LogoThreatmatic
Policies

Policies

Define and enforce network access rules with fine-grained filters.

The Policies page (/policies) is where you define the rules that govern network traffic across your organization. Each policy specifies an action (allow/deny), direction, protocol, and scope.

Adding a Policy

Click Add Policy in the top-right toolbar to open the create form. The form is pre-populated with your organization's existing policy tags.

Filters

The policy table provides five independent filter dimensions:

FilterDescription
ActionFilter by allow or deny
DirectionFilter by inbound or outbound
ProtocolFilter by network protocol (e.g. TCP, UDP)
TagsFilter by assigned policy tags
Updated byFilter by the team member who last modified the policy

Each filter chip displays a count so you can see the distribution before applying.

Data Loading

Seven data sources are resolved in parallel on the server:

  1. Action counts
  2. Direction counts
  3. Protocol counts
  4. Tag counts
  5. Updated-by counts
  6. Full tag list (for the create form)
  7. Paginated policy list

Suspense boundary

The table uses a Suspense boundary with a skeleton fallback while data loads, keeping page interactions available immediately.

  • Policy Detail — inspect and edit an individual policy
  • Metrics — observe the real-world effect of your policies

How is this guide?

Last updated on

On this page