Policy setup
Define allowed tools, domains, and approval gates.
Step by step
- List tools your agents may call and mark high-risk actions.
- Define data domains (PII, secrets, customer data) and blocked prompt patterns.
- Set internet usage rules and human approval requirements for sensitive operations.
- Map policies to agents in the dashboard; evaluation runs on each ingested trace.
- Configure tool execution policy and optional policy packs under organization settings; per-asset overrides merge for gateway traffic.