Command Filtering & Blocking

Define regex-based rules to intercept, log, or block dangerous commands in real time across SSH sessions and database queries. Prevent accidental or malicious operations like DROP TABLE, rm -rf, or shutdown before they reach the target system.

Included Capabilities

Regex pattern matching — define rules using regular expressions to match commands precisely
Block or log actions — choose to block dangerous commands outright or log them for review
SSH command filtering — intercept shell commands before they execute on remote servers
Database query filtering — block destructive SQL operations like DROP, DELETE, or TRUNCATE
Priority-based evaluation — rules are evaluated in priority order; first match wins
Per-policy rules — attach command filter rules to specific access policies for granular control
Real-time alerting — trigger alerts when blocked commands are detected
Audit trail — every matched command is logged with the pattern, action, and session context
Compliance ready — enforce least-privilege command access for SOC 2, HIPAA, and PCI DSS
Available on Business and Enterprise plans

Feature Overview

Secure Access — Overview
Zero Trust Access
Identity-verified connections
Session Recording
Complete audit trail
Just-In-Time Access
Time-limited permissions
Browser-Based
No legacy VPN or client software

How It Works

1. Connect Identity Provider

Integrate with Okta, Azure AD, Google Workspace, or any SAML/OIDC provider in minutes.

2. Add Resources

Register your servers, databases, and web apps. Define role-based access policies.

3. Secure Access

Users access resources through the browser with identity verification, session recording, and audit logs.

Ready for Command Filtering & Blocking?

Deploy in minutes. No legacy VPN required. No credit card required.