Prisma Access Browser
Manage Prisma Access Browser Requests to Bypass Policy Rules
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
-
- Use the Prisma Access Browser Dashboards
- Digest Prisma Access Browser Home Screen Highlights
- Investigate Prisma Access Browser Events
- Account Protection for the Prisma Access Browser
- Manage Prisma Access Browser Users
- Manage Prisma Access Browser Applications
- Manage Prisma Access Browser Extensions
- Manage Prisma Access Browser Sign-in Rules
- Manage Prisma Access Browser Requests to Bypass Policy Rules
- Manage Rollback Control for the Prisma Access Browser
- Prisma Access Browser Remote Connections
- Location-based Policy
- The Prisma Access Browser Extension
-
- Integrate Prisma Access Browser with Microsoft 365
- Integrate Prisma Access Browser with Microsoft Information Protection
- Windows Account Based SSO Authentication
- Integrate Prisma Access Browser with Google Workspace
- Integrate Prisma Access Browser with Votiro
- Integrate Prisma Access Browser with CrowdStrike Falcon Intelligence
- Integrate Prisma Access Browser with OPSWAT MetaDefender
- Integrate Prisma Access Browser with YazamTech SelectorIT
- Integrate Prisma Access Browser with Symantec DLP
- IP Based Enforcement
- Certificate-Based Enforcement
- How Is Synched Data Stored?
Manage Prisma Access Browser Requests to Bypass Policy Rules
Learn how to manage end user requests to bypass Prisma Access Browser rules for access
to otherwise blocked sites and apps.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
In some cases, end users may find that the Prisma Access Browser rules are too strict to
allow users to access the resources they need. For example, a user might need to
download a file that is restricted based on a browser rule, or may need access to a
website that is normally off limits.
To address this issue, Prisma Access Browser allows you to set up temporarily bypass
rules conditions. For each supported control, you can configure a policy that allows
your users to bypass the rule.
There are three ways to allow users to bypass the rules:
- Warn and allow to proceed anyway—Notifies users that the web application they are trying to access is restricted, but allow them to proceed anyway.
- Warn and allow the user to proceed anyway with a reason—Notifies users that the web application they are trying to access is restricted, but allows them to proceed after supplying a reason they need access.
- Permission request—Notify users that the web application they are trying to access is restricted, and prompt them to submit a request for access. In this case, you must review and approve the request before the user can access the app.
The following controls allow you to set up a rule bypass:
- Web Access
- Login Control
- File Download
- File Upload
- Screenshot
- Typing Guard
You can also set the bypass window to allow users to bypass the restrictions for a
specified amount of time.
You can examine the Event Logs
to see controls that may be too restrictive and tune them up so that they are
more useful.

How are bypass requests configured in policy?
You
define
the bypass conditions within the policy rules
. Then, when users
attempt to perform an action or visit a site blocked by the corresponding rule,
they can submit a bypass request. Bypass requests are an extension of
Prompt actions where Prisma Access Browser prompts the
user with a message indicating that the action or site is blocked and allowing
them to continue anyway. To set bypass conditions, you configure the prompt
action to enable permission requests. With bypass conditions you must review and
approve the request
before Prisma Access Browser allows the user to
perform the blocked action or access the blocked site.Configure the Bypass Conditions
Configure the conditions for bypass rules when you create or edit an Access and Data
Control rule. The way you configure the conditions depends on the
type of user activity for which you want to allow bypass.
Set Bypass Conditions for Web Access Rules

- In the Policy Rules - Edit ruleWeb access page, select Prompt.
- Define the bypass conditions for the web access rule by selecting one of the following options:
- Warn and allow to proceed anyway—notifies users that the web application they are trying to access is restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that the web application they are trying to access is restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that the web
application they are trying to access is restricted, and prompt them
to submit a request for access. In this case, you must review and approve the requestbefore the user can access the app.
Set Bypass Conditions for Login Controls
The Login restriction section in Access & Data Control rules enables you to
restrict login to specific email domains.

- In the Policy Rules - Edit rule→Login controls page, select Prompt.
- Define the bypass conditions for the login restriction rule by selecting one of the following options:
- Allow - Allow all domains.
- Block - Block all domains.
- Allow specific email domains - Allows access only to the domains you specify.
- Block specific email domains - Blocks access only to the domains you specify.
- Specify the email domains that this rule governs.
- Select Prompt when the login is blocked - With this setting enabled, when users attempt to login using a restricted email, Prisma Access Browser[pab] notifies them. You can set the following bypass conditions:
- Warn and allow to proceed anyway—notifies users that the web application they are trying to access is restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that the web application they are trying to access is restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that the web application they are trying to access is restricted, and prompt them to submit a request for access. In this case, you mustreview and approve the requestbefore the user can access the app.
- Set the duration of the Bypass timeframe, ranging from 10 minutes to 90 days. Select once to allow a single download.
Set Bypass Conditions for File Download
The File Download profile in Access & Data Control rules allows
you to restrict file downloads. This option is available from either the
Profiles or from the Data controls, but we recommend using the Data controls to
manage policies

- In the Policy Rules - Edit rule-Data controls page, select File Download.
- Select either Allow or Allow (Protected).
- Click Prompt Before download and select Before download.
- Select Popup notification and define the bypass conditions for file downloads by selecting one of the following options.:
- Warn and allow to proceed anyway—notifies users that the web application they are trying to access is restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that the web application they are trying to access is restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that the web application they are trying to access is restricted, and prompt them to submit a request for access. In this case, you mustreview and approve the requestbefore the user can access the app.
- Set the duration of the Bypass timeframe, ranging from 10 minutes to 90 days. Select once to allow a single download.
Set Bypass Conditions for File Upload
The File Upload profile in Access & Data Control rules allows
you to restrict file uploads. This option is available from either the Profiles
or from the Data controls, but we recommend using the Data controls to manage
policies.

- In the Policy Rules - Edit rule-Data controls page, select File Upload.
- Select either Allow or Allow (Protected).
- Click Prompt Before upload and select Before upload.
- Select Popup notification and define the bypass conditions for file upload by selecting one of the following options.:
- Warn and allow to proceed anyway—notifies users that the web application they are trying to access is restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that the web application they are trying to access is restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that the web application they are trying to access is restricted, and prompt them to submit a request for access. In this case, you mustreview and approve the requestbefore the user can access the app.
- Set the duration of the Bypass timeframe, ranging from 10 minutes to 90 days. Select once to allow a single upload.
Set Bypass Conditions for Typing Guard
- The typing guard control in Access & Data Control rules allows you to restrict the ability of users to type. This option is available from either the Profiles or from the Data controls, but we recommend using the Data controls to manage policies.
- In the Policy Rules - Edit rule-Data controls page, select Typing Guard.
- Select Enable.
- Select Prompt.
- Select Popup notification and define the bypass conditions for file upload by selecting one of the following options.:
- Warn and allow to proceed anyway—notifies users that the web application they are trying to access is restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that the web application they are trying to access is restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that the web application they are trying to access is restricted, and prompt them to submit a request for access. In this case, you mustreview and approve the requestbefore the user can access the app.
- Set the duration of the Bypass timeframe, ranging from 10 minutes to 90 days. Select once to allow a single upload.
Set Bypass Conditions for Screenshot Protection
The screenshot control in Access & Data Control rules allows
you to restrict the ability of users to take screenshots. This option is
available from either the Profiles or from the Data controls, but we recommend
using the Data controls to manage policies.

- In the Policy Rules - Edit rule-Data controls page, select Screenshot.
- Select either Allow or Allow (Protected).
- Click Prompt .
- Select Popup notification and define the bypass conditions for file upload by selecting one of the following options.:
- Warn and allow to proceed anyway—notifies users that screenshots are restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that screenshots are restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that screenshots are restricted, and prompt them to submit a request for access. In this case, you mustreview and approve the requestbefore the user can access the app.
- Set the duration of the Bypass timeframe, ranging from 10 minutes to 90 days. Select once to allow a single upload.
Set Bypass Conditions for Printing Controls
The print control in Access & Data Control rules allows
you to restrict the ability of users to print. This option is available from
either the Profiles or from the Data controls, but we recommend using the Data
controls to manage policies.

- In the Policy Rules - Edit rule-Data controls page, select Print.
- Select Allow.
- Select Prompt.
- Select Popup notification and define the bypass conditions for file upload by selecting one of the following options.:
- Warn and allow to proceed anyway—notifies users that printing is restricted, but allow them to proceed anyway. You will receive an event.
- Warn and allow the user to proceed anyway with a reason—notifies users that printing is restricted, but allow them to proceed after supplying a reason they need access. You will receive an event.
- Permission request—notify users that printing is restricted, and prompt them to submit a request for access. In this case, you mustreview and approve the requestbefore the user can access the app.
- Set the duration of the Bypass timeframe, ranging from 10 minutes to 90 days. Select once to allow a single upload.
Manage Permission Requests
After you set bypass request conditions on policy rules, you must review incoming
requests and decide whether or not to allow the requests.
- From Strata Cloud Manager, select ManageConfigurationPrisma Access Browser PolicyRequests.
- Select the request you want to review and click Reply.
- Review the request and then select one of the following responses:
- Approve—Grants approval for the request for the pre-configured duration, or select a different duration.
- Decline—Rejects the request. Prisma Access Browser continues to block the requested action or site access.
- Choose the timeframe for the request. This overrides the default setting in the rule with a specific timeframe for the approval.
- (Optional) Add a comment for the user.
- Submit your response.
You can also manage
permission requests via API and connect them to external systems.
Investigate Bypass Requests
If you have
configured bypass conditions
on your policy rules and
you find that you are approving similar requests
, this might indicate that
you need to tune your policy rules. You can investigate current and past bypass
rules to assess whether you need to make some adjustments to your policy on the ManageConfigurationPrisma Access Browser PolicyRequests page.- Search for specific bypass requests by URL.
- Filter requests based on the following parameters:
- Request type—Filter on the type of bypass: Web access, File upload, File download, or App login.
- Status—Filter on requests that are Pending, Approved, or Declined.
- Created at—Filter on requests made during a specific time frame.
- User—Filter on specific users making requests.
- Policy rule—Filter on the rule that trigged the bypass requests.
- URL—Filter based on the URL of the web application that generated the request.