Policy: Privilege Elevation Allow Policy for Admin CLI

This example shows a Privilege Elevation policy that allowlists a specific administrative CLI application so it can run with elevated privileges on targeted endpoints. It’s useful for demonstrating how to permit a known admin tool without forcing users through Approval, MFA, or justification prompts.


What This Policy Does

  • Applies a Privilege Elevation rule in enforce mode.

  • Targets:

    • A specific user (one User ID, not a wildcard)

    • A specific application (one App ID, representing an Admin CLI tool)

    • One specific endpoint (one Machine ID)

  • On a match, it applies an ALLOW control for elevation (OnSuccess: ALLOW).

  • Does not require the user to acknowledge the notification.


Why It Behaves This Way

  • User-Scoped Allowlist: Because the user targeting is a specific User ID (not *), only that user is eligible to elevate the covered process.

  • Application-Scoped Allowlist: Because the application targeting is a single App ID (not *), only that specific CLI process is covered.

  • Enforced Allow: The policy is set to enforce and the success control is ALLOW, so matching elevation attempts are permitted.

  • Standard Checks With No Extra Constraints: Date/Time/Day/Certificate restrictions are empty, so the behavior mainly depends on whether the user, machine, and application match.


Revise To Apply To Multiple Endpoints

Right now, machine targeting includes a single endpoint identifier. To apply this same allow behavior across multiple endpoints, update machine targeting so it includes more than one endpoint identifier. For example:

  • Before: Machine targeting lists one endpoint.

  • After: Machine targeting contains multiple endpoint identifiers.

No other changes are required to broaden endpoint coverage.


What The User Experiences

  • If the specified user runs the Admin CLI tool and tries to elevate on an in-scope endpoint, the elevation should succeed without approval or MFA prompts (because the policy explicitly allows it).

  • The policy includes a notification message, but acknowledgement is not required, so it shouldn’t add an extra “click to continue” step.


Important Notes And Common Adjustments

  • Fix The Notification Message: The current message references “monitor mode” and says MFA/justification/request will be required when enabled, but the policy is enforced and uses ALLOW. Update or remove the message so it matches actual behavior.

  • Decide If User Scoping Is Intended: If this allow should apply to more than one person, expand the user targeting (or use a wildcard / group-based approach where applicable).

  • Consider Certificate Constraints: If supported in your environment, restrict by signer/publisher/certificate so only trusted builds of the Admin CLI can be elevated.

  • Keep The App Targeting Stable: If the Admin CLI binary changes location/name/version frequently, consider how the App ID is generated in your environment so the allow continues to match the intended executable.

Example JSON

Last updated

Was this helpful?