Policy: Privilege Elevation Justification Policy for Command Prompt

This example shows a Privilege Elevation policy that targets a specific application (Command Prompt / cmd.exe, as represented by a single App ID) and requires the user to provide a justification before the process can run with elevated privileges. It’s useful for demonstrating how to add accountability and audit context around elevation of a commonly abused “living off the land” tool—without blocking it outright.
What This Policy Does
Targets Privilege Elevation for:
Any user (
*)One specific application (a single App ID)
One specific endpoint (a single Machine ID)
Requires JUSTIFY on success (the user must enter a justification before elevation proceeds).
Requires the user to acknowledge the notification (
NotificationRequiresAcknowledge: true).Is currently turned off (
Status: off), so it will not apply until enabled.Assigns a Risk Level of 50.
Why It Behaves This Way
Application-Scoped Control: The policy is tied to a single application identifier, so it triggers only for the targeted process rather than for every elevation attempt.
Broad User Coverage: With a wildcard user scope, any user on the targeted endpoint is subject to the same justification requirement.
Justification As The Control: JUSTIFY is designed to collect user-provided context and create an audit trail while still allowing work to proceed when there’s a legitimate need.
Standard Checks With No Extra Constraints: Date/Time/Day/Certificate restriction lists are empty, so the match is primarily driven by user + machine + application targeting.
Message/Behavior Mismatch: The notification text says “monitor mode” and implies multiple controls (MFA, justification, request), but the configured success control is JUSTIFY only.
What The User Experiences
In Its Current State (Status Off): Users won’t see anything from this policy because it’s disabled.
If Enabled: When a user attempts to run the targeted process as an administrator on an in-scope endpoint, they’ll be prompted to enter a justification.
Because acknowledgement is required, the user must also dismiss the notification prompt as part of the flow.
Important Notes And Common Adjustments
Enable It Intentionally: If this is meant to be active, switch the policy from off to an enabled/enforced state.
Fix The Notification Message: Update the text so it accurately reflects the actual control (JUSTIFY) and avoids referencing monitor mode or additional controls that aren’t configured.
Decide If You Need A Stronger Control:
Use APPROVAL if elevations of this tool should require explicit authorization.
Add MFA if you want a step-up authentication requirement for this elevation.
Use DENY if this tool should never be elevated in your environment.
Reduce Prompt Fatigue: If legitimate use is frequent, consider narrowing by user/group or limiting to specific endpoints (or moving from JUSTIFY to ALLOW for a smaller trusted population).
Example JSON
Last updated
Was this helpful?

