Policy: File Access Approval Policy for pgAdmin Application

This example shows a File Access policy that targets a specific application (pgAdmin) and requires Approval before allowing the file access action to proceed. It’s useful for demonstrating how to introduce an approval workflow for a trusted tool without applying prompts to every application on the endpoint.


What This Policy Does

  • Applies a File Access rule in enforce mode.

  • Targets:

    • Any user (*)

    • A specific application (one App ID, representing pgAdmin)

    • One specific endpoint (one Machine ID)

  • On a match, it requires Approval (OnSuccess: APPROVAL).

  • Does not require the user to acknowledge the notification.


Why It Behaves This Way

  • Application-Scoped Policy: Because the application targeting is a single App ID (not *), only that specific application is evaluated by this rule.

  • Broad User Scope: The wildcard user targeting means any user on the targeted endpoint can trigger the approval workflow.

  • Approval On Success: When the policy matches, it intentionally routes the action into an approval flow instead of allowing it silently.

  • Standard Checks With No Extra Constraints: Date/Time/Day/Certificate restrictions are empty, so the behavior largely depends on whether the user, machine, and application match


What The User Experiences

  • When users run pgAdmin (or the targeted pgAdmin component) on an in-scope endpoint, they will be prompted to request Approval for the covered file activity.

  • Because acknowledgement is not required, the notification itself should not add an extra “click to continue” step beyond the approval workflow.


Important Notes And Common Adjustments

  • Fix The Notification Message: The current notification text references “monitor mode” and mentions MFA/justification/request to run as administrator, but this is a File Access policy requiring Approval. Update or remove the message so it matches actual behavior.

  • Reduce Approval Noise: If the approval prompts are too frequent, narrow scope further (for example, limit the covered file paths or file types in the policy’s Extension section, where applicable).

  • Narrow The User Scope If Needed: Replace * with specific users/groups if only certain users should be able to request approval for pgAdmin activity.

  • Consider Certificate Constraints: If supported in your environment, restricting to a known signer/publisher can help ensure approvals apply only to trusted builds of the application.

Example JSON

Last updated

Was this helpful?