depending on which list you’re touching:

List typeCapWhen to use
Per-policy Allow / Block listThousands of entries (check the Policies dashboard for the live cap)Day-to-day frontline ticket fixes. Scope is exactly the policy you’re editing.
Universal Allow / Block listUp to 1,000 domainsOrg-wide rules only. Smaller cap is deliberate. Universal isn’t for ticket churn.

There are three ways to add entries: one at a time (and you can attach a note inline), bulk paste, or upload. For frontline work, single-domain ticket fix, always use the one-at-a-time path so the note ships with the entry.

The four mistakes that cost frontline techs

MistakeWhat goes wrongWhat to do instead
Adding to the wrong organisationThe customer raising the ticket isn’t the customer where you made the change. They’re still blocked; some other tenant now has an entry they didn’t ask for.Verify the org name in the dashboard header before clicking Add.
Picking Universal when policy-specific would doOne customer’s request becomes a permanent global hole for that MSP.Default to the Allow list of the specific policy. Use Universal only when the MSP genuinely wants every customer to inherit the entry.
Apex when subdomain would dosupplier.example may inadvertently allow risky subdomains the threat feed actually wanted to block.Allow the exact FQDN the user needs. If they need more, they’ll come back with another ticket, and that’s correct behaviour.
Empty note fieldIn six months nobody knows why the entry exists. The cleanup turns into a guessing game.Note pattern: <ticket-id>, <who asked>, <why>. Future-you will thank you.
When you should NOT allowlist on the frontline

If the verdict was Malware, Phishing, Botnet, or Cryptomining, the answer is never an Allow entry, even if the user insists. Escalate. The same goes for any request that crosses customer scope (e.g. “make this work for everyone”). The escalation tier owns those calls.

A worked ticket: Able Moose Accounting

Sarah’s supplier portal at quotes.supplier-northwind.example is blocked under Newly Registered Domain. Sarah confirms her supplier rebranded last week. The MSP confirms the supplier is real.

  1. Confirm the org

    Header reads “Able Moose Accounting.” Good.

  2. Open the policy in scope

    DNSFilter Allow List management view: tabs for Settings, Categories, Threats, AppAware, Privacy, Block List, and Labs. The Allow List tab is active, listing existing entries with edit/delete actions.

    Sarah is on the “AMA. Standard” policy. Open its Allow list.

  3. Add the FQDN with a note

    Inline action menu in the DNS Query Log offering 'Add / Remove to Allow List', 'Add / Remove to Block List', and 'Add / Remove to AppAware' for a queried domain.

    Entry: quotes.supplier-northwind.example. Note: TKT-4821. Sarah Lee, finance, supplier rebrand, NRD false positive, valid as of 2026-05-08.

  4. Verify

    From a test device on Sarah’s Site (or from her own machine after a flush), re-query the domain. Allowed. Update the ticket with the verdict from the query log and close.

Loading quiz…

What this is NOT

  • An Allow entry isn’t a recategorisation. It fixes this customer’s policy only. DNSFilter’s category data still shows the domain as Newly Registered. To fix it everywhere, submit the domain via the Domain Report Tool.
  • It isn’t the right fix for systemic blocks. If a customer is allowlisting twenty domains in one category, the answer is a policy change (covered in the Intermediate course), not more entries.
Next lesson