Skip to main content

Access Rules

You can use access rules in a policy to evaluate request attributes at runtime and allow, deny, or report requests.

Assistant

You can use the Assistant pane on the right side of the policy rule tabs to create access rules by describing the conditions you want to enforce in natural language. Start with the Assistant for quick setup, then use the editor for more precise control.

To submit a rule request:

  1. Describe the rule you want in the Assistant input field.
  2. Press Enter or use the arrow button at the bottom to submit your request.

Access rules editor

You can use the access rules editor on the left to manually update existing rules, including those created by the Assistant, and create new rules with full control over conditions and logic.

Add access rule

If you see the No Access Rules Enabled section on the rule tab, click + Create first access rule to open the rule editor.

After you create the first rule, the section label changes to Execute Access Rules and the rule appears underneath as a movable card.

Click the pencil () icon to open the rule editor to update the rule.

Click + Access rule to add more rules.

note:

AIDR evaluates access rules sequentially and independently, in the top-down order as displayed in the AIDR console. Each rule produces its own result, and any rule with a Stop action halts execution.

Edit access rule

In the rule editor, you can create one or more conditions based on request attributes, combined using AND and OR logic:

  1. Enter a rule name.
  2. Create a condition.
    1. Create an expression (a single comparison):
      1. View available attributes by placing your cursor in the expression field on the left.
      2. Select a comparison operator for:
        • Request metadata attributes:
          • == - Value equals the specified string exactly. Use @null to match null or missing values, or @empty to match empty strings.
          • != - Value does not equal the specified string. Use @null to exclude null or missing values, or @empty to exclude empty strings.
          • > - Value is greater than the specified number
          • >= - Value is greater than or equal to the specified number
          • < - Value is less than the specified number
          • <= - Value is less than or equal to the specified number
          • in - Value is found in a comma-separated list of allowed values
          • contains - Value contains the specified text as a substring
          • not contains - Value does not contain the specified text as a substring
          • matches - Value matches the specified RE2 regular expression pattern
          • not matches - Value does not match the specified RE2 regular expression pattern
        • Prompt content-based:
          • has - Specified detector rule produced a finding
          • not has - Specified detector rule did not produce a finding
          • executes - Runs the specified detector rule as part of this access rule evaluation
      3. Type a value against which this expression is evaluated. When you place the cursor in the value field, it may suggest existing values from your data (known user IDs, application names, etc.) or internal lookup tables.
    2. Add another expression to the condition:
      1. Click Or + or And + next to an existing expression.
      2. Select an AND or OR logical operator to combine expressions.
    3. Change the execution order by dragging and dropping individual expressions using their six-dot handle on the left.
  3. Add another condition to the rule:
    1. Click Add Condition +.
    2. Select an AND or OR logical operator to combine conditions.
  4. In the Then dropdown, select the action to execute when the rule matches:
    • Continue - Proceed to the next rule without logging a detection.
    • Report and Continue - Log a detection and continue to the next rule.
    • Report and Stop - Log a detection and stop policy execution.
    • Block and Stop - Block the request, log a detection, and stop policy execution.
    • Ignore and Stop - Allow the request and stop policy execution without logging.
  5. In the Else dropdown, select the action to execute when the rule doesn't match.
  6. Add another rule by clicking + Access rule.
  7. Click Save at the bottom of the rule editor to apply the rule changes to the policy.
note:

If you define conditions based on prompt content (prompt.detections), you must also enable the corresponding detectors and configure referenced rules under the Prompt Rules tab.

Examples

Request metadata

This rule matches requests from user dennis.nedry@ingen.com to the security application, or requests using the DeepSeek model. When matched, it reports the detection and continues to the next rule. If not matched, it continues to the next rule without logging.

ConditionOperatorValue
Report suspicious activity (rule name)
user.user_id== ▼dennis.nedry@ingen.comAND ▼ (logical operator) (remove expression)
app.app_id== ▼securityAND+ (add expression) (remove expression)
OR ▼ (logical operator)
model.model_name== ▼DeepSeekOR+ (add expression) (remove expression)
Add Condition +

Then Report and Continue ▼

Else Continue ▼

🗑️ | Cancel | Save

+ Access rule

After you click Save, the rule editor closes and displays the rule definition in a structured format that shows the logical conditions and operators.

if (
user.user_id == dennis.nedry@ingen.com
and app.app_id == security
)
or model.model_name == deepseek

Request metadata and prompt rules

This rule executes the US Social Security Number prompt rule from the Confidential and PII Entity detector only for requests from the ingen-chatbot application.

  • When the request matches the ingen-chatbot condition, AIDR applies the action configured for the US Social Security Number prompt rule. The access rule then reports the detection and continues to the next rule.
  • When the condition doesn't match, the request is allowed and policy execution stops without logging.
ConditionOperatorValue
Remove PII (rule name)
app.app_id== ▼ingen-chatbotAND ▼ (logical operator) (remove expression)
prompt.detectionsexecutes ▼confidential_and_pii_entity.us_ssnAND+ (add expression) (remove expression)
Add Condition +

Then Report and Continue ▼

Else Ignore and Stop ▼

🗑️ | Cancel | Save

After you click Save, the rule editor displays the rule definition as:

if app.app_id == ingen-chatbot
and prompt.detections executes confidential_and_pii_entity.us_ssn

Rule execution order

AIDR evaluates rules in the order they appear.

You can change the order by dragging and dropping rules using their six-dot handle on the left.

Changes in rule order are saved automatically.

Default action

If no access rules match, AIDR proceeds to evaluate configured prompt rules.

tip:

You can test access rules using Policy Testing.


Was this article helpful?

Contact us

636 Ramona St Palo Alto, CA 94301

©2026 CrowdStrike. All rights reserved.

PrivacyYour Privacy ChoicesTerms of UseLegal Notices
Contact Us