PEDM Policy Commands
This page gives information of commands related to perform operations related to PEDM policies
Overview
This section covers all the Keeper Commander commands for managing PEDM privilege elevation policies. Policies define privilege elevation rules with filters and controls that determine when and how users can elevate privileges. These commands allow administrators to create, view, edit, assign, and delete policies with various filters including user, machine, application, date, time, and day restrictions.
This section supports the following commands:
Usage
pedm policy command [--options] OR pedm p command [--options]
Alias: p
Policy List Command
View all PEDM policies with their configuration including policy type, status, controls, and filter settings. Provides an overview of all privilege elevation policies configured in the system.
Python CLI
Command: pedm policy list
Aliases: pedm p l, pedm p list
Flags:
--format
Output format - json, csv, or table
--output
Save output to specified file
Example:
Policy Add Command
Create a new privilege elevation policy with specified filters and controls. Policies can include user, machine, and application filters, along with date, time, and day restrictions. Controls determine what actions are required or allowed during privilege elevation.
Python CLI
Command: pedm policy add
Aliases: pedm p a, pedm p add
Flags:
--policy-type
Policy type (choices: elevation, file_access, command, least_privilege)
--policy-name
Name for the policy
--control
Policy controls (choices: allow, deny, audit, notify, mfa, justify, approval) - can be repeated
--status
Policy status (choices: enforce, monitor, monitor_and_notify)
--enable
Enable or disable policy (choices: on, off)
--user-filter
User collection UID or * for all users - can be repeated
--machine-filter
Machine collection UID - can be repeated
--app-filter
Application collection UID - can be repeated
--date-filter
Date range in ISO format (YYYY-MM-DD:YYYY-MM-DD) - can be repeated
--time-filter
Time range in 24-hour format (HH:MM-HH:MM) - can be repeated
--day-filter
Day of week filter - can be repeated
--risk-level
Policy risk level (0-100)
Example:
Policy Edit Command
Modify an existing policy's configuration including name, controls, filters, and status. This command allows administrators to update policy settings without recreating the policy.
Python CLI
Command: pedm policy edit <policy>
Aliases: pedm p e, pedm p edit
Flags:
policy
Policy UID (required)
--policy-name
New policy name
--control
Policy controls (choices: allow, deny, audit, notify, mfa, justify, approval) - can be repeated
--status
Policy status (choices: enforce, monitor, monitor_and_notify)
--enable
Enable or disable policy (choices: on, off)
--user-filter
User collection UID or * - can be repeated
--machine-filter
Machine collection UID - can be repeated
--app-filter
Application collection UID - can be repeated
--date-filter
Date range (YYYY-MM-DD:YYYY-MM-DD) - can be repeated
--time-filter
Time range (HH:MM-HH:MM) - can be repeated
--day-filter
Day of week - can be repeated
--risk-level
Risk level (0-100)
Example:
Policy View Command
Display the complete JSON configuration of a policy. This command shows all policy details including filters, controls, rules, and metadata in JSON format.
Python CLI
Command: pedm policy view <policy>
Aliases: pedm p v, pedm p view
Flags:
policy
Policy UID or name (required)
--format
Output format - json
--output
Save to file
Example:
Policy Delete Command
Remove one or more policies from the system. This command permanently deletes policy configurations and removes them from all collection assignments.
Python CLI
Command: pedm policy delete <policy> [policy...]
Aliases: pedm p delete
Flags:
policy
Policy UID or name (required, can specify multiple)
Example:
Policy Agents Command
View which agents are affected by specific policies. This command shows all agents that are assigned to the specified policies through collection assignments.
Python CLI
Command: pedm policy agents <policy> [policy...]
Aliases: pedm p agents
Flags:
policy
Policy UID or name (required, can specify multiple)
Example:
Policy Assign Command
Assign collections to policies to determine which resources the policy applies to. Collections can include agents, users, machines, or applications. Use "*" to assign to all agents.
Last updated
Was this helpful?

