Skip to main content

Config Guard

Config Guard is Sielum's feature for deploying, monitoring, and enforcing OS-level AI tool settings on every enrolled endpoint. For Claude Code, it writes a managed settings file with the highest possible priority — overriding user settings, CLI arguments, and project configuration in a way that developers cannot bypass.

Why Config Guard

Claude Code's configuration precedence is:

Config Guard file  →  CLI args  →  Local project  →  Shared project  →  User settings

This means that disableBypassPermissionsMode: "disable" in the Config Guard file blocks --dangerously-skip-permissions even as a CLI flag — something that writing to the user-level settings.json cannot achieve.

How it works

  1. An admin configures the Config Guard policy in the Sielum dashboard (Config Guard page).
  2. Sielum distributes the policy to all enrolled agents via the gRPC heartbeat.
  3. Each agent writes the policy to the OS-level path and monitors it for tampering.
  4. If a developer deletes or modifies the file, the agent restores it within 60 seconds and raises a tamper alert.

Deployed file path

OSPath
Linux/etc/claude/managed_settings.json
macOS/Library/Application Support/Claude/managed_settings.json
WindowsC:\ProgramData\Claude\managed_settings.json
Permissions

Writing to system paths requires the agent to run with sufficient privileges. On Linux the systemd unit runs as root. On macOS and Windows admin rights are required.

Available policy settings

SettingDescription
Disable Bypass Permissions ModeBlocks --dangerously-skip-permissions and bypassPermissions config.
Allow Managed Permission Rules OnlyOnly admin-defined allow/deny tool rules apply. Users cannot set allowedTools: '*'.
Allow Managed MCP Servers OnlyOnly approved MCP servers (from the allow-list) can run. All others are blocked by Claude Code.
Allow Managed Hooks OnlyPrevents user-defined hooks that could bypass policy checks.
Allow Remote SessionsWhether Claude Code may accept remote session connections.

Compliance monitoring

The Config Guard page in the dashboard shows real-time compliance status for all endpoints:

  • Total endpoints covered by the policy
  • Compliant / Non-Compliant split
  • Per-endpoint tamper type (missing, modified) and details

Tamper events generate a high-severity alert visible in the Alerts page.

Configuring the policy

Navigate to Config Guard in the sidebar. Changes take effect within 60 seconds (next agent heartbeat).

Recommended baseline

Enable Disable Bypass Permissions Mode and Allow Managed Permission Rules Only for all environments. Enable Allow Managed MCP Servers Only only after defining an MCP server allow-list.