Command Filtering & Blocking
Define regex-based rules to intercept, log, or block dangerous commands in real time across SSH sessions and database queries. Prevent accidental or malicious operations like DROP TABLE, rm -rf, or shutdown before they reach the target system.
Feature Details
Included Capabilities
Regex pattern matching — define rules using regular expressions to match commands precisely
Block or log actions — choose to block dangerous commands outright or log them for review
SSH command filtering — intercept shell commands before they execute on remote servers
Database query filtering — block destructive SQL operations like DROP, DELETE, or TRUNCATE
Priority-based evaluation — rules are evaluated in priority order; first match wins
Per-policy rules — attach command filter rules to specific access policies for granular control
Real-time alerting — trigger alerts when blocked commands are detected
Audit trail — every matched command is logged with the pattern, action, and session context
Compliance ready — enforce least-privilege command access for SOC 2, HIPAA, and PCI DSS
Available on Business and Enterprise plans
Live Preview
Feature Overview
Secure Access — Overview
Zero Trust Access
Session Recording
Just-In-Time Access
Browser-Based
Getting Started
How It Works
1. Connect Identity Provider
Integrate with Okta, Azure AD, Google Workspace, or any SAML/OIDC provider in minutes.
2. Add Resources
Register your servers, databases, and web apps. Define role-based access policies.
3. Secure Access
Users access resources through the browser with identity verification, session recording, and audit logs.
Ready for Command Filtering & Blocking?
Deploy in minutes. No legacy VPN required. No credit card required.