This document explains how to configure application access policies on Segura® Platform EPM Windows clients. You’ll learn how to set up general segregation policies to allow or deny access to applications across all workstations, using a variety of criteria to increase security and control.
Requirements
- You must be at least an EPM Administrator.
- Have information about the applications according to the selected criteria (e.g., certificate, file hash, directory, etc.).
Configure application access policies
- On Segura® Platform, in the navigation bar, hover over the Products menu and select EPM > Policies > Windows > Access policies.
- Click on the Add button.
- In the Segregation screen, select General, Device, or Organizational unit.
- In the General tab, fill in the following fields:
- Category*: select Applications.
- Name*: set a name for this policy.
- Status*: set as Enabled or Disabled.
- Action*: choose between Allowlist to allow or Denylist to block.
- In the Applications tab, fill in the following fields:
- Record session for these applications*: set as Enabled or Disabled.
- Control parent process*:
- If Enabled, all child processes created by the parent will follow the access policy permissions.
- If Disabled, all processes are evaluated individually by the access policy.
- Control child process*:
- If Enabled, the access policy is applied to all processes originating from the child process.
- If Disabled, all processes are evaluated individually.
- New: add one or more criteria. More information in Applications Criteria List EPM Windows.
- If using Device or Organizational unit segregation, additional tabs will appear to complete the following steps:
- For Device segregation, select one or more registered workstations in the Devices tab.
- For Organizational unit segregation, add a new organizational unit (OU) and enter the name in the OU field in the Organizational units tab. Note: enter only the OU name (e.g.,
MyOUName), not the full distinguished name (e.g.,ou=myOUName,DC=mydomain,DC=local).
- In the Workflow tab, complete the following:
- In the Elevation settings options, select as needed:
- User can elevate applications.
- Require reason to elevate applications.
- Require approval to elevate applications.
InfoEnabling the requirement for approval or justification in the access policy will cause EPM to intercept the execution of corresponding applications when initiated by users outside of EPM. The execution will remain blocked until the workflow is completed.
- Approvals required: number of approvals necessary for privilege elevation.
- Disapprovals required to cancel: number of actions to cancel elevation.
- Approval in levels: requires approvers defined in the approval workflow.
- Allow emergency access.
- If Require approval to elevate applications is checked, set the number of times for each specific action.
- Answer Yes or No to the following Access request settings:
- Governance ID required when justifying?*.
- Always add user manager to approvers?*.
- In the Elevation settings options, select as needed:
- Go to the Review tab and check if everything is correct.
- Click Save to apply the access policy configuration.