Policy: File Access Justification Policy for Living Off the Land Process

This example shows a File Access policy designed for a “living off the land” scenario: it targets a specific built-in or commonly abused process and requires the user to provide a justification before the action is allowed. It’s useful for demonstrating how to add friction and auditing around high-risk tools without blocking them outright.


What This Policy Does

  • Applies a File Access rule in enforce mode.

  • Targets:

    • Any user (*)

    • One specific application (a single App ID)

    • One specific endpoint (a single Machine ID)

  • On a match, it requires JUSTIFY (the user must enter a justification) before proceeding.

  • Requires the user to acknowledge the notification (NotificationRequiresAcknowledge: true).

  • Assigns a Risk Level of 50.


Why It Behaves This Way

  • Application-Scoped Control: The policy is tied to one specific application identifier, so it only triggers for that tool/process rather than everything on the endpoint.

  • Broad User Coverage: With a wildcard user scope, anyone on the targeted endpoint is subject to the same justification requirement.

  • Justification As A Control: Using JUSTIFY adds accountability and audit context while still allowing the action to proceed when there’s a legitimate need.

  • Standard Checks With No Extra Constraints: Date/Time/Day/Certificate restriction lists are empty, so the match is primarily driven by user + machine + application targeting.


What The User Experiences

  • When a user triggers the covered process on an in-scope endpoint, they’ll be prompted to provide a justification.

  • They’ll also be required to acknowledge the notification before continuing.

  • After justification is provided, the action proceeds (this policy is “prompt and record,” not “block”).


Important Notes And Common Adjustments

  • Fix The Notification Message: The current message references “monitor mode” and talks about running a process “as an administrator,” which doesn’t match a File Access policy requiring JUSTIFY. Update the message so it clearly explains that a justification is required for this process and why.

  • Reduce Prompt Fatigue: If this process is used frequently for legitimate reasons, consider narrowing scope (specific users/groups, specific endpoints, or tighter application targeting) to avoid excessive prompts.

  • Choose Justify vs Deny vs Approval:

    • Use JUSTIFY when you want accountability without stopping work.

    • Use DENY when the tool should never be used.

    • Use APPROVAL when usage should be permitted only with explicit authorization.

  • Keep Risk Level Meaningful: If you’re using risk scoring for reporting or prioritization, align the Risk Level value with the severity of the tool/use case in your environment.


Example JSON

Last updated

Was this helpful?