Merge branch 'master' into aljupudi-branch01

This commit is contained in:
Alekhya Jupudi 2021-09-01 07:46:11 +05:30 committed by GitHub
commit a2ac53e375
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
144 changed files with 2155 additions and 1350 deletions

View File

@ -1,5 +1,10 @@
{ {
"redirections": [ "redirections": [
{
"source_path": "windows/application-management/msix-app-packaging-tool.md",
"redirect_url": "/windows/application-management/apps-in-windows-10",
"redirect_document_id": false
},
{ {
"source_path": "browsers/edge/about-microsoft-edge.md", "source_path": "browsers/edge/about-microsoft-edge.md",
"redirect_url": "/previous-versions/windows/edge-legacy/about-microsoft-edge", "redirect_url": "/previous-versions/windows/edge-legacy/about-microsoft-edge",

View File

@ -1,30 +1,74 @@
--- ---
title: Windows 10 - How to add apps from Apps & features title: Add or hide optional apps and features on Windows devices | Microsoft Docs
description: Learn how to add apps, like XPS Viewer, to your Windows 10 device with the Apps & features page in Settings description: Learn how to add Windows 10 and Windows 11 optional features using the Apps & features page in the Settings app. Also see the group policy objects (GPO) and MDM policies that show or hide Apps and Windows Features in the Settings app. Use Windows PowerShell to show or hide specific features in Windows Features.
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: manage ms.mktglfcycl: manage
ms.sitesec: library ms.sitesec: library
ms.pagetype: article ms.pagetype: article
ms.author: greglin ms.author: mandia
author: greg-lindsay author: MandiOhlinger
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 04/26/2018 ms.date: 08/30/2021
ms.reviewer: ms.reviewer:
manager: dansimp manager: dougeby
ms.topic: article ms.topic: article
--- ---
# How to add apps and features to Windows 10
> Applies to: Windows 10
Windows 10 includes a range of [applications](apps-in-windows-10.md), from [system apps](apps-in-windows-10.md#system-apps) that support the operating system (like Settings) to ["provisioned" apps](apps-in-windows-10.md#provisioned-windows-apps) (like Feedback Hub) that are installed the first time you run Windows. We also provide additional apps and features, called Features on Demand (like language packs or handwriting recognition), that you can install at any time. If you're working in a managed environment (like at work, where you have an administrator who manages your systems and resources), your admin can use [Windows Update to install Features on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). If you're working on your own device, you can add apps and features from the Settings app. # Add or hide features on the Windows client OS
Here's how you do that: > Applies to:
>
> - Windows 10
1. In the Search bar, search for "apps." The Windows client operating systems include more features that you and your users can install. These features are called [Features on Demand](/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (opens another Microsoft web site), and can be installed at any time. On your organization-owned devices, you may want to control access to these other features.
2. Select **Apps and features** in the results.
3. Select **Manage optional features**, and then select **Add a feature**.
4. Select the feature you want to add, like **XPS Viewer**, and then select **Install.**
And that's it. You can see the apps you have installed on the **Apps & features** page and the features on **Manage optional features**. This article:
You can manage and uninstall apps and features from the same Settings page. Just select the app or feature, and then select **Uninstall**. - Shows you how to add features using the user interface.
- Lists the group policies and Mobile device management (MDM) policies to hide Windows Features.
- Includes information on using Windows PowerShell to disable specific Windows Features.
If you're working on your own device, use the **Settings** app to add features.
## Add or uninstall features
1. In the Search bar, search for "apps", and select **Apps and features**.
2. Select **Optional features** > **Add a feature**.
3. Select the feature you want to add, like **XPS Viewer**, and then select **Install.**
When the installation completes, the feature is listed in **Apps & features**. In **Apps & features** > **Optional features** > **More Windows features**, there are more features that you and your users can install.
To uninstall a feature, open the **Settings** app. Select the feature, and then select **Uninstall**.
## Use Group Policy or MDM to hide Windows Features
By default, the OS might show Windows Features, and allow users to install and uninstall these optional apps and features.
To hide Windows Features on your user devices, you can use Group Policy (on-premises), or use an MDM provider, such as Microsoft Intune (cloud).
### Group Policy
If you use Group Policy, use the `User Configuration\Administrative Template\Control Panel\Programs\Hide "Windows Features"` policy. By default, this policy may be set to **Not configured**, which means users can add or remove features. When this setting is **Enabled**, the Windows Features is hidden on the device.
You can't use Group Policy to disable specific Windows Features, such as XPS Viewer. If you want to disable specific features, use [Windows PowerShell](#use-windows-powershell-to-disable-specific-features) (in this article).
If you want to hide the entire **Apps** feature in the Settings app, use the `User Configuration\Administrative Template\Control Panel\Programs\Hide "Programs and Features" page` policy.
### MDM
Using Microsoft Intune, you can use [Administrative Templates](/mem/intune/configuration/administrative-templates-windows) (opens another Microsoft web site) or the [Settings Catalog](/mem/intune/configuration/settings-catalog) (opens another Microsoft web site) to hide Windows Features.
If you want to hide the entire **Apps** feature in the Settings app, you can use a configuration policy on Intune enrolled devices. For more information on the Control Panel settings you can configure, see [Control Panel settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-windows-10#control-panel-and-settings).
## Use Windows PowerShell to disable specific features
To disable specific features, you can use the Windows PowerShell [Disable-WindowsOptionalFeature](/powershell/module/dism/disable-windowsoptionalfeature) command. There isn't a Group Policy that disables specific Windows Features.
If you're looking to automate disabling specific features, you can create a scheduled task. Then, use the scheduled task to run your Windows PowerShell script. For more information about Task Scheduler, see [Task Scheduler for developers](/windows/win32/taskschd/task-scheduler-start-page).
Microsoft Intune can also execute Windows PowerShell scripts. For more information, see [Use PowerShell scripts on Windows client devices in Intune](/mem/intune/apps/intune-management-extension).
## Restore Windows features
- If you use Group Policy or MDM to hide Windows Features or the entire Apps feature, you can set the policy to **Not configured**. Then, deploy your policy. When the device receives the policy, the features are configurable.
- Using Windows PowerShell, you can also enable specific features using the [Enable-WindowsOptionalFeature](/powershell/module/dism/enable-windowsoptionalfeature) command.

View File

@ -1,803 +1,148 @@
--- ---
title: Learn about the different app types in Windows 10 | Microsoft Docs title: Learn about the different app types in Windows 10 | Microsoft Docs
ms.reviewer: ms.reviewer:
manager: dansimp manager: dougeby
description: Use this article to understand the different types of apps that run on Windows 10, such as UWP and Win32 apps. description: Learn more and understand the different types of apps that run on Windows 10 and Windows 11. For example, learn more about UWP, WPF, Win32, and Windows Forms apps, including the best way to install these apps.
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: mobile ms.pagetype: mobile
ms.author: greglin ms.author: mandia
author: greg-lindsay author: MandiOhlinger
ms.localizationpriority: medium ms.localizationpriority: medium
ms.topic: article ms.topic: article
--- ---
# Understand the different apps included in Windows 10
>Applies to: Windows 10 # Overview of apps on Windows client devices
On your Windows 10 devices, you can run the following app types: > Applies to:
>
> - Windows 10
- **Windows apps**: These apps are included with the Windows OS, and are also installed from the Microsoft Store app. There are two categories: ## Before you begin
As organizations become more global, and to support employees working from anywhere, it's recommended to use a Mobile Device Management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. For Microsoft, that includes using Microsoft Endpoint Manager. Endpoint Manager includes Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises.
In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started:
- [Microsoft Endpoint Manager overview](/mem/endpoint-manager-overview)
- [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide)
- [What is Configuration Manager?](/mem/configmgr/core/understand/introduction)
## App types
There are different types of apps that can run on your Windows client devices. This section lists some of the common apps used on Windows devices.
- **Microsoft 365 apps**: These apps are used for business and productivity, and include Outlook, Word, Teams, OneNote, and more. Depending on the licenses your organization has, you may already have these apps. Using an MDM provider, these apps can also be deployed to mobile devices, including smartphones.
For more information on the Microsoft 365 license options, and what you get, see [Transform your enterprise with Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
- **Power Apps**: These apps connect to business data available online and on-premises, and can run in a web browser, and on mobile devices. They can be created by business analysts and professional developers. For more information, see [What is Power Apps?](/powerapps/powerapps-overview).
- **.NET apps**: These apps can be desktop apps that run on the device, or web apps. Some common .NET apps include:
- **Windows Presentation Foundation (WPF)**: Using .NET, you can create a WPF desktop app that runs on the device, or create a WPF web app. This app is commonly used by organizations that create line of business (LOB) desktop apps. For more information, see [WPF Application Development](/dotnet/desktop/wpf/app-development).
- **Windows Forms (WinForm)**: Using .NET, you can create a Windows Forms desktop app that runs on the device, and doesn't require a web browser or internet access. Just like Win32 apps, WinForm apps can access the local hardware and file system of the computer where the app is running. For more information, see [Desktop Guide (Windows Forms .NET)](/dotnet/desktop/winforms/overview).
- **Windows apps**:
> [!TIP]
> Starting with Windows 10, you can use the **Windows UI Library (WinUI 3)** to create .NET, Win32 desktop, and UWP apps. This library includes native Windows UI controls and other user interface elements familiar to Windows users. For more information, see [Windows UI Library (WinUI)](/windows/apps/winui/).
- **Apps**: All apps installed in `C:\Program Files\WindowsApps`. There are two classes of apps: - **Apps**: All apps installed in `C:\Program Files\WindowsApps`. There are two classes of apps:
- **Provisioned**: Installed in user account the first time you sign in with a new user account. - **Provisioned**: Installed in user account the first time you sign in with a new user account. For a list of some common provisioned apps, see [Provisioned apps installed with the Windows client OS](provisioned-apps-windows-client-os.md).
- **Installed**: Installed as part of the OS. - **Installed**: Installed as part of the OS.
- **System apps**: Apps installed in the `C:\Windows\` directory. These apps are part of the Windows OS. - **Universal Windows Platform (UWP) apps**: These apps run and can be installed on many Windows platforms, including tablets, Microsoft HoloLens, Xbox, and more. All UWP apps are Windows apps. Not all Windows apps are UWP apps.
- **Universal Windows Platform (UWP) apps**: These apps run and can be installed on many Windows platforms, including tablets, Microsoft HoloLens, Xbox, and more. All UWP apps are Windows apps. But, not all Windows apps are UWP apps. For more information, see [What's a Universal Windows Platform (UWP) app?](/windows/uwp/get-started/universal-application-platform-guide).
- **Win32 apps**: These apps are traditional Windows applications.
This article lists the provisioned Windows apps and system apps installed on a standard Windows 10 Enterprise device. If you use custom images, your specific apps might be different. - **Win32 apps**: These apps are traditional Windows apps that run on the device, and are often called desktop apps. They require direct access to Windows and the device hardware, and typically don't require a web browser. These apps run in 32-bit mode on 64-bit devices, and don't depend on a managed runtime environment, like .NET.
Some of the apps show up in multiple areas. That's because their status changed between versions. Make sure to check the version column for the version you're currently running. For more information, see [Get started developing apps for Windows desktop](/windows/apps/get-started) and [Make your apps great on Windows 11](/windows/apps/get-started/make-apps-great-for-windows).
## Provisioned Windows apps - **System apps**: Apps installed in the `C:\Windows\` directory. These apps are part of the Windows OS. For a list of some common system apps, see [System apps installed with the Windows client OS](system-apps-windows-client-os.md).
The first time a user signs into a Windows device, some apps are automatically provisioned. To get a list of all provisioned Windows apps, run the following Windows PowerShell command: - **Web apps** and **Progressive web apps (PWA)**: These apps run on a server, and don't run on the end user device. To use these apps, users must use a web browser and have internet access. **Progressive web apps** are designed to work for all users, work with any browser, and work on any platform.
```Powershell Web apps are typically created in Visual Studio, and can be created with different languages. For more information, see [Create a Web App](https://azure.microsoft.com/get-started/web-app/). When the app is created and ready to be used, you deploy the web app to a web server. Using Azure, you can host your web apps in the cloud, instead of on-premises. For more information, see [App Service overview](/azure/app-service/overview).
Get-AppxProvisionedPackage -Online | Format-Table DisplayName, PackageName
```
The following information lists the provisioned apps on the supported Windows 10 OS versions: Using an MDM provider, you can create shortcuts to your web apps and progressive web apps on devices.
- [3D Builder](ms-windows-store://pdp/?PFN=Microsoft.3DBuilder_8wekyb3d8bbwe) | Package name: Microsoft.3DBuilder ## Add or deploy apps to devices
- Supported versions:
--- When your apps are ready, you can add or deploy these apps to your Windows devices. This section lists some common options.
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | | | | | |
--- - **Manually install**: On your devices, users can install apps from the Microsoft Store, from the internet, and from an organization shared drive. These apps, and more, are listed in **Settings** > **Apps** > **Apps and Features**.
- [Bing Weather](ms-windows-store://pdp/?PFN=Microsoft.BingWeather_8wekyb3d8bbwe) | Package name: Microsoft.BingWeather If you want to prevent users from downloading apps on organization owned devices, use an MDM provider, like Microsoft Intune. For example, you can create a policy that allows or prevents users from sideloading apps, only allow the private store, and more. For more information on the features you can restrict, see [Windows 10 (and newer) device settings to allow or restrict features using Intune](/mem/intune/configuration/device-restrictions-windows-10).
- Supported versions:
--- For an overview of the different types of device policies you can create, see [Apply features and settings on your devices using device profiles in Microsoft Intune](/mem/intune/configuration/device-profiles).
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
--- - **Mobile device management (MDM)**: Use an MDM provider, like Microsoft Intune (cloud) or Configuration Manager (on-premises), to deploy apps. For example, you can create app policies that deploy Microsoft 365 apps, deploy Win32 apps, create shortcuts to web apps, add Store apps, and more.
- [Desktop App Installer](ms-windows-store://pdp/?PFN=Microsoft.DesktopAppInstaller_8wekyb3d8bbwe) | Package name: Microsoft.DesktopAppInstaller For more information, see:
- Supported versions:
--- - [Add apps to Microsoft Intune](/mem/intune/apps/apps-add)
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 | - [Application management in Configuration Manager](/mem/configmgr/apps/understand/introduction-to-application-management)
| --- | --- | --- | --- | --- | --- |--- |
| Use Settings App | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
--- - **Microsoft Store**: Using the Microsoft Store app, Windows users can download apps from the public store. And, they can download apps provided by your organization, which is called the "private store". If your organization creates its own apps, you can use **[Windows Package Manager](/windows/package-manager)** to add apps to the private store.
- [Get Help](ms-windows-store://pdp/?PFN=Microsoft.Gethelp_8wekyb3d8bbwe) | Package name: Microsoft.GetHelp To help manage the Microsoft Store on your devices, you can use policies:
- Supported versions:
--- - On premises, you can use Administrative Templates in Group Policy to control access to the Microsoft Store app:
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 | - `User Configuration\Administrative Templates\Windows Components\Store`
| --- | --- | --- | --- | --- | --- |--- | - `Computer Configuration\Administrative Templates\Windows Components\Store`
| ❌ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️| - Using Microsoft Intune, you can use [Administrative Templates](/mem/intune/configuration/administrative-templates-windows) (opens another Microsoft web site) or the [Settings Catalog](/mem/intune/configuration/settings-catalog) (opens another Microsoft web site) to control access to the Microsoft Store app.
--- For more information, see:
- [Microsoft Tips](ms-windows-store://pdp/?PFN=Microsoft.Getstarted_8wekyb3d8bbwe) | Package name: Microsoft.Getstarted - [Microsoft Store for Business and Education](/microsoft-store/)
- Supported versions: - [Evolving the Microsoft Store for Business and Education](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/evolving-the-microsoft-store-for-business-and-education/ba-p/2569423)
--- - **MSIX for desktop apps**: MSIX packages your UWP, Win32, WPF, and WinForm desktop application files. MSIX reliably installs apps, helps optimize disk storage space, and reduces duplicate files. If your organization typically uses `.EXE` or `.MSI` files to install desktop apps, then you should look into MSIX.
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
--- To deploy MSIX packages and their apps, you can:
- [HEIF Image Extensions](ms-windows-store://pdp/?PFN=Microsoft.HEIFImageExtension_8wekyb3d8bbwe) | Package name: Microsoft.HEIFImageExtension - Use an MDM provider, like Microsoft Intune and Configuration Manager.
- Supported versions: - Use an App Installer. User users double-click an installer file, or select a link on a web page.
- And more.
--- For more information, see:
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
--- - [What is MSIX?](/windows/msix/overview)
- [MSIX app distribution for enterprises](/windows/msix/desktop/managing-your-msix-deployment-enterprise)
- [Microsoft Messaging](ms-windows-store://pdp/?PFN=Microsoft.Messaging_8wekyb3d8bbwe) | Package name:Microsoft.Messaging - **Windows Package Manager**: Windows Package Manager is a command line tool commonly used by developers to install Windows apps. Using the command line, you can get apps from the Microsoft Store or from GitHub (and more), and install these apps on Windows devices. It's helpful if you want to bypass user interfaces for getting apps from organizations and from developers.
- Supported versions:
--- If your organization uses `.EXE`, `.MSIX`, or `.MSI` files, then Windows Package Manager might be the right deployment option for your organization.
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| | ✔️| ✔️| ✔️|
--- For more information, see [Windows Package Manager](/windows/package-manager).
- [Microsoft 3D Viewer](ms-windows-store://pdp/?PFN=Microsoft.Microsoft3DViewer_8wekyb3d8bbwe) | Package name: Microsoft.Microsoft3DViewer - **Azure Virtual desktop with MSIX app attach**: With Azure virtual desktop, you can virtualize the Windows client OS desktop, and use virtual apps on this desktop. With MSIX app attach, you dynamically deliver MSIX packaged apps to users and user groups.
- Supported versions:
--- The benefit is to use the cloud to deliver virtual apps in real time, and as-needed. Users use the apps as if they're installed locally.
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
--- If you currently use App-V, and want to reduce your on-premises footprint, then **Azure Virtual desktop with MSIX app attach** might be the right deployment for your organization.
- [Office](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe) | Package name: Microsoft.MicrosoftOfficeHub For more information, see:
- Supported versions:
--- - [What is Azure Virtual Desktop?](/azure/virtual-desktop/overview)
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 | - [Set up MSIX app attach with the Azure portal](/azure/virtual-desktop/app-attach-azure-portal)
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
--- - **Application Virtualization (App-V)**: App-V allows Win32 apps to be used as virtual apps.
- [Microsoft Solitaire Collection](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftSolitaireCollection_8wekyb3d8bbwe) | Package name: Microsoft.MicrosoftSolitaireCollection > [!NOTE]
- Supported versions: > Application Virtualization will be [end of life in April 2026](/lifecycle/announcements/mdop-extended). We recommend looking at **Azure Virtual desktop with MSIX app attach**. For more information, see [What is Azure Virtual Desktop?](/azure/virtual-desktop/overview) and [Set up MSIX app attach with the Azure portal](/azure/virtual-desktop/app-attach-azure-portal).
--- On an on-premises server, you install and configure the App-V server components, and then install your Win32 apps. On Windows Enterprise client devices, you use the App-V client components to run the virtualized apps. They allow users to open the virtual apps using the icons and file names they're familiar with. Users use the apps as if they're installed locally.
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
--- The benefit is to deliver virtual apps in real time, and as-needed. For more information, see [Application Virtualization (App-V) for Windows overview](./app-v/appv-for-windows.md).
- [Microsoft Sticky Notes](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe) | Package name: Microsoft.MicrosoftStickyNotes To help manage App-V on your devices, you can use policies:
- Supported versions:
--- - On premises, you can use Administrative Templates in Group Policy to deploy App-V policies (`Computer Configuration\Administrative Templates\System\App-V`).
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 | - Using Microsoft Intune, you can use [Administrative Templates](/mem/intune/configuration/administrative-templates-windows) (opens another Microsoft web site) or the [Settings Catalog](/mem/intune/configuration/settings-catalog) (opens another Microsoft web site) to deploy App-V policies.
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Mixed Reality Portal](ms-windows-store://pdp/?PFN=Microsoft.MixedReality.Portal_8wekyb3d8bbwe) | Package name: Microsoft.MixedReality.Portal
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Paint 3D](ms-windows-store://pdp/?PFN=Microsoft.MSPaint_8wekyb3d8bbwe) | Package name: Microsoft.MSPaint
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [OneNote for Windows 10](ms-windows-store://pdp/?PFN=Microsoft.Office.OneNote_8wekyb3d8bbwe) | Package name: Microsoft.Office.OneNote
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Mobile Plans](ms-windows-store://pdp/?PFN=Microsoft.OneConnect_8wekyb3d8bbwe) | Package name: Microsoft.OneConnect
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| | ✔️| ✔️| ✔️|
---
- Microsoft.Outlook.DesktopIntegrationServices
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| | ✔️ | ✔️| | ✔️| | |
---
- [Microsoft People](ms-windows-store://pdp/?PFN=Microsoft.People_8wekyb3d8bbwe) | Package name: Microsoft.People
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Print 3D](ms-windows-store://pdp/?PFN=Microsoft.Print3D_8wekyb3d8bbwe) | Package name: Microsoft.Print3D
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| | ✔️| ✔️| ✔️|
---
- [Snip & Sketch](ms-windows-store://pdp/?PFN=Microsoft.ScreenSketch_8wekyb3d8bbwe) | Package name: Microsoft.ScreenSketch
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Skype](ms-windows-store://pdp/?PFN=Microsoft.SkypeApp_kzf8qxf38zg5c) | Package name: Microsoft.SkypeApp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Store Purchase App](ms-windows-store://pdp/?PFN=Microsoft.StorePurchaseApp_8wekyb3d8bbwe) | Package name: Microsoft.StorePurchaseApp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- Microsoft.VP9VideoExtensions
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Pay](ms-windows-store://pdp/?PFN=Microsoft.Wallet_8wekyb3d8bbwe) | Package name: Microsoft.Wallet
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Web Media Extensions](ms-windows-store://pdp/?PFN=Microsoft.WebMediaExtensions_8wekyb3d8bbwe) | Package name: Microsoft.WebMediaExtensions
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Webp Image Extension](ms-windows-store://pdp/?PFN=Microsoft.WebpImageExtension_8wekyb3d8bbwe) | Package name: Microsoft.WebpImageExtension
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Photos](ms-windows-store://pdp/?PFN=Microsoft.Windows.Photos_8wekyb3d8bbwe) | Package name: Microsoft.Windows.Photos
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Alarms & Clock](ms-windows-store://pdp/?PFN=Microsoft.WindowsAlarms_8wekyb3d8bbwe) | Package name: Microsoft.WindowsAlarms
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Calculator](ms-windows-store://pdp/?PFN=Microsoft.WindowsCalculator_8wekyb3d8bbwe) | Package name: Microsoft.WindowsCalculator
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Camera](ms-windows-store://pdp/?PFN=Microsoft.WindowsCamera_8wekyb3d8bbwe) | Package name: Microsoft.WindowsCamera
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Mail and Calendar](ms-windows-store://pdp/?PFN=microsoft.windowscommunicationsapps_8wekyb3d8bbwe) | Package name: microsoft.windowscommunicationsapps
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Feedback Hub](ms-windows-store://pdp/?PFN=Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe) | Package name: Microsoft.WindowsFeedbackHub
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Maps](ms-windows-store://pdp/?PFN=Microsoft.WindowsMaps_8wekyb3d8bbwe) | Package name: Microsoft.WindowsMaps
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Voice Recorder](ms-windows-store://pdp/?PFN=Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe) | Package name: Microsoft.WindowsSoundRecorder
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Store](ms-windows-store://pdp/?PFN=Microsoft.WindowsStore_8wekyb3d8bbwe) | Package name: Microsoft.WindowsStore
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- The Store app shouldn't be removed. If you remove the Store app, and want to reinstall it, you can restore your system from a backup, or reset your system. Instead of removing the Store app, use group policies to hide or disable it.
- [Xbox Live in-game experience](ms-windows-store://pdp/?PFN=Microsoft.Xbox.TCUI_8wekyb3d8bbwe) | Package name: Microsoft.Xbox.TCUI
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Console Companion](ms-windows-store://pdp/?PFN=Microsoft.XboxApp_8wekyb3d8bbwe) | Package name: Microsoft.XboxApp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Game Bar Plugin](ms-windows-store://pdp/?PFN=Microsoft.XboxGameOverlay_8wekyb3d8bbwe) | Package name: Microsoft.XboxGameOverlay
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Game Bar](ms-windows-store://pdp/?PFN=Microsoft.XboxGamingOverlay_8wekyb3d8bbwe) | Package name: Microsoft.XboxGamingOverlay
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Identity Provider](ms-windows-store://pdp/?PFN=Microsoft.XboxIdentityProvider_8wekyb3d8bbwe) | Package name: Microsoft.XboxIdentityProvider
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- Microsoft.XboxSpeechToTextOverlay
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Your Phone](ms-windows-store://pdp/?PFN=Microsoft.YourPhone_8wekyb3d8bbwe) | Package name: Microsoft.YourPhone
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Groove Music](ms-windows-store://pdp/?PFN=Microsoft.ZuneMusic_8wekyb3d8bbwe) | Package name: Microsoft.ZuneMusic
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Movies & TV](ms-windows-store://pdp/?PFN=Microsoft.ZuneVideo_8wekyb3d8bbwe) | Package name: Microsoft.ZuneVideo
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
## System apps
System apps are used by the operating system. To get a list of all the system apps, run the following Windows PowerShell command:
```Powershell
Get-AppxPackage -PackageTypeFilter Main | ? { $_.SignatureKind -eq "System" } | Sort Name | Format-Table Name, InstallLocation
```
The following information lists the system apps on some Windows 10 OS versions:
- File Picker | Package name: 1527c705-839a-4832-9118-54d4Bd6a0c89
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- File Explorer | Package name: c5e2524a-ea46-4f67-841f-6a9465d9d515
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- App Resolver UX | Package name: E2A4F912-2574-4A75-9BB0-0D023378592B
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Add Suggested Folders To Library | Package name: F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- InputApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | | | ✔️ |
---
- Microsoft.AAD.Broker.Plugin | Package name: Microsoft.AAD.Broker.Plugin
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.AccountsControl | Package name: Microsoft.AccountsControl
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.AsyncTextService | Package name: Microsoft.AsyncTextService
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Hello setup UI | Package name: Microsoft.BioEnrollment
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.CredDialogHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.ECApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.LockApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft Edge | Package name: Microsoft.MicrosoftEdge
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.MicrosoftEdgeDevToolsClient
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.PPIProjection
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | | | ✔️ |
---
- Microsoft.Win32WebViewHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.Apprep.ChxApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.AssignedAccessLockApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.CapturePicker
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.CloudExperienceHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.ContentDeliveryManager
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Cortana | Package name: Microsoft.Windows.Cortana
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | | | ✔️ |
---
- Microsoft.Windows.OOBENetworkCaptivePort
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.OOBENetworkConnectionFlow
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.ParentalControls
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- People Hub | Package name: Microsoft.Windows.PeopleExperienceHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.PinningConfirmationDialog
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.SecHealthUI
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.SecureAssessmentBrowser
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Start | Package name: Microsoft.Windows.ShellExperienceHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.XboxGameCallableUI
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Windows.CBSPreview
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Settings | Package name: Windows.immersivecontrolpanel
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Print 3D | Package name: Windows.Print3D
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ✔️ | | | ✔️ |
---
- Print UI | Package name: Windows.PrintDialog
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---

View File

@ -13,8 +13,8 @@ metadata:
ms.collection: windows-10 ms.collection: windows-10
author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. author: greg-lindsay #Required; your GitHub user alias, with correct capitalization.
ms.author: greglin #Required; microsoft alias of author; optional team alias. ms.author: greglin #Required; microsoft alias of author; optional team alias.
ms.date: 04/30/2021 #Required; mm/dd/yyyy format. ms.date: 08/24/2021 #Required; mm/dd/yyyy format.
localization_priority: medium ms.localizationpriority : medium
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new # linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
@ -26,11 +26,11 @@ landingContent:
linkLists: linkLists:
- linkListType: overview - linkListType: overview
links: links:
- text: Understand apps in Windows 10 - text: Understand apps in Windows client OS
url: apps-in-windows-10.md url: apps-in-windows-10.md
- text: How to add apps and features to Windows 10 - text: How to add features
url: add-apps-and-features.md url: add-apps-and-features.md
- text: Sideload LOB apps in Windows 10 - text: Sideload LOB apps
url: sideload-apps-in-windows-10.md url: sideload-apps-in-windows-10.md
- text: Keep removed apps from returning during an update - text: Keep removed apps from returning during an update
url: remove-provisioned-apps-during-update.md url: remove-provisioned-apps-during-update.md

View File

@ -1,40 +0,0 @@
---
title: Repackage your existing win32 applications to the MSIX format.
description: Learn how to install and use the MSIX packaging tool to repackage your existing win32 applications to the MSIX format.
keywords: ["MSIX", "application", "app", "win32", "packaging tool"]
ms.prod: w10
ms.mktglfcycl: manage
ms.sitesec: library
ms.localizationpriority: medium
ms.author: greglin
ms.topic: article
ms.date: 12/03/2018
ms.reviewer:
manager: dansimp
author: greg-lindsay
---
# Repackage existing win32 applications to the MSIX format
MSIX is a packaging format built to be safe, secure and reliable, based on a combination of .msi, .appx, App-V and ClickOnce installation technologies. You can [use the MSIX packaging tool](/windows/msix/packaging-tool/create-app-package-msi-vm) to repackage your existing Win32 applications to the MSIX format.
You can either run your installer interactively (through the UI) or create a package from the command line. Either way, you can convert an application without having the source code. Then, you can make your app available through the Microsoft Store.
- [Package your favorite application installer](/windows/msix/packaging-tool/create-app-package-msi-vm) interactively (msi, exe, App-V 5.x and ClickOnce) in MSIX format.
- Create a [modification package](/windows/msix/packaging-tool/package-editor) to update an existing MSIX package.
- [Bundle multiple MSIX packages](/windows/msix/packaging-tool/bundle-msix-packages) for distribution.
## Installing the MSIX Packaging Tool
### Prerequisites
- Windows 10, version 1809 (or later)
- Participation in the Windows Insider Program (if you're using an Insider build)
- A valid Microsoft work or school account to access the app from the Microsoft Store
- Admin privileges on your PC account
### Get the app from the Microsoft Store
1. Use the Microsoft work or school account login associated with your Windows Insider Program credentials in the [Microsoft Store](https://www.microsoft.com/store/r/9N5LW3JBCXKF).
2. Open the product description page.
3. Click the install icon to begin installation.

View File

@ -0,0 +1,475 @@
---
title: Get the provisioned apps on Windows client operating system | Microsoft Docs
ms.reviewer:
manager: dougeby
description: Use the Windows PowerShell Get-AppxProvisionedPackage command to get a list off the provisioned apps installed in Windows OS. See a list of some common provisioned apps installed a Windows Enterprise client computer or device, including Windows 10.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: mobile
ms.author: mandia
author: MandiOhlinger
ms.localizationpriority: medium
ms.topic: article
---
# Provisioned apps installed with the Windows client OS
> Applies to:
>
> - Windows 10
Provisioned apps are included with the OS, and automatically installed when a user signs into a Windows device the first time. They are per-user apps, and typically installed in the `C:\Program Files\WindowsApps` folder. On your Windows devices, you can use Windows PowerShell to see the provisioned apps automatically installed.
This article lists some of the built-in provisioned apps on the different Windows client OS versions, and lists the Windows PowerShell command to get a list.
## Use Windows PowerShell
To get a list of all the provisioned apps, use Windows PowerShell:
1. Open the Windows PowerShell app as administrator.
2. Run the following script:
```Powershell
Get-AppxProvisionedPackage -Online | Format-Table DisplayName, PackageName
```
The output lists all the provisioned apps, and their package names. For more information on this command, see [Get-AppxProvisionedPackage](/powershell/module/dism/get-appxprovisionedpackage) (opens another Microsoft website).
## Built-in provisioned apps list
The following information lists some of the provisioned apps on the different Windows Enterprise client OS versions. Your specific OS version and image may have different apps. To confirm your app list, run the [PowerShell Get-AppxProvisionedPackage command](#use-windows-powershell) (in this article).
Provisioned apps are also listed in **Settings** > **Apps and Features**.
- [3D Builder](ms-windows-store://pdp/?PFN=Microsoft.3DBuilder_8wekyb3d8bbwe) | Package name: Microsoft.3DBuilder
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | | | | | |
---
- [Bing Weather](ms-windows-store://pdp/?PFN=Microsoft.BingWeather_8wekyb3d8bbwe) | Package name: Microsoft.BingWeather
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
---
- [Desktop App Installer](ms-windows-store://pdp/?PFN=Microsoft.DesktopAppInstaller_8wekyb3d8bbwe) | Package name: Microsoft.DesktopAppInstaller
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| Use Settings App | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
---
- [Get Help](ms-windows-store://pdp/?PFN=Microsoft.Gethelp_8wekyb3d8bbwe) | Package name: Microsoft.GetHelp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Tips](ms-windows-store://pdp/?PFN=Microsoft.Getstarted_8wekyb3d8bbwe) | Package name: Microsoft.Getstarted
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
---
- [HEIF Image Extensions](ms-windows-store://pdp/?PFN=Microsoft.HEIFImageExtension_8wekyb3d8bbwe) | Package name: Microsoft.HEIFImageExtension
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️|✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Messaging](ms-windows-store://pdp/?PFN=Microsoft.Messaging_8wekyb3d8bbwe) | Package name:Microsoft.Messaging
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| | ✔️| ✔️| ✔️|
---
- [Microsoft 3D Viewer](ms-windows-store://pdp/?PFN=Microsoft.Microsoft3DViewer_8wekyb3d8bbwe) | Package name: Microsoft.Microsoft3DViewer
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Office](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe) | Package name: Microsoft.MicrosoftOfficeHub
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Solitaire Collection](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftSolitaireCollection_8wekyb3d8bbwe) | Package name: Microsoft.MicrosoftSolitaireCollection
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Sticky Notes](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe) | Package name: Microsoft.MicrosoftStickyNotes
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Mixed Reality Portal](ms-windows-store://pdp/?PFN=Microsoft.MixedReality.Portal_8wekyb3d8bbwe) | Package name: Microsoft.MixedReality.Portal
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Paint 3D](ms-windows-store://pdp/?PFN=Microsoft.MSPaint_8wekyb3d8bbwe) | Package name: Microsoft.MSPaint
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [OneNote for Windows 10](ms-windows-store://pdp/?PFN=Microsoft.Office.OneNote_8wekyb3d8bbwe) | Package name: Microsoft.Office.OneNote
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ✔️ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Mobile Plans](ms-windows-store://pdp/?PFN=Microsoft.OneConnect_8wekyb3d8bbwe) | Package name: Microsoft.OneConnect
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| | ✔️| ✔️| ✔️|
---
- Microsoft.Outlook.DesktopIntegrationServices
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| | ✔️ | ✔️| | ✔️| | |
---
- [Microsoft People](ms-windows-store://pdp/?PFN=Microsoft.People_8wekyb3d8bbwe) | Package name: Microsoft.People
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Print 3D](ms-windows-store://pdp/?PFN=Microsoft.Print3D_8wekyb3d8bbwe) | Package name: Microsoft.Print3D
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| | ✔️| ✔️| ✔️|
---
- [Snip & Sketch](ms-windows-store://pdp/?PFN=Microsoft.ScreenSketch_8wekyb3d8bbwe) | Package name: Microsoft.ScreenSketch
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Skype](ms-windows-store://pdp/?PFN=Microsoft.SkypeApp_kzf8qxf38zg5c) | Package name: Microsoft.SkypeApp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Store Purchase App](ms-windows-store://pdp/?PFN=Microsoft.StorePurchaseApp_8wekyb3d8bbwe) | Package name: Microsoft.StorePurchaseApp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- Microsoft.VP9VideoExtensions
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Pay](ms-windows-store://pdp/?PFN=Microsoft.Wallet_8wekyb3d8bbwe) | Package name: Microsoft.Wallet
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Web Media Extensions](ms-windows-store://pdp/?PFN=Microsoft.WebMediaExtensions_8wekyb3d8bbwe) | Package name: Microsoft.WebMediaExtensions
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Webp Image Extension](ms-windows-store://pdp/?PFN=Microsoft.WebpImageExtension_8wekyb3d8bbwe) | Package name: Microsoft.WebpImageExtension
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Photos](ms-windows-store://pdp/?PFN=Microsoft.Windows.Photos_8wekyb3d8bbwe) | Package name: Microsoft.Windows.Photos
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Alarms & Clock](ms-windows-store://pdp/?PFN=Microsoft.WindowsAlarms_8wekyb3d8bbwe) | Package name: Microsoft.WindowsAlarms
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Calculator](ms-windows-store://pdp/?PFN=Microsoft.WindowsCalculator_8wekyb3d8bbwe) | Package name: Microsoft.WindowsCalculator
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Camera](ms-windows-store://pdp/?PFN=Microsoft.WindowsCamera_8wekyb3d8bbwe) | Package name: Microsoft.WindowsCamera
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Mail and Calendar](ms-windows-store://pdp/?PFN=microsoft.windowscommunicationsapps_8wekyb3d8bbwe) | Package name: microsoft.windowscommunicationsapps
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Feedback Hub](ms-windows-store://pdp/?PFN=Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe) | Package name: Microsoft.WindowsFeedbackHub
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Maps](ms-windows-store://pdp/?PFN=Microsoft.WindowsMaps_8wekyb3d8bbwe) | Package name: Microsoft.WindowsMaps
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Windows Voice Recorder](ms-windows-store://pdp/?PFN=Microsoft.WindowsSoundRecorder_8wekyb3d8bbwe) | Package name: Microsoft.WindowsSoundRecorder
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Microsoft Store](ms-windows-store://pdp/?PFN=Microsoft.WindowsStore_8wekyb3d8bbwe) | Package name: Microsoft.WindowsStore
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- The Store app shouldn't be removed. If you remove the Store app, and want to reinstall it, you must restore your system from a backup, or reset your system. Instead of removing the Store app, use group policies to hide or disable it.
- [Xbox Live in-game experience](ms-windows-store://pdp/?PFN=Microsoft.Xbox.TCUI_8wekyb3d8bbwe) | Package name: Microsoft.Xbox.TCUI
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Console Companion](ms-windows-store://pdp/?PFN=Microsoft.XboxApp_8wekyb3d8bbwe) | Package name: Microsoft.XboxApp
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Game Bar Plugin](ms-windows-store://pdp/?PFN=Microsoft.XboxGameOverlay_8wekyb3d8bbwe) | Package name: Microsoft.XboxGameOverlay
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Game Bar](ms-windows-store://pdp/?PFN=Microsoft.XboxGamingOverlay_8wekyb3d8bbwe) | Package name: Microsoft.XboxGamingOverlay
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Xbox Identity Provider](ms-windows-store://pdp/?PFN=Microsoft.XboxIdentityProvider_8wekyb3d8bbwe) | Package name: Microsoft.XboxIdentityProvider
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- Microsoft.XboxSpeechToTextOverlay
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Your Phone](ms-windows-store://pdp/?PFN=Microsoft.YourPhone_8wekyb3d8bbwe) | Package name: Microsoft.YourPhone
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Groove Music](ms-windows-store://pdp/?PFN=Microsoft.ZuneMusic_8wekyb3d8bbwe) | Package name: Microsoft.ZuneMusic
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---
- [Movies & TV](ms-windows-store://pdp/?PFN=Microsoft.ZuneVideo_8wekyb3d8bbwe) | Package name: Microsoft.ZuneVideo
- Supported versions:
---
| Uninstall through UI? | 21H1 | 20H2 | 2004 | 1909| 1903| 1809 |
| --- | --- | --- | --- | --- | --- |--- |
| ❌ | ✔️ | ✔️| ✔️ | ✔️| ✔️| ✔️|
---

View File

@ -1,93 +1,107 @@
--- ---
title: Sideload LOB apps in Windows 10 (Windows 10) title: Sideload LOB apps in Windows client OS | Microsoft Docs
description: Learn how to sideload line-of-business (LOB) apps in Windows 10. When you sideload an app, you deploy a signed app package to a device. description: Learn how to sideload line-of-business (LOB) apps in Windows client operating systems, including Windows 10. When you sideload an app, you deploy a signed app package to a device.
ms.assetid: C46B27D0-375B-4F7A-800E-21595CF1D53D ms.assetid: C46B27D0-375B-4F7A-800E-21595CF1D53D
ms.reviewer: ms.reviewer:
manager: dansimp manager: dougeby
ms.author: greglin ms.author: greglin
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: mobile ms.pagetype: mobile
author: greg-lindsay author: greg-lindsay
ms.date: 05/20/2019 ms.date: 08/30/2021
ms.localizationpriority: medium
--- ---
# Sideload LOB apps in Windows 10 # Sideload line of business (LOB) apps in Windows client devices
**Applies to** > Applies to:
>
- Windows 10 > - Windows 10
> [!NOTE] > [!NOTE]
> As of Windows Insider Build 18956, sideloading is enabled by default. Now, you can deploy a signed package onto a device without a special configuration. > As of Windows Insider Build 18956, sideloading is enabled by default. You can deploy a signed package onto a device without a special configuration.
"Line-of-Business" (LOB) apps are present in a wide range of businesses and organizations. Organizations value these apps because they solve problems unique to each business. Sideloading apps is when you install apps that aren't from an official source, such as the Microsoft store. Your organization may create its own apps, including line-of-business (LOB) apps. Many organizations create their own apps to solve problems unique to their business.
When you sideload an app, you deploy a signed app package to a device. You maintain the signing, hosting, and deployment of these apps. Sideloading was also available with Windows 8 and Windows 8.1 When you sideload an app, you deploy a signed app package to a device. You maintain the signing, hosting, and deployment of these apps. Sideloading was also available with Windows 8 and Windows 8.1
In Windows 10, sideloading is different than in earlier versions of Windows: Starting with Windows 10, sideloading is different than earlier versions of Windows:
- You can unlock a device for sideloading using an enterprise policy, or through **Settings** - You can unlock a device for sideloading using an enterprise policy, or through the **Settings** app.
- License keys aren't required.
- Devices don't have to be joined to a domain.
- License keys are not required To allow these apps to run on your Windows devices, you might have to enable sideloading on your devices.
- Devices do not have to be joined to a domain This article shows you how to:
## Requirements - **Turn on sideloading**: You can deploy using Group Policy or a mobile device management (MDM) provider. Or, you can use the **Settings** app to turn on sideloading.
Here's what you'll need to have: - **Install the app certificate**: Import the security certificate to the local device. This certificate tells the local device to trust the app.
- **Install the app**: Use Windows PowerShell to install the app package.
- Devices need to be unlocked for sideloading (unlock policy enabled) ## Prerequisites
- Certificate assigned to app - Windows devices that are unlocked for sideloading (unlock policy enabled). Meaning, sideloading isn't blocked by a policy.
- A trusted certificate that's assigned to your app.
- An app package that's signed with your certificate.
- Signed app package ## Step 1: Turn on sideloading
And here's what you'll need to do:
- Turn on sideloading - you can push a policy with an MDM provider, or you can use **Settings**.
- Trust the app - import the security certificate to the local device.
- Install the app - use PowerShell to install the app package.
## How do I sideload an app on desktop
You can sideload apps on managed or unmanaged devices. You can sideload apps on managed or unmanaged devices.
>[!IMPORTANT] Managed devices are typically owned by your organization. They're managed by Group Policy (on-premises), or a Mobile Device Management (MDM) provider, such as Microsoft Intune (cloud). Bring your own devices (BYOD) and personal devices can also be managed by your organization. On managed devices, you can create a policy that turns on sideloading, and then deploy this policy to your Windows devices.
> To install an app on Windows 10, in addition to following [these procedures](/windows/msix/app-installer/installing-windows10-apps-web), users can also double-click any APPX/MSIX package.
Unmanaged devices are devices that are not managed by your organization. These devices are typically personal devices owned by users. Users can turn on sideloading using the Settings app.
**To turn on sideloading for managed devices** > [!IMPORTANT]
> To install an app on Windows 10 and later, you can:
>
> - [Install Windows 10 apps from a web page](/windows/msix/app-installer/installing-windows10-apps-web).
> - Users can double-click any `.APPX` or `.MSIX` package.
- Deploy an enterprise policy. ### User interface
If you're working on your own device, or if devices are unmanaged, use the Settings app:
1. Open the **Settings** app > **Update & Security** > **For developers**.
2. Select **Sideload apps**.
**To turn on sideloading for unmanaged devices** For more information, see [Enable your device for development](/windows/apps/get-started/enable-your-device-for-development) and [Developer Mode features and debugging](/windows/apps/get-started/developer-mode-features-and-debugging).
1. Open **Settings**. ### Group Policy
2. Click **Update & Security** > **For developers**. If you use Group Policy, use the `Computer Configuration\Administrative Templates\Windows Components\App Package Deployment` policies to enable or prevent sideloading apps:
3. On **Use developer features**, select **Sideload apps**. - `Allows development of Windows Store apps and installing them from an integrated development environment (IDE)`
- `Allow all trusted apps to install`
**To import the security certificate** By default, the OS might set these policies to **Not configured**, which means app sideloading is turned off. If you set these policies to **Enabled**, then users can sideload apps.
1. Open the security certificate for the appx package, and select **Install Certificate**. ### MDM
2. On the **Certificate Import Wizard**, select **Local Machine**. Using Microsoft Intune, you can also enable sideloading apps on managed devices. For more information, see:
3. Import the certificate to the **Trusted Root Certification Authorities** folder. - [Sign line-of-business apps so they can be deployed to Windows devices with Intune](/mem/intune/apps/app-sideload-windows)
- [App Store device settings to allow or restrict features using Intune](/mem/intune/configuration/device-restrictions-windows-10#app-store)
## Step 2: Import the security certificate
This step installs the app certificate to the local device. Installing the certificate creates the trust between the app and the device.
1. Open the security certificate for the `.appx` package, and select **Install Certificate**.
2. On the **Certificate Import Wizard**, select **Local Machine**.
3. Import the certificate to the **Trusted Root Certification Authorities** folder.
-OR- -OR-
You can use a runtime provisioning package to import a security certificate. For information about applying a provisioning package to a Windows 10 device, see runtime instructions on [Build and apply a provisioning package]( https://go.microsoft.com/fwlink/p/?LinkId=619162). You can use a runtime provisioning package to import a security certificate. For information about applying a provisioning package to a Windows 10 device, see runtime instructions on [Create a provisioning package for Windows 10](/windows/configuration/provisioning-packages/provisioning-create-package).
**To install the app** ## Step 3: Install the app
- From the folder with the appx package, run the PowerShell `Add-AppxPackage` command to install the appx package.
From the folder with the `.appx` package, run the Windows PowerShell `Add-AppxPackage` command to install the `.appx` package.
  For more information on this command, see [Add-AppxPackage](/powershell/module/appx/add-appxpackage).
 

View File

@ -0,0 +1,356 @@
---
title: Get the system apps on Windows client operating system | Microsoft Docs
ms.reviewer:
manager: dougeby
description: Use the Windows PowerShell Get-AppxPackage command to get a list off the system apps installed in Windows OS. See a list of some common system apps installed a Windows Enterprise client computer or device, including Windows 10.
ms.prod: w10
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: mobile
ms.author: mandia
author: MandiOhlinger
ms.localizationpriority: medium
ms.topic: article
---
# System apps installed with the Windows client OS
> Applies to:
>
> - Windows 10
On all Windows devices, the OS automatically installs some apps. These apps are called system apps, and are typically installed in the `C:\Windows\` folder. On your Windows devices, you can use Windows PowerShell to see the system apps automatically installed.
This article lists the built-in system apps on some Windows OS versions, and lists the Windows PowerShell command to get a list.
## Use Windows PowerShell
To get a list of all the system apps, use Windows PowerShell:
1. Open the Windows PowerShell app as administrator.
2. Run the following script:
```Powershell
Get-AppxPackage -PackageTypeFilter Main | ? { $_.SignatureKind -eq "System" } | Sort Name | Format-Table Name, InstallLocation
```
The output lists all the system apps, and their installation location. For more information on this command, see [Get-AppxPackage](/powershell/module/appx/get-appxpackage) (opens another Microsoft website).
## Built-in system apps list
The following information lists the system apps on some Windows Enterprise OS versions. Your specific OS version and image may have different apps. To confirm your app list, run the [PowerShell Get-AppxPackage command](#use-windows-powershell) (in this article).
- File Picker | Package name: 1527c705-839a-4832-9118-54d4Bd6a0c89
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- File Explorer | Package name: c5e2524a-ea46-4f67-841f-6a9465d9d515
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- App Resolver UX | Package name: E2A4F912-2574-4A75-9BB0-0D023378592B
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Add Suggested Folders To Library | Package name: F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- InputApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | | | ✔️ |
---
- Microsoft.AAD.Broker.Plugin | Package name: Microsoft.AAD.Broker.Plugin
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.AccountsControl | Package name: Microsoft.AccountsControl
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.AsyncTextService | Package name: Microsoft.AsyncTextService
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Hello setup UI | Package name: Microsoft.BioEnrollment
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.CredDialogHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.ECApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.LockApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft Edge | Package name: Microsoft.MicrosoftEdge
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.MicrosoftEdgeDevToolsClient
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.PPIProjection
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | | | ✔️ |
---
- Microsoft.Win32WebViewHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.Apprep.ChxApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.AssignedAccessLockApp
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.CapturePicker
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.CloudExperienceHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.ContentDeliveryManager
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Cortana | Package name: Microsoft.Windows.Cortana
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | | | ✔️ |
---
- Microsoft.Windows.OOBENetworkCaptivePort
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.OOBENetworkConnectionFlow
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.ParentalControls
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- People Hub | Package name: Microsoft.Windows.PeopleExperienceHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.PinningConfirmationDialog
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.SecHealthUI
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.Windows.SecureAssessmentBrowser
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Start | Package name: Microsoft.Windows.ShellExperienceHost
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Microsoft.XboxGameCallableUI
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Windows.CBSPreview
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Settings | Package name: Windows.immersivecontrolpanel
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---
- Print 3D | Package name: Windows.Print3D
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ✔️ | | | ✔️ |
---
- Print UI | Package name: Windows.PrintDialog
---
| Uninstall through UI? | 21H1 | 20H2 | 1809 |
| --- | --- | --- | --- |
| ❌ | ✔️ | ✔️| ✔️ |
---

View File

@ -3,9 +3,15 @@ items:
href: index.yml href: index.yml
- name: Application management - name: Application management
items: items:
- name: Apps in Windows 10 - name: Apps in Windows client OS
href: apps-in-windows-10.md items:
- name: Add apps and features in Windows 10 - name: Common app types
href: apps-in-windows-10.md
- name: Provisioned apps in Windows client OS
href: provisioned-apps-windows-client-os.md
- name: System apps in Windows client OS
href: system-apps-windows-client-os.md
- name: Add features in Windows client
href: add-apps-and-features.md href: add-apps-and-features.md
- name: Sideload apps - name: Sideload apps
href: sideload-apps-in-windows-10.md href: sideload-apps-in-windows-10.md
@ -13,8 +19,6 @@ items:
href: enterprise-background-activity-controls.md href: enterprise-background-activity-controls.md
- name: Enable or block Windows Mixed Reality apps in the enterprise - name: Enable or block Windows Mixed Reality apps in the enterprise
href: manage-windows-mixed-reality.md href: manage-windows-mixed-reality.md
- name: Repackage win32 apps in the MSIX format
href: msix-app-packaging-tool.md
- name: Application Virtualization (App-V) - name: Application Virtualization (App-V)
items: items:
- name: App-V for Windows 10 overview - name: App-V for Windows 10 overview

View File

@ -25,7 +25,7 @@ ms.reviewer:
- Cloud only, Hybrid, and On-premises only Windows Hello for Business deployments - Cloud only, Hybrid, and On-premises only Windows Hello for Business deployments
- Azure AD joined, Hybrid Azure AD joined, and Enterprise joined devices - Azure AD joined, Hybrid Azure AD joined, and Enterprise joined devices
Windows Hello for Business supports using a certificate deployed to a Windows Hello for Business container as a supplied credential to establish a remote desktop connection to a server or another device. This functionality is not supported for key trust deployments. This feature takes advantage of the redirected smart card capabilities of the remote desktop protocol. Windows Hello for Business key trust can be used with [Windows Defender Remote Credential Guard](../remote-credential-guard.md). Windows Hello for Business supports using a certificate deployed to a Windows Hello for Business container as a supplied credential to establish a remote desktop connection to a server or another device. This functionality is not supported for key trust deployments. This feature takes advantage of the redirected smart card capabilities of the remote desktop protocol. Windows Hello for Business key trust can be used with [Windows Defender Remote Credential Guard](../remote-credential-guard.md) to establish a remote desktop protocol connection.
Microsoft continues to investigate supporting using keys trust for supplied credentials in a future release. Microsoft continues to investigate supporting using keys trust for supplied credentials in a future release.
@ -38,7 +38,7 @@ Microsoft continues to investigate supporting using keys trust for supplied cred
- Biometric enrollments - Biometric enrollments
- Windows 10, version 1809 - Windows 10, version 1809
Users using earlier versions of Windows 10 could remote desktop to using Windows Hello for Business but were limited to the using their PIN as their authentication gesture. Windows 10, version 1809 introduces the ability for users to authenticate to a remote desktop session using their Windows Hello for Business biometric gesture. The feature is on by default, so your users can take advantage of it as soon as they upgrade to Windows 10, version 1809. Users using earlier versions of Windows 10 could authenticate to a remote desktop using Windows Hello for Business but were limited to using their PIN as their authentication gesture. Windows 10, version 1809 introduces the ability for users to authenticate to a remote desktop session using their Windows Hello for Business biometric gesture. The feature is on by default, so your users can take advantage of it as soon as they upgrade to Windows 10, version 1809.
### How does it work ### How does it work
@ -69,4 +69,4 @@ Users appreciate convenience of biometrics and administrators value the security
- [Windows Hello and password changes](hello-and-password-changes.md) - [Windows Hello and password changes](hello-and-password-changes.md)
- [Windows Hello errors during PIN creation](hello-errors-during-pin-creation.md) - [Windows Hello errors during PIN creation](hello-errors-during-pin-creation.md)
- [Event ID 300 - Windows Hello successfully created](hello-event-300.md) - [Event ID 300 - Windows Hello successfully created](hello-event-300.md)
- [Windows Hello biometrics in the enterprise](hello-biometrics-in-enterprise.md) - [Windows Hello biometrics in the enterprise](hello-biometrics-in-enterprise.md)

View File

@ -1,7 +1,6 @@
--- ---
title: Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings (Windows 10) title: Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings (Windows)
description: A list of all available settings for Microsoft Defender SmartScreen using Group Policy and mobile device management (MDM) settings. description: A list of all available settings for Microsoft Defender SmartScreen using Group Policy and mobile device management (MDM) settings.
keywords: SmartScreen Filter, Windows SmartScreen, Microsoft Defender SmartScreen
ms.prod: m365-security ms.prod: m365-security
ms.mktglfcycl: explore ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library
@ -18,10 +17,11 @@ ms.technology: mde
**Applies to:** **Applies to:**
- Windows 10 - Windows 10
- Windows 11
Microsoft Defender SmartScreen works with Intune, Group Policy, and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Microsoft Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely. Microsoft Defender SmartScreen works with Intune, Group Policy, and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Microsoft Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely.
See [Windows 10 (and later) settings to protect devices using Intune](/intune/endpoint-protection-windows-10#windows-defender-smartscreen-settings) for the controls you can use in Intune. See [Windows 10 (and Windows 11) settings to protect devices using Intune](/intune/endpoint-protection-windows-10#windows-defender-smartscreen-settings) for the controls you can use in Intune.
## Group Policy settings ## Group Policy settings
@ -45,7 +45,7 @@ SmartScreen uses registry-based Administrative Template policy settings.
</tr> </tr>
<tr> <tr>
<td><b>Windows 10, version 2004:</b><br>Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)<p>Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)<p><b>Windows 10, version 1703:</b><br>Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)<p>Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)<p><b>Windows 10, Version 1607 and earlier:</b><br>Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen</td> <td><b>Windows 10, version 2004:</b><br>Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)<p>Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)<p><b>Windows 10, version 1703:</b><br>Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen (Microsoft Edge version 45 and earlier)<p>Administrative Templates\Microsoft Edge\SmartScreen settings\Configure Microsoft Defender SmartScreen (Microsoft Edge version 77 or later)<p><b>Windows 10, Version 1607 and earlier:</b><br>Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen</td>
<td>Microsoft Edge on Windows 10 or later</td> <td>Microsoft Edge on Windows 10 or Windows 11</td>
<td>This policy setting turns on Microsoft Defender SmartScreen.<p>If you enable this setting, it turns on Microsoft Defender SmartScreen and your employees are unable to turn it off.<p>If you disable this setting, it turns off Microsoft Defender SmartScreen and your employees are unable to turn it on.<p>If you don't configure this setting, your employees can decide whether to use Microsoft Defender SmartScreen.</td> <td>This policy setting turns on Microsoft Defender SmartScreen.<p>If you enable this setting, it turns on Microsoft Defender SmartScreen and your employees are unable to turn it off.<p>If you disable this setting, it turns off Microsoft Defender SmartScreen and your employees are unable to turn it on.<p>If you don't configure this setting, your employees can decide whether to use Microsoft Defender SmartScreen.</td>
</tr> </tr>
<tr> <tr>
@ -134,7 +134,7 @@ For Microsoft Defender SmartScreen Edge MDM policies, see [Policy CSP - Browser]
</tr> </tr>
<tr> <tr>
<td>PreventSmartScreenPromptOverride</td> <td>PreventSmartScreenPromptOverride</td>
<td>Windows 10, Version 1511 and later</td> <td>Windows 10, Version 1511 and Windows 11</td>
<td> <td>
<ul> <ul>
<li><b>URI full path.</b> ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride</li> <li><b>URI full path.</b> ./Vendor/MSFT/Policy/Config/Browser/PreventSmartscreenPromptOverride</li>
@ -146,7 +146,7 @@ For Microsoft Defender SmartScreen Edge MDM policies, see [Policy CSP - Browser]
</tr> </tr>
<tr> <tr>
<td>PreventSmartScreenPromptOverrideForFiles</td> <td>PreventSmartScreenPromptOverrideForFiles</td>
<td>Windows 10, Version 1511 and later</td> <td>Windows 10, Version 1511 and Windows 11</td>
<td> <td>
<ul> <ul>
<li><b>URI full path.</b> ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles</li> <li><b>URI full path.</b> ./Vendor/MSFT/Policy/Config/Browser/PreventSmartScreenPromptOverrideForFiles</li>

View File

@ -1,7 +1,6 @@
--- ---
title: Microsoft Defender SmartScreen overview (Windows 10) title: Microsoft Defender SmartScreen overview (Windows)
description: Learn how Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files. description: Learn how Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files.
keywords: SmartScreen Filter, Windows SmartScreen, Microsoft Defender SmartScreen
ms.prod: m365-security ms.prod: m365-security
ms.mktglfcycl: explore ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library
@ -20,6 +19,7 @@ ms.technology: mde
**Applies to:** **Applies to:**
- Windows 10 - Windows 10
- Windows 11
- Microsoft Edge - Microsoft Edge
Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files. Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files.

View File

@ -1,7 +1,6 @@
--- ---
title: Set up and use Microsoft Defender SmartScreen on individual devices (Windows 10) title: Set up and use Microsoft Defender SmartScreen on individual devices (Windows)
description: Learn how employees can use Windows Security to set up Microsoft Defender SmartScreen. Microsoft Defender SmartScreen protects users from running malicious apps. description: Learn how employees can use Windows Security to set up Microsoft Defender SmartScreen. Microsoft Defender SmartScreen protects users from running malicious apps.
keywords: SmartScreen Filter, Windows SmartScreen, Microsoft Defender SmartScreen
ms.prod: m365-security ms.prod: m365-security
ms.mktglfcycl: explore ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library
@ -19,6 +18,7 @@ ms.technology: mde
**Applies to:** **Applies to:**
- Windows 10, version 1703 - Windows 10, version 1703
- Windows 11
- Microsoft Edge - Microsoft Edge
Microsoft Defender SmartScreen helps to protect users if they try to visit sites previously reported as phishing or malware websites, or if a user tries to download potentially malicious files. Microsoft Defender SmartScreen helps to protect users if they try to visit sites previously reported as phishing or malware websites, or if a user tries to download potentially malicious files.

View File

@ -1,5 +1,5 @@
--- ---
title: Allow LOB Win32 Apps on Intune-Managed S Mode Devices (Windows 10) title: Allow LOB Win32 Apps on Intune-Managed S Mode Devices (Windows)
description: Using WDAC supplemental policies, you can expand the S mode base policy on your Intune-managed devices. description: Using WDAC supplemental policies, you can expand the S mode base policy on your Intune-managed devices.
keywords: security, malware keywords: security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
@ -23,10 +23,14 @@ ms.technology: mde
**Applies to:** **Applies to:**
- Windows 10 - Windows 10
- Windows 11
Beginning with the Windows 10 November 2019 update (build 18363), Microsoft Intune enables customers to deploy and run business critical Win32 applications as well as Windows components that are normally blocked in S mode (ex. PowerShell.exe) on their Intune-managed Windows 10 in S mode devices. >[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
With Intune, IT Pros can now configure their managed S mode devices using a Windows Defender Application Control (WDAC) supplemental policy that expands the S mode base policy to authorize the apps their business uses. This feature changes the S mode security posture from "every app is Microsoft-verified" to "every app is verified by Microsoft or your organization". Beginning with the Windows 10 November 2019 update (build 18363), Microsoft Intune enables customers to deploy and run business critical Win32 applications and Windows components that are normally blocked in S mode (ex. PowerShell.exe) on their Intune-managed Windows in S mode devices.
With Intune, IT Pros can now configure their managed S mode devices using a Windows Defender Application Control (WDAC) supplemental policy that expands the S mode base policy to authorize the apps their business uses. This feature changes the S mode security posture from "every app is Microsoft-verified" to "every app is verified by Microsoft or your organization".
Refer to the below video for an overview and brief demo. Refer to the below video for an overview and brief demo.
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4mlcp] > [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4mlcp]
@ -42,18 +46,18 @@ The general steps for expanding the S mode base policy on your Intune-managed de
Refer to [Deploy multiple Windows Defender Application Control Policies](deploy-multiple-windows-defender-application-control-policies.md) for guidance on creating supplemental policies and [Deploy Windows Defender Application Control policy rules and file rules](select-types-of-rules-to-create.md) to choose the right type of rules to create for your policy. Refer to [Deploy multiple Windows Defender Application Control Policies](deploy-multiple-windows-defender-application-control-policies.md) for guidance on creating supplemental policies and [Deploy Windows Defender Application Control policy rules and file rules](select-types-of-rules-to-create.md) to choose the right type of rules to create for your policy.
Below are a basic set of instructions for creating an S mode supplemental policy: Below are a basic set of instructions for creating an S mode supplemental policy:
- Create a new base policy using [New-CIPolicy](/powershell/module/configci/new-cipolicy?view=win10-ps) - Create a new base policy using [New-CIPolicy](/powershell/module/configci/new-cipolicy?view=win10-ps&preserve-view=true)
```powershell ```powershell
New-CIPolicy -MultiplePolicyFormat -ScanPath <path> -UserPEs -FilePath "<path>\SupplementalPolicy.xml" -Level Publisher -Fallback Hash New-CIPolicy -MultiplePolicyFormat -ScanPath <path> -UserPEs -FilePath "<path>\SupplementalPolicy.xml" -Level Publisher -Fallback Hash
``` ```
- Change it to a supplemental policy using [Set-CIPolicyIdInfo](/powershell/module/configci/set-cipolicyidinfo?view=win10-ps) - Change it to a supplemental policy using [Set-CIPolicyIdInfo](/powershell/module/configci/set-cipolicyidinfo?view=win10-ps&preserve-view=true)
```powershell ```powershell
Set-CIPolicyIdInfo -SupplementsBasePolicyID 5951A96A-E0B5-4D3D-8FB8-3E5B61030784 -FilePath "<path>\SupplementalPolicy.xml" Set-CIPolicyIdInfo -SupplementsBasePolicyID 5951A96A-E0B5-4D3D-8FB8-3E5B61030784 -FilePath "<path>\SupplementalPolicy.xml"
``` ```
Policies which are supplementing the S mode base policy must use **-SupplementsBasePolicyID 5951A96A-E0B5-4D3D-8FB8-3E5B61030784**, as this is the S mode policy ID. Policies which are supplementing the S mode base policy must use **-SupplementsBasePolicyID 5951A96A-E0B5-4D3D-8FB8-3E5B61030784**, as this is the S mode policy ID.
- Put the policy in enforce mode using [Set-RuleOption](/powershell/module/configci/set-ruleoption?view=win10-ps) - Put the policy in enforce mode using [Set-RuleOption](/powershell/module/configci/set-ruleoption?view=win10-ps&preserve-view=true)
```powershell ```powershell
Set-RuleOption -FilePath "<path>\SupplementalPolicy.xml>" -Option 3 Delete Set-RuleOption -FilePath "<path>\SupplementalPolicy.xml>" -Option 3 Delete
@ -64,7 +68,7 @@ The general steps for expanding the S mode base policy on your Intune-managed de
```powershell ```powershell
Add-SignerRule -FilePath <policypath> -CertificatePath <certpath> -User -Update Add-SignerRule -FilePath <policypath> -CertificatePath <certpath> -User -Update
``` ```
- Convert to .bin using [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy?view=win10-ps) - Convert to .bin using [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy?view=win10-ps&preserve-view=true)
```powershell ```powershell
ConvertFrom-CIPolicy -XmlFilePath "<path>\SupplementalPolicy.xml" -BinaryFilePath "<path>\SupplementalPolicy.bin> ConvertFrom-CIPolicy -XmlFilePath "<path>\SupplementalPolicy.xml" -BinaryFilePath "<path>\SupplementalPolicy.bin>
@ -81,7 +85,7 @@ The general steps for expanding the S mode base policy on your Intune-managed de
Go to the Azure portal online and navigate to the Microsoft Intune page, then go to the Client apps blade and select 'S mode supplemental policies'. Upload the signed policy to Intune and assign it to user or device groups. Intune will generate tenant- and device- specific authorization tokens. Intune then deploys the corresponding authorization token and supplemental policy to each device in the assigned group. Together, these expand the S mode base policy on the device. Go to the Azure portal online and navigate to the Microsoft Intune page, then go to the Client apps blade and select 'S mode supplemental policies'. Upload the signed policy to Intune and assign it to user or device groups. Intune will generate tenant- and device- specific authorization tokens. Intune then deploys the corresponding authorization token and supplemental policy to each device in the assigned group. Together, these expand the S mode base policy on the device.
> [!Note] > [!Note]
> When updating your supplemental policy, ensure that the new version number is strictly greater than the previous one. Using the same version number is not allowed by Intune. Refer to [Set-CIPolicyVersion](/powershell/module/configci/set-cipolicyversion?view=win10-ps) for information on setting the version number. > When updating your supplemental policy, ensure that the new version number is strictly greater than the previous one. Using the same version number is not allowed by Intune. Refer to [Set-CIPolicyVersion](/powershell/module/configci/set-cipolicyversion?view=win10-ps&preserve-view=true) for information on setting the version number.
## Standard Process for Deploying Apps through Intune ## Standard Process for Deploying Apps through Intune
![Deploying Apps through Intune.](images/wdac-intune-app-deployment.png) ![Deploying Apps through Intune.](images/wdac-intune-app-deployment.png)
@ -238,4 +242,4 @@ IT Pros also have the choice of deleting a supplemental policy through Intune.
``` ```
## Errata ## Errata
If an S-mode device with a policy authorization token and supplemental policy is rolled back from the 1909 update to the 1903 build, it will not revert to locked-down S mode until the next policy refresh. To achieve an immediate change to a locked-down S mode state, IT Pros should delete any tokens in %SystemRoot%\System32\CI\Tokens\Active. If an S-mode device with a policy authorization token and supplemental policy is rolled back from the 1909 update to the 1903 build, it will not revert to locked-down S mode until the next policy refresh. To achieve an immediate change to a locked-down S mode state, IT Pros should delete any tokens in %SystemRoot%\System32\CI\Tokens\Active.

View File

@ -1,5 +1,5 @@
--- ---
title: Allow COM object registration in a WDAC policy (Windows 10) title: Allow COM object registration in a WDAC policy (Windows)
description: You can allow COM object registration in a Windows Defender Application Control policy. description: You can allow COM object registration in a Windows Defender Application Control policy.
keywords: security, malware keywords: security, malware
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
@ -22,17 +22,20 @@ ms.technology: mde
**Applies to:** **Applies to:**
- Windows 10 - Windows 10
- Windows Server 2016 - Windows 11
- Windows Server 2019 - Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](feature-availability.md).
>[!IMPORTANT] >[!IMPORTANT]
>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. >Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
The [Microsoft Component Object Model (COM)](/windows/desktop/com/the-component-object-model) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM specifies an object model and programming requirements that enable COM objects to interact with other objects. The [Microsoft Component Object Model (COM)](/windows/desktop/com/the-component-object-model) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM specifies an object model and programming requirements that enable COM objects to interact with other objects.
### COM object configurability in WDAC policy ### COM object configurability in WDAC policy
Prior to the Windows 10 1903 update, Windows Defender Application Control (WDAC) enforced a built-in allow list for COM object registration. While this mechanism works for most common application usage scenarios, customers have provided feedback that there are cases where additional COM objects need to be allowed. The 1903 update to Windows 10 introduces the ability to specify allowed COM objects via their GUID in the WDAC policy. Prior to the Windows 10 1903 update, Windows Defender Application Control (WDAC) enforced a built-in allowlist for COM object registration. While this mechanism works for most common application usage scenarios, customers have provided feedback that there are cases where additional COM objects need to be allowed. The 1903 update to Windows 10 introduces the ability to specify allowed COM objects via their GUID in the WDAC policy.
**NOTE**: To add this functionality to other versions of Windows 10, you can install the following or later updates: **NOTE**: To add this functionality to other versions of Windows 10, you can install the following or later updates:

View File

@ -1,5 +1,5 @@
--- ---
title: Add rules for packaged apps to existing AppLocker rule-set (Windows 10) title: Add rules for packaged apps to existing AppLocker rule-set (Windows)
description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). description: This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).
ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f ms.assetid: 758c2a9f-c2a3-418c-83bc-fd335a94097f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Add rules for packaged apps to existing AppLocker rule-set # Add rules for packaged apps to existing AppLocker rule-set
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT). This topic for IT professionals describes how to update your existing AppLocker policies for packaged apps using the Remote Server Administration Toolkit (RSAT).

View File

@ -1,5 +1,5 @@
--- ---
title: Administer AppLocker (Windows 10) title: Administer AppLocker (Windows)
description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies. description: This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.
ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818 ms.assetid: 511a3b6a-175f-4d6d-a6e0-c1780c02e818
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Administer AppLocker # Administer AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies. This topic for IT professionals provides links to specific procedures to use when administering AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker architecture and components (Windows 10) title: AppLocker architecture and components (Windows)
description: This topic for IT professional describes AppLockers basic architecture and its major components. description: This topic for IT professional describes AppLockers basic architecture and its major components.
ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a ms.assetid: efdd8494-553c-443f-bd5f-c8976535135a
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker architecture and components # AppLocker architecture and components
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professional describes AppLockers basic architecture and its major components. This topic for IT professional describes AppLockers basic architecture and its major components.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker functions (Windows 10) title: AppLocker functions (Windows)
description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. description: This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.
ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2 ms.assetid: bf704198-9e74-4731-8c5a-ee0512df34d2
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker functions # AppLocker functions
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features. This article for the IT professional lists the functions and security levels for the Software Restriction Policies (SRP) and AppLocker features.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker (Windows 10) title: AppLocker (Windows)
description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. description: This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies.
ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a ms.assetid: 94b57864-2112-43b6-96fb-2863c985dc9a
ms.reviewer: ms.reviewer:
@ -21,10 +21,15 @@ ms.technology: mde
# AppLocker # AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server
This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. AppLocker helps you control which apps and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers. - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic provides a description of AppLocker and can help you decide if your organization can benefit from deploying AppLocker application control policies. AppLocker helps you control which apps and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.
> [!NOTE] > [!NOTE]
> AppLocker is unable to control processes running under the system account on any operating system. > AppLocker is unable to control processes running under the system account on any operating system.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker deployment guide (Windows 10) title: AppLocker deployment guide (Windows)
description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies. description: This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.
ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1 ms.assetid: 38632795-be13-46b0-a7af-487a4340bea1
ms.reviewer: ms.reviewer:
@ -22,8 +22,13 @@ ms.technology: mde
# AppLocker deployment guide # AppLocker deployment guide
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies. This topic for IT professionals introduces the concepts and describes the steps required to deploy AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker design guide (Windows 10) title: AppLocker design guide (Windows)
description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. description: This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.
ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b ms.assetid: 1c8e4a7b-3164-4eb4-9277-11b1d5a09c7b
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker design guide # AppLocker design guide
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker. This topic for the IT professional introduces the design and planning steps required to deploy application control policies by using AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker policy use scenarios (Windows 10) title: AppLocker policy use scenarios (Windows)
description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. description: This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f ms.assetid: 33f71578-89f0-4063-ac04-cf4f4ca5c31f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker policy use scenarios # AppLocker policy use scenarios
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented. This topic for the IT professional lists the various application control scenarios in which AppLocker policies can be effectively implemented.
@ -34,7 +39,7 @@ AppLocker can help you improve the management of application control and the mai
2. **Protection against unwanted software** 2. **Protection against unwanted software**
AppLocker has the ability to deny apps from running simply by excluding them from the list of allowed apps per business group or user. If an app is not specifically identified by its publisher, installation path, or file hash, the attempt to run the application fails. AppLocker has the ability to deny apps from running simply by excluding them from the list of allowed apps per business group or user. If an app is not identified by its publisher, installation path, or file hash, the attempt to run the application fails.
3. **Licensing conformance** 3. **Licensing conformance**

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker processes and interactions (Windows 10) title: AppLocker processes and interactions (Windows)
description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. description: This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.
ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e ms.assetid: 0beec616-6040-4be7-8703-b6c919755d8e
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker processes and interactions # AppLocker processes and interactions
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
> [!NOTE]
> Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules. This topic for the IT professional describes the process dependencies and interactions when AppLocker evaluates and enforces rules.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker settings (Windows 10) title: AppLocker settings (Windows)
description: This topic for the IT professional lists the settings used by AppLocker. description: This topic for the IT professional lists the settings used by AppLocker.
ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839 ms.assetid: 9cb4aa19-77c0-4415-9968-bd07dab86839
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker settings # AppLocker settings
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional lists the settings used by AppLocker. This topic for the IT professional lists the settings used by AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: AppLocker technical reference (Windows 10) title: AppLocker technical reference (Windows)
description: This overview topic for IT professionals provides links to the topics in the technical reference. description: This overview topic for IT professionals provides links to the topics in the technical reference.
ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab ms.assetid: 2b2678f8-c46b-4e1d-b8c5-037c0be255ab
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# AppLocker technical reference # AppLocker technical reference
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This overview topic for IT professionals provides links to the topics in the technical reference. This overview topic for IT professionals provides links to the topics in the technical reference.
AppLocker advances the application control features and functionality of Software Restriction Policies. AppLocker contains new capabilities and extensions that allow you to create rules to allow or deny apps from running based on unique identities of files and to specify which users or groups can run those apps. AppLocker advances the application control features and functionality of Software Restriction Policies. AppLocker contains new capabilities and extensions that allow you to create rules to allow or deny apps from running based on unique identities of files and to specify which users or groups can run those apps.

View File

@ -1,5 +1,5 @@
--- ---
title: Configure an AppLocker policy for audit only (Windows 10) title: Configure an AppLocker policy for audit only (Windows)
description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker. description: This topic for IT professionals describes how to set AppLocker policies to Audit only within your IT environment by using AppLocker.
ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50 ms.assetid: 10bc87d5-cc7f-4500-b7b3-9006e50afa50
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Configure an AppLocker policy for audit only # Configure an AppLocker policy for audit only
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how to set AppLocker policies to **Audit only** within your IT environment by using AppLocker. This topic for IT professionals describes how to set AppLocker policies to **Audit only** within your IT environment by using AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Configure an AppLocker policy for enforce rules (Windows 10) title: Configure an AppLocker policy for enforce rules (Windows)
description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting. description: This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.
ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c ms.assetid: 5dbbb290-a5ae-4f88-82b3-21e95972e66c
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Configure an AppLocker policy for enforce rules # Configure an AppLocker policy for enforce rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting. This topic for IT professionals describes the steps to enable the AppLocker policy enforcement setting.

View File

@ -1,5 +1,5 @@
--- ---
title: Add exceptions for an AppLocker rule (Windows 10) title: Add exceptions for an AppLocker rule (Windows)
description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule. description: This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5 ms.assetid: d15c9d84-c14b-488d-9f48-bf31ff7ff0c5
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Add exceptions for an AppLocker rule # Add exceptions for an AppLocker rule
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule. This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.

View File

@ -1,5 +1,5 @@
--- ---
title: Configure the AppLocker reference device (Windows 10) title: Configure the AppLocker reference device (Windows)
description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. description: This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.
ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee ms.assetid: 034bd367-146d-4956-873c-e1e09e6fefee
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Configure the AppLocker reference device # Configure the AppLocker reference device
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer. This topic for the IT professional describes the steps to create an AppLocker policy platform structure on a reference computer.

View File

@ -1,5 +1,5 @@
--- ---
title: Configure the Application Identity service (Windows 10) title: Configure the Application Identity service (Windows)
description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually. description: This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.
ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561 ms.assetid: dc469599-37fd-448b-b23e-5b8e4f17e561
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Configure the Application Identity service # Configure the Application Identity service
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually. This topic for IT professionals shows how to configure the Application Identity service to start automatically or manually.

View File

@ -1,5 +1,5 @@
--- ---
title: Create a rule for packaged apps (Windows 10) title: Create a rule for packaged apps (Windows)
description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. description: This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0 ms.assetid: e4ffd400-7860-47b3-9118-0e6853c3dfa0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create a rule for packaged apps # Create a rule for packaged apps
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition. This article for IT professionals shows how to create an AppLocker rule for packaged apps with a publisher condition.
@ -32,7 +37,7 @@ Packaged apps, also known as Universal Windows apps, are based on an app model t
- Package name - Package name
- Package version - Package version
All the files within a package as well as the package installer share these attributes. Therefore, an AppLocker rule for a packaged app controls both the installation as well as the running of the app. Otherwise, the publisher rules for packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups. All the files within a package and the package installers share these attributes. Therefore, an AppLocker rule for a packaged app controls both the installation and the running of the app. Otherwise, the publisher rules for packaged apps are no different than the rest of the rule collections; they support exceptions, can be increased or decreased in scope, and can be assigned to users and groups.
For info about the publisher condition, see [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md). For info about the publisher condition, see [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md).
@ -67,7 +72,7 @@ You can perform this task by using the Group Policy Management Console for an Ap
<tr class="even"> <tr class="even">
<td align="left"><p><b>Use a packaged app installer as a reference</b></p></td> <td align="left"><p><b>Use a packaged app installer as a reference</b></p></td>
<td align="left"><p>If selected, AppLocker requires you to choose an app installer on which to base your new rule. A packaged app installer has the .appx extension. AppLocker uses the publisher, package name, and package version of the installer to define the rule.</p></td> <td align="left"><p>If selected, AppLocker requires you to choose an app installer on which to base your new rule. A packaged app installer has the .appx extension. AppLocker uses the publisher, package name, and package version of the installer to define the rule.</p></td>
<td align="left"><p>Your company has developed a number of internal line-of-business packaged apps. The app installers are stored on a common file share. Employees can install the required apps from that file share. You want to allow all your employees to install the Payroll app from this share. So you choose this option from the wizard, browse to the file share, and choose the installer for the Payroll app as a reference to create your rule.</p></td> <td align="left"><p>Your company has developed many internal line-of-business packaged apps. The app installers are stored on a common file share. Employees can install the required apps from that file share. You want to allow all your employees to install the Payroll app from this share. So you choose this option from the wizard, browse to the file share, and choose the installer for the Payroll app as a reference to create your rule.</p></td>
</tr> </tr>
</tbody> </tbody>
</table> </table>

View File

@ -1,5 +1,5 @@
--- ---
title: Create a rule that uses a file hash condition (Windows 10) title: Create a rule that uses a file hash condition (Windows)
description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition. description: This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.
ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7 ms.assetid: eb3b3524-1b3b-4979-ba5a-0a0b1280c5c7
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create a rule that uses a file hash condition # Create a rule that uses a file hash condition
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals shows how to create an AppLocker rule with a file hash condition. This topic for IT professionals shows how to create an AppLocker rule with a file hash condition.

View File

@ -1,5 +1,5 @@
--- ---
title: Create a rule that uses a path condition (Windows 10) title: Create a rule that uses a path condition (Windows)
description: This topic for IT professionals shows how to create an AppLocker rule with a path condition. description: This topic for IT professionals shows how to create an AppLocker rule with a path condition.
ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95 ms.assetid: 9b2093f5-5976-45fa-90c3-da1e0e845d95
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create a rule that uses a path condition # Create a rule that uses a path condition
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals shows how to create an AppLocker rule with a path condition. This topic for IT professionals shows how to create an AppLocker rule with a path condition.

View File

@ -1,5 +1,5 @@
--- ---
title: Create a rule that uses a publisher condition (Windows 10) title: Create a rule that uses a publisher condition (Windows)
description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition. description: This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.
ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b ms.assetid: 345ad45f-2bc1-4c4c-946f-17804e29f55b
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create a rule that uses a publisher condition # Create a rule that uses a publisher condition
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals shows how to create an AppLocker rule with a publisher condition. This topic for IT professionals shows how to create an AppLocker rule with a publisher condition.

View File

@ -1,5 +1,5 @@
--- ---
title: Create AppLocker default rules (Windows 10) title: Create AppLocker default rules (Windows)
description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run. description: This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.
ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18 ms.assetid: 21e9dc68-a6f4-4ebe-ac28-4c66a7ab6e18
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create AppLocker default rules # Create AppLocker default rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run. This topic for IT professionals describes the steps to create a standard set of AppLocker rules that will allow Windows system files to run.

View File

@ -1,5 +1,5 @@
--- ---
title: Create a list of apps deployed to each business group (Windows 10) title: Create a list of apps deployed to each business group (Windows)
description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker. description: This topic describes the process of gathering app usage requirements from each business group to implement application control policies by using AppLocker.
ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321 ms.assetid: d713aa07-d732-4bdc-8656-ba616d779321
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create a list of apps deployed to each business group # Create a list of apps deployed to each business group
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the process of gathering app usage requirements from each business group in order to implement application control policies by using AppLocker. This topic describes the process of gathering app usage requirements from each business group in order to implement application control policies by using AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Create Your AppLocker policies (Windows 10) title: Create Your AppLocker policies (Windows)
description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. description: This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.
ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0 ms.assetid: d339dee2-4da2-4d4a-b46e-f1dfb7cb4bf0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create Your AppLocker policies # Create Your AppLocker policies
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment. This overview topic for the IT professional describes the steps to create an AppLocker policy and prepare it for deployment.

View File

@ -1,5 +1,5 @@
--- ---
title: Create Your AppLocker rules (Windows 10) title: Create Your AppLocker rules (Windows)
description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. description: This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.
ms.assetid: b684a3a5-929c-4f70-8742-04088022f232 ms.assetid: b684a3a5-929c-4f70-8742-04088022f232
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Create Your AppLocker rules # Create Your AppLocker rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules. This topic for the IT professional describes what you need to know about AppLocker rules and the methods that you can to create rules.

View File

@ -1,5 +1,5 @@
--- ---
title: Delete an AppLocker rule (Windows 10) title: Delete an AppLocker rule (Windows)
description: This article for IT professionals describes the steps to delete an AppLocker rule. description: This article for IT professionals describes the steps to delete an AppLocker rule.
ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5 ms.assetid: 382b4be3-0df9-4308-89b2-dcf9df351eb5
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Delete an AppLocker rule # Delete an AppLocker rule
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This article for IT professionals describes the steps to delete an AppLocker rule. This article for IT professionals describes the steps to delete an AppLocker rule.

View File

@ -1,5 +1,5 @@
--- ---
title: Deploy AppLocker policies by using the enforce rules setting (Windows 10) title: Deploy AppLocker policies by using the enforce rules setting (Windows)
description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method. description: This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.
ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba ms.assetid: fd3a3d25-ff3b-4060-8390-6262a90749ba
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Deploy AppLocker policies by using the enforce rules setting # Deploy AppLocker policies by using the enforce rules setting
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method. This topic for IT professionals describes the steps to deploy AppLocker policies by using the enforcement setting method.

View File

@ -1,5 +1,5 @@
--- ---
title: Deploy the AppLocker policy into production (Windows 10) title: Deploy the AppLocker policy into production (Windows)
description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. description: This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae ms.assetid: ebbb1907-92dc-499e-8cee-8e637483c9ae
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Deploy the AppLocker policy into production # Deploy the AppLocker policy into production
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings. This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.

View File

@ -1,5 +1,5 @@
--- ---
title: Determine the Group Policy structure and rule enforcement (Windows 10) title: Determine the Group Policy structure and rule enforcement (Windows)
description: This overview topic describes the process to follow when you are planning to deploy AppLocker rules. description: This overview topic describes the process to follow when you are planning to deploy AppLocker rules.
ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f ms.assetid: f435fcbe-c7ac-4ef0-9702-729aab64163f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Determine the Group Policy structure and rule enforcement # Determine the Group Policy structure and rule enforcement
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This overview topic describes the process to follow when you are planning to deploy AppLocker rules. This overview topic describes the process to follow when you are planning to deploy AppLocker rules.

View File

@ -1,5 +1,5 @@
--- ---
title: Find digitally signed apps on a reference device (Windows 10) title: Find digitally signed apps on a reference device (Windows)
description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. description: This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.
ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8 ms.assetid: 24609a6b-fdcb-4083-b234-73e23ff8bcb8
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Determine which apps are digitally signed on a reference device # Determine which apps are digitally signed on a reference device
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed. This topic for the IT professional describes how to use AppLocker logs and tools to determine which applications are digitally signed.

View File

@ -1,5 +1,5 @@
--- ---
title: Determine your application control objectives (Windows 10) title: Determine your application control objectives (Windows)
description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker. description: Determine which applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.
ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b ms.assetid: 0e84003e-6095-46fb-8c4e-2065869bb53b
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Determine your application control objectives # Determine your application control objectives
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This article helps with decisions you need to make to determine what applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker. This article helps with decisions you need to make to determine what applications to control and how to control them by comparing Software Restriction Policies (SRP) and AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Display a custom URL message when users try to run a blocked app (Windows 10) title: Display a custom URL message when users try to run a blocked app (Windows)
description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app. description: This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.
ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85 ms.assetid: 9a2534a5-d1fa-48a9-93c6-989d4857cf85
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Display a custom URL message when users try to run a blocked app # Display a custom URL message when users try to run a blocked app
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app. This topic for IT professionals describes the steps for displaying a customized message to users when an AppLocker policy denies access to an app.

View File

@ -1,5 +1,5 @@
--- ---
title: DLL rules in AppLocker (Windows 10) title: DLL rules in AppLocker (Windows)
description: This topic describes the file formats and available default rules for the DLL rule collection. description: This topic describes the file formats and available default rules for the DLL rule collection.
ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f ms.assetid: a083fd08-c07e-4534-b0e7-1e15d932ce8f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# DLL rules in AppLocker # DLL rules in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the file formats and available default rules for the DLL rule collection. This topic describes the file formats and available default rules for the DLL rule collection.

View File

@ -1,5 +1,5 @@
--- ---
title: Document Group Policy structure & AppLocker rule enforcement (Windows 10) title: Document Group Policy structure & AppLocker rule enforcement (Windows)
description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker. description: This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.
ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5 ms.assetid: 389ffa8e-11fc-49ff-b0b1-89553e6fb6e5
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Document the Group Policy structure and AppLocker rule enforcement # Document the Group Policy structure and AppLocker rule enforcement
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker. This planning topic describes what you need to investigate, determine, and record in your application control policies plan when you use AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Document your app list (Windows 10) title: Document your app list (Windows)
description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies. description: This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.
ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0 ms.assetid: b155284b-f75d-4405-aecf-b74221622dc0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Document your app list # Document your app list
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies. This planning topic describes the app information that you should document when you create a list of apps for AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Document your AppLocker rules (Windows 10) title: Document your AppLocker rules (Windows)
description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation. description: Learn how to document your AppLocker rules and associate rule conditions with files, permissions, rule source, and implementation.
ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd ms.assetid: 91a198ce-104a-45ff-b49b-487fb40cd2dd
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Document your AppLocker rules # Document your AppLocker rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes what AppLocker rule conditions to associate with each file, how to associate these rule conditions, the source of the rule, and whether the file should be included or excluded. This topic describes what AppLocker rule conditions to associate with each file, how to associate these rule conditions, the source of the rule, and whether the file should be included or excluded.

View File

@ -1,5 +1,5 @@
--- ---
title: Edit an AppLocker policy (Windows 10) title: Edit an AppLocker policy (Windows)
description: This topic for IT professionals describes the steps required to modify an AppLocker policy. description: This topic for IT professionals describes the steps required to modify an AppLocker policy.
ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637 ms.assetid: dbc72d1f-3fe0-46c2-aeeb-96621fce7637
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Edit an AppLocker policy # Edit an AppLocker policy
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps required to modify an AppLocker policy. This topic for IT professionals describes the steps required to modify an AppLocker policy.

View File

@ -1,5 +1,5 @@
--- ---
title: Edit AppLocker rules (Windows 10) title: Edit AppLocker rules (Windows)
description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. description: This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.
ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32 ms.assetid: 80016cda-b915-46a0-83c6-5e6b0b958e32
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Edit AppLocker rules # Edit AppLocker rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker. This topic for IT professionals describes the steps to edit a publisher rule, path rule, and file hash rule in AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Enable the DLL rule collection (Windows 10) title: Enable the DLL rule collection (Windows)
description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. description: This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.
ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27 ms.assetid: 88ef9561-6eb2-491a-803a-b8cdbfebae27
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Enable the DLL rule collection # Enable the DLL rule collection
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker. This topic for IT professionals describes the steps to enable the DLL rule collection feature for AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Enforce AppLocker rules (Windows 10) title: Enforce AppLocker rules (Windows)
description: This topic for IT professionals describes how to enforce application control rules by using AppLocker. description: This topic for IT professionals describes how to enforce application control rules by using AppLocker.
ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d ms.assetid: e1528b7b-77f2-4419-8e27-c9cc3721d96d
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Enforce AppLocker rules # Enforce AppLocker rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how to enforce application control rules by using AppLocker. This topic for IT professionals describes how to enforce application control rules by using AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Executable rules in AppLocker (Windows 10) title: Executable rules in AppLocker (Windows)
description: This topic describes the file formats and available default rules for the executable rule collection. description: This topic describes the file formats and available default rules for the executable rule collection.
ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee ms.assetid: 65e62f90-6caa-48f8-836a-91f8ac9018ee
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Executable rules in AppLocker # Executable rules in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the file formats and available default rules for the executable rule collection. This topic describes the file formats and available default rules for the executable rule collection.

View File

@ -1,5 +1,5 @@
--- ---
title: Export an AppLocker policy from a GPO (Windows 10) title: Export an AppLocker policy from a GPO (Windows)
description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. description: This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.
ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0 ms.assetid: 7db59719-a8be-418b-bbfd-22cf2176c9c0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Export an AppLocker policy from a GPO # Export an AppLocker policy from a GPO
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified. This topic for IT professionals describes the steps to export an AppLocker policy from a Group Policy Object (GPO) so that it can be modified.

View File

@ -1,5 +1,5 @@
--- ---
title: Export an AppLocker policy to an XML file (Windows 10) title: Export an AppLocker policy to an XML file (Windows)
description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. description: This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080 ms.assetid: 979bd23f-6815-478b-a6a4-a25239cb1080
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Export an AppLocker policy to an XML file # Export an AppLocker policy to an XML file
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing. This topic for IT professionals describes the steps to export an AppLocker policy to an XML file for review or testing.
Membership in the local **Administrators** group, or equivalent, is the minimum required to complete this procedure. Membership in the local **Administrators** group, or equivalent, is the minimum required to complete this procedure.

View File

@ -1,5 +1,5 @@
--- ---
title: How AppLocker works (Windows 10) title: How AppLocker works (Windows)
description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies. description: This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.
ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd ms.assetid: 24bb1d73-0ff5-4af7-8b8a-2fa44d4ddbcd
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# How AppLocker works # How AppLocker works
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies. This topic for the IT professional provides links to topics about AppLocker architecture and components, processes and interactions, rules and policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Import an AppLocker policy from another computer (Windows 10) title: Import an AppLocker policy from another computer (Windows)
description: This topic for IT professionals describes how to import an AppLocker policy. description: This topic for IT professionals describes how to import an AppLocker policy.
ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6 ms.assetid: b48cb2b2-8ef8-4cc0-89bd-309d0b1832f6
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Import an AppLocker policy from another computer # Import an AppLocker policy from another computer
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how to import an AppLocker policy. This topic for IT professionals describes how to import an AppLocker policy.

View File

@ -1,5 +1,5 @@
--- ---
title: Import an AppLocker policy into a GPO (Windows 10) title: Import an AppLocker policy into a GPO (Windows)
description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). description: This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f ms.assetid: 0629ce44-f5e2-48a8-ba47-06544c73261f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Import an AppLocker policy into a GPO # Import an AppLocker policy into a GPO
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO). This topic for IT professionals describes the steps to import an AppLocker policy into a Group Policy Object (GPO).
AppLocker policies can be created as local security policies and modified like any other local security policy, or they can be created as part of a GPO and managed by using Group Policy. You can create AppLocker policies on any supported computer. For info about which Windows editions are supported, see [Requirements to Use AppLocker](requirements-to-use-applocker.md). AppLocker policies can be created as local security policies and modified like any other local security policy, or they can be created as part of a GPO and managed by using Group Policy. You can create AppLocker policies on any supported computer. For info about which Windows editions are supported, see [Requirements to Use AppLocker](requirements-to-use-applocker.md).

View File

@ -1,5 +1,5 @@
--- ---
title: Maintain AppLocker policies (Windows 10) title: Maintain AppLocker policies (Windows)
description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies. description: Learn how to maintain rules within AppLocker policies. View common AppLocker maintenance scenarios and see the methods to use to maintain AppLocker policies.
ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc ms.assetid: b4fbfdfe-ef3d-49e0-a390-f2dfe74602bc
ms.reviewer: ms.reviewer:
@ -20,8 +20,13 @@ ms.technology: mde
# Maintain AppLocker policies # Maintain AppLocker policies
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes how to maintain rules within AppLocker policies. This topic describes how to maintain rules within AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Manage packaged apps with AppLocker (Windows 10) title: Manage packaged apps with AppLocker (Windows)
description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy. description: Learn concepts and lists procedures to help you manage packaged apps with AppLocker as part of your overall application control strategy.
ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650 ms.assetid: 6d0c99e7-0284-4547-a30a-0685a9916650
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Manage packaged apps with AppLocker # Manage packaged apps with AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes concepts and lists procedures to help you manage Packaged apps with AppLocker as part of your overall application control strategy. This topic for IT professionals describes concepts and lists procedures to help you manage Packaged apps with AppLocker as part of your overall application control strategy.

View File

@ -1,5 +1,5 @@
--- ---
title: Merge AppLocker policies by using Set-ApplockerPolicy (Windows 10) title: Merge AppLocker policies by using Set-ApplockerPolicy (Windows)
description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. description: This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.
ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0 ms.assetid: f1c7d5c0-463e-4fe2-a410-844a404f18d0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Merge AppLocker policies by using Set-ApplockerPolicy # Merge AppLocker policies by using Set-ApplockerPolicy
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell. This topic for IT professionals describes the steps to merge AppLocker policies by using Windows PowerShell.

View File

@ -1,5 +1,5 @@
--- ---
title: Merge AppLocker policies manually (Windows 10) title: Merge AppLocker policies manually (Windows)
description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). description: This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).
ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f ms.assetid: 3605f293-e5f2-481d-8efd-775f9f23c30f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Merge AppLocker policies manually # Merge AppLocker policies manually
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO). This topic for IT professionals describes the steps to manually merge AppLocker policies to update the Group Policy Object (GPO).

View File

@ -1,5 +1,5 @@
--- ---
title: Monitor app usage with AppLocker (Windows 10) title: Monitor app usage with AppLocker (Windows)
description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied. description: This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.
ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf ms.assetid: 0516da6e-ebe4-45b4-a97b-31daba96d1cf
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Monitor app usage with AppLocker # Monitor app usage with AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied. This topic for IT professionals describes how to monitor app usage when AppLocker policies are applied.

View File

@ -1,5 +1,5 @@
--- ---
title: Optimize AppLocker performance (Windows 10) title: Optimize AppLocker performance (Windows)
description: This topic for IT professionals describes how to optimize AppLocker policy enforcement. description: This topic for IT professionals describes how to optimize AppLocker policy enforcement.
ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6 ms.assetid: a20efa20-bc98-40fe-bd81-28ec4905e0f6
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Optimize AppLocker performance # Optimize AppLocker performance
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how to optimize AppLocker policy enforcement. This topic for IT professionals describes how to optimize AppLocker policy enforcement.

View File

@ -1,5 +1,5 @@
--- ---
title: Packaged apps and packaged app installer rules in AppLocker (Windows 10) title: Packaged apps and packaged app installer rules in AppLocker (Windows)
description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps. description: This topic explains the AppLocker rule collection for packaged app installers and packaged apps.
ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d ms.assetid: 8fd44d08-a0c2-4c5b-a91f-5cb9989f971d
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Packaged apps and packaged app installer rules in AppLocker # Packaged apps and packaged app installer rules in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic explains the AppLocker rule collection for packaged app installers and packaged apps. This topic explains the AppLocker rule collection for packaged app installers and packaged apps.

View File

@ -1,5 +1,5 @@
--- ---
title: Plan for AppLocker policy management (Windows 10) title: Plan for AppLocker policy management (Windows)
description: This topic for describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies. description: This topic for describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.
ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b ms.assetid: dccc196f-6ae0-4ae4-853a-a3312b18751b
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Plan for AppLocker policy management # Plan for AppLocker policy management
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies. This topic for describes the decisions you need to make to establish the processes for managing and maintaining AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Refresh an AppLocker policy (Windows 10) title: Refresh an AppLocker policy (Windows)
description: This topic for IT professionals describes the steps to force an update for an AppLocker policy. description: This topic for IT professionals describes the steps to force an update for an AppLocker policy.
ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9 ms.assetid: 3f24fcbc-3926-46b9-a1a2-dd036edab8a9
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Refresh an AppLocker policy # Refresh an AppLocker policy
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to force an update for an AppLocker policy. This topic for IT professionals describes the steps to force an update for an AppLocker policy.

View File

@ -1,5 +1,5 @@
--- ---
title: Requirements for deploying AppLocker policies (Windows 10) title: Requirements for deploying AppLocker policies (Windows)
description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. description: This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.
ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48 ms.assetid: 3e55bda2-3cd7-42c7-bad3-c7dfbe193d48
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Requirements for deploying AppLocker policies # Requirements for deploying AppLocker policies
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies. This deployment topic for the IT professional lists the requirements that you need to consider before you deploy AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Requirements to use AppLocker (Windows 10) title: Requirements to use AppLocker (Windows)
description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. description: This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0 ms.assetid: dc380535-071e-4794-8f9d-e5d1858156f0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Requirements to use AppLocker # Requirements to use AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems. This topic for the IT professional lists software requirements to use AppLocker on the supported Windows operating systems.
@ -38,11 +43,11 @@ To use AppLocker, you need:
## Operating system requirements ## Operating system requirements
The following table show the on which operating systems AppLocker features are supported. The following table shows the on which operating systems AppLocker features are supported.
| Version | Can be configured | Can be enforced | Available rules | Notes | | Version | Can be configured | Can be enforced | Available rules | Notes |
| - | - | - | - | - | | - | - | - | - | - |
| Windows 10| Yes| Yes| Packaged apps<br/>Executable<br/>Windows Installer<br/>Script<br/>DLL| You can use the [AppLocker CSP](/windows/client-management/mdm/applocker-csp) to configure AppLocker policies on any edition of Windows 10 supported by Mobile Device Management (MDM). You can only manage AppLocker with Group Policy on devices running Windows 10 Enterprise, Windows 10 Education, and Windows Server 2016. | | Windows 10 and Windows 11| Yes| Yes| Packaged apps<br/>Executable<br/>Windows Installer<br/>Script<br/>DLL| You can use the [AppLocker CSP](/windows/client-management/mdm/applocker-csp) to configure AppLocker policies on any edition of Windows 10 and Windows 11 supported by Mobile Device Management (MDM). You can only manage AppLocker with Group Policy on devices running Windows 10 and Windows 11 Enterprise, Windows 10 and Windows 11 Education, and Windows Server 2016. |
| Windows Server 2019<br/>Windows Server 2016<br/>Windows Server 2012 R2<br/>Windows Server 2012| Yes| Yes| Packaged apps<br/>Executable<br/>Windows Installer<br/>Script<br/>DLL| | | Windows Server 2019<br/>Windows Server 2016<br/>Windows Server 2012 R2<br/>Windows Server 2012| Yes| Yes| Packaged apps<br/>Executable<br/>Windows Installer<br/>Script<br/>DLL| |
| Windows 8.1 Pro| Yes| No| N/A|| | Windows 8.1 Pro| Yes| No| N/A||
| Windows 8.1 Enterprise| Yes| Yes| Packaged apps<br/>Executable<br/>Windows Installer<br/>Script<br/>DLL| | | Windows 8.1 Enterprise| Yes| Yes| Packaged apps<br/>Executable<br/>Windows Installer<br/>Script<br/>DLL| |

View File

@ -1,5 +1,5 @@
--- ---
title: Run the Automatically Generate Rules wizard (Windows 10) title: Run the Automatically Generate Rules wizard (Windows)
description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. description: This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.
ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e ms.assetid: 8cad1e14-d5b2-437c-8f88-70cffd7b3d8e
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Run the Automatically Generate Rules wizard # Run the Automatically Generate Rules wizard
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device. This topic for IT professionals describes steps to run the wizard to create AppLocker rules on a reference device.

View File

@ -1,5 +1,5 @@
--- ---
title: Script rules in AppLocker (Windows 10) title: Script rules in AppLocker (Windows)
description: This topic describes the file formats and available default rules for the script rule collection. description: This topic describes the file formats and available default rules for the script rule collection.
ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f ms.assetid: fee24ca4-935a-4c5e-8a92-8cf1d134d35f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Script rules in AppLocker # Script rules in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the file formats and available default rules for the script rule collection. This topic describes the file formats and available default rules for the script rule collection.

View File

@ -1,5 +1,5 @@
--- ---
title: Security considerations for AppLocker (Windows 10) title: Security considerations for AppLocker (Windows)
description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker. description: This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.
ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625 ms.assetid: 354a5abb-7b31-4bea-a442-aa9666117625
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Security considerations for AppLocker # Security considerations for AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the security considerations you need to address when implementing AppLocker. This topic for the IT professional describes the security considerations you need to address when implementing AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Select the types of rules to create (Windows 10) title: Select the types of rules to create (Windows)
description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker. description: This topic lists resources you can use when selecting your application control policy rules by using AppLocker.
ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784 ms.assetid: 14751169-0ed1-47cc-822c-8c01a7477784
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Select the types of rules to create # Select the types of rules to create
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic lists resources you can use when selecting your application control policy rules by using AppLocker. This topic lists resources you can use when selecting your application control policy rules by using AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Test an AppLocker policy by using Test-AppLockerPolicy (Windows 10) title: Test an AppLocker policy by using Test-AppLockerPolicy (Windows)
description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. description: This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.
ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a ms.assetid: 048bfa38-6825-4a9a-ab20-776cf79f402a
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Test an AppLocker policy by using Test-AppLockerPolicy # Test an AppLocker policy by using Test-AppLockerPolicy
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer. This topic for IT professionals describes the steps to test an AppLocker policy prior to importing it into a Group Policy Object (GPO) or another computer.

View File

@ -1,5 +1,5 @@
--- ---
title: Test and update an AppLocker policy (Windows 10) title: Test and update an AppLocker policy (Windows)
description: This topic discusses the steps required to test an AppLocker policy prior to deployment. description: This topic discusses the steps required to test an AppLocker policy prior to deployment.
ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1 ms.assetid: 7d53cbef-078c-4d20-8b00-e821e33b6ea1
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Test and update an AppLocker policy # Test and update an AppLocker policy
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic discusses the steps required to test an AppLocker policy prior to deployment. This topic discusses the steps required to test an AppLocker policy prior to deployment.

View File

@ -1,5 +1,5 @@
--- ---
title: Tools to use with AppLocker (Windows 10) title: Tools to use with AppLocker (Windows)
description: This topic for the IT professional describes the tools available to create and administer AppLocker policies. description: This topic for the IT professional describes the tools available to create and administer AppLocker policies.
ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1 ms.assetid: db2b7cb3-7643-4be5-84eb-46ba551e1ad1
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Tools to use with AppLocker # Tools to use with AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the tools available to create and administer AppLocker policies. This topic for the IT professional describes the tools available to create and administer AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Understand AppLocker enforcement settings (Windows 10) title: Understand AppLocker enforcement settings (Windows)
description: This topic describes the AppLocker enforcement settings for rule collections. description: This topic describes the AppLocker enforcement settings for rule collections.
ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e ms.assetid: 48773007-a343-40bf-8961-b3ff0a450d7e
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understand AppLocker enforcement settings # Understand AppLocker enforcement settings
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the AppLocker enforcement settings for rule collections. This topic describes the AppLocker enforcement settings for rule collections.

View File

@ -1,5 +1,5 @@
--- ---
title: Understand AppLocker policy design decisions (Windows 10) title: Understand AppLocker policy design decisions (Windows)
description: Review some common considerations while you are planning to use AppLocker to deploy application control policies within a Windows environment. description: Review some common considerations while you are planning to use AppLocker to deploy application control policies within a Windows environment.
ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6 ms.assetid: 3475def8-949a-4b51-b480-dc88b5c1e6e6
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understand AppLocker policy design decisions # Understand AppLocker policy design decisions
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies by using AppLocker within a Windows operating system environment. This topic for the IT professional lists the design questions, possible answers, and ramifications of the decisions when you plan a deployment of application control policies by using AppLocker within a Windows operating system environment.
@ -46,7 +51,7 @@ You might need to control a limited number of apps because they access sensitive
| Possible answers | Design considerations| | Possible answers | Design considerations|
| - | - | | - | - |
| Control all apps | AppLocker policies control applications by creating an allowed list of applications by file type. Exceptions are also possible. AppLocker policies can only be applied to applications installed on computers running one of the supported versions of Windows. For specific operating system version requirements, see [Requirements to use AppLocker](requirements-to-use-applocker.md).| | Control all apps | AppLocker policies control applications by creating an allowed list of applications by file type. Exceptions are also possible. AppLocker policies can only be applied to applications installed on computers running one of the supported versions of Windows. For specific operating system version requirements, see [Requirements to use AppLocker](requirements-to-use-applocker.md).|
| Control specific apps | When you create AppLocker rules, a list of allowed apps are created. All apps on that list will be allowed to run (except those on the exception list). Apps that are not on the list will be prevented from running. AppLocker policies can only be applied to apps installed on computers running any of the supported versions of Windows. For specific operating system version requirements, see [Requirements to use AppLocker](requirements-to-use-applocker.md).| | Control specific apps | When you create AppLocker rules, a list of allowed apps is created. All apps on that list will be allowed to run (except those on the exception list). Apps that are not on the list will be prevented from running. AppLocker policies can only be applied to apps installed on computers running any of the supported versions of Windows. For specific operating system version requirements, see [Requirements to use AppLocker](requirements-to-use-applocker.md).|
|Control only Classic Windows applications, only Universal Windows apps, or both| AppLocker policies control apps by creating an allowed list of apps by file type. Because Universal Windows apps are categorized under the Publisher condition, Classic Windows applications and Universal Windows apps can be controlled together. AppLocker policies for Universal Windows apps can be applied only to apps that are installed on PCs that support the Microsoft Store, but Classic Windows applications can be controlled with AppLocker on all supported versions of Windows. The rules you currently have configured for Classic Windows applications can remain, and you can create new ones for Universal Windows apps.<br/>For a comparison of Classic Windows applications and Universal Windows apps, see [Comparing Classic Windows applications and Universal Windows apps for AppLocker policy design decisions](#bkmk-compareclassicmetro) in this topic.| |Control only Classic Windows applications, only Universal Windows apps, or both| AppLocker policies control apps by creating an allowed list of apps by file type. Because Universal Windows apps are categorized under the Publisher condition, Classic Windows applications and Universal Windows apps can be controlled together. AppLocker policies for Universal Windows apps can be applied only to apps that are installed on PCs that support the Microsoft Store, but Classic Windows applications can be controlled with AppLocker on all supported versions of Windows. The rules you currently have configured for Classic Windows applications can remain, and you can create new ones for Universal Windows apps.<br/>For a comparison of Classic Windows applications and Universal Windows apps, see [Comparing Classic Windows applications and Universal Windows apps for AppLocker policy design decisions](#bkmk-compareclassicmetro) in this topic.|
| Control apps by business group and user | AppLocker policies can be applied through a Group Policy Object (GPO) to computer objects within an organizational unit (OU). Individual AppLocker rules can be applied to individual users or to groups of users.| | Control apps by business group and user | AppLocker policies can be applied through a Group Policy Object (GPO) to computer objects within an organizational unit (OU). Individual AppLocker rules can be applied to individual users or to groups of users.|
| Control apps by computer, not user | AppLocker is a computer-based policy implementation. If your domain or site organizational structure is not based on a logical user structure, such as an OU, you might want to set up that structure before you begin your AppLocker planning. Otherwise, you will have to identify users, their computers, and their app access requirements.| | Control apps by computer, not user | AppLocker is a computer-based policy implementation. If your domain or site organizational structure is not based on a logical user structure, such as an OU, you might want to set up that structure before you begin your AppLocker planning. Otherwise, you will have to identify users, their computers, and their app access requirements.|
@ -54,7 +59,7 @@ You might need to control a limited number of apps because they access sensitive
>**Important:** The following list contains files or types of files that cannot be managed by AppLocker: >**Important:** The following list contains files or types of files that cannot be managed by AppLocker:
- AppLocker does not protect against running 16-bit DOS binaries in a NT Virtual DOS Machine (NTVDM). This technology allows running legacy DOS and 16-bit Windows programs on computers that are using Intel 80386 or higher when there is already another operating system running and controlling the hardware. The result is that 16-bit binaries can still run on Windows Server 2008 R2 and Windows 7 when AppLocker is configured to otherwise block binaries and libraries. If it is a requirement to prevent 16-bit applications from running, you must configure the Deny rule in the Executable rule collection for NTVDM.exe. - AppLocker does not protect against running 16-bit DOS binaries in an NT Virtual DOS Machine (NTVDM). This technology allows running legacy DOS and 16-bit Windows programs on computers that are using Intel 80386 or higher when there is already another operating system running and controlling the hardware. The result is that 16-bit binaries can still run on Windows Server 2008 R2 and Windows 7 when AppLocker is configured to otherwise block binaries and libraries. If it is a requirement to prevent 16-bit applications from running, you must configure the Deny rule in the Executable rule collection for NTVDM.exe.
- You cannot use AppLocker to prevent code from running outside the Win32 subsystem. In particular, this applies to the (POSIX) subsystem in Windows NT. If it is a requirement to prevent applications from running in the POSIX subsystem, you must disable the subsystem. - You cannot use AppLocker to prevent code from running outside the Win32 subsystem. In particular, this applies to the (POSIX) subsystem in Windows NT. If it is a requirement to prevent applications from running in the POSIX subsystem, you must disable the subsystem.
@ -108,6 +113,7 @@ If your organization supports multiple Windows operating systems, app control po
<tr class="odd"> <tr class="odd">
<td align="left"><p>Your organization&#39;s computers are running a combination of the following operating systems:</p> <td align="left"><p>Your organization&#39;s computers are running a combination of the following operating systems:</p>
<ul> <ul>
<li><p>Windows 11</p></li>
<li><p>Windows 10</p></li> <li><p>Windows 10</p></li>
<li><p>Windows 8</p></li> <li><p>Windows 8</p></li>
<li><p>Windows 7</p></li> <li><p>Windows 7</p></li>
@ -130,6 +136,7 @@ If your organization supports multiple Windows operating systems, app control po
<tr class="even"> <tr class="even">
<td align="left"><p>Your organization&#39;s computers are running only the following operating systems:</p> <td align="left"><p>Your organization&#39;s computers are running only the following operating systems:</p>
<ul> <ul>
<li><p>Windows 11</p></li>
<li><p>Windows 10</p></li> <li><p>Windows 10</p></li>
<li><p>Windows 8.1</p></li> <li><p>Windows 8.1</p></li>
<li><p>Windows 8</p></li> <li><p>Windows 8</p></li>

View File

@ -1,5 +1,5 @@
--- ---
title: Understand AppLocker rules and enforcement setting inheritance in Group Policy (Windows 10) title: Understand AppLocker rules and enforcement setting inheritance in Group Policy (Windows)
description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy. description: This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy.
ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871 ms.assetid: c1c5a3d3-540a-4698-83b5-0dab5d27d871
ms.reviewer: ms.reviewer:
@ -21,12 +21,17 @@ ms.technology: mde
# Understand AppLocker rules and enforcement setting inheritance in Group Policy # Understand AppLocker rules and enforcement setting inheritance in Group Policy
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy. This topic for the IT professional describes how application control policies configured in AppLocker are applied through Group Policy.
Rule enforcement is applied only to collections of rules, not individual rules. AppLocker divides the rules into the following collections: executable files, Windows Installer files, scripts, packaged apps and packaged app installers, and DLL files. The options for rule enforcement are **Not configured**, **Enforce rules**, or **Audit only**. Together, all AppLocker rule collections compose the application control policy, or AppLocker policy. Rule enforcement is applied only to collections of rules, not individual rules. AppLocker divides the rules into the following collections: executable files, Windows Installer files, scripts, packaged apps, and packaged app installers, and DLL files. The options for rule enforcement are **Not configured**, **Enforce rules**, or **Audit only**. Together, all AppLocker rule collections compose the application control policy, or AppLocker policy.
Group Policy merges AppLocker policy in two ways: Group Policy merges AppLocker policy in two ways:

View File

@ -1,5 +1,5 @@
--- ---
title: Understand the AppLocker policy deployment process (Windows 10) title: Understand the AppLocker policy deployment process (Windows)
description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies. description: This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16 ms.assetid: 4cfd95c1-fbd3-41fa-8efc-d23c1ea6fb16
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understand the AppLocker policy deployment process # Understand the AppLocker policy deployment process
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies. This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding AppLocker allow and deny actions on rules (Windows 10) title: Understanding AppLocker allow and deny actions on rules (Windows)
description: This topic explains the differences between allow and deny actions on AppLocker rules. description: This topic explains the differences between allow and deny actions on AppLocker rules.
ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9 ms.assetid: ea0370fa-2086-46b5-a0a4-4a7ead8cbed9
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding AppLocker allow and deny actions on rules # Understanding AppLocker allow and deny actions on rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic explains the differences between allow and deny actions on AppLocker rules. This topic explains the differences between allow and deny actions on AppLocker rules.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding AppLocker default rules (Windows 10) title: Understanding AppLocker default rules (Windows)
description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied. description: This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.
ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1 ms.assetid: bdb03d71-05b7-41fb-96e3-a289ce1866e1
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding AppLocker default rules # Understanding AppLocker default rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied. This topic for IT professional describes the set of rules that can be used to ensure that required Windows system files are allowed to run when the policy is applied.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding AppLocker rule behavior (Windows 10) title: Understanding AppLocker rule behavior (Windows)
description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker. description: This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.
ms.assetid: 3e2738a3-8041-4095-8a84-45c1894c97d0 ms.assetid: 3e2738a3-8041-4095-8a84-45c1894c97d0
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding AppLocker rule behavior # Understanding AppLocker rule behavior
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker. This topic describes how AppLocker rules are enforced by using the allow and deny options in AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding AppLocker rule collections (Windows 10) title: Understanding AppLocker rule collections (Windows)
description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies. description: This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.
ms.assetid: 03c05466-4fb3-4880-8d3c-0f6f59fc5579 ms.assetid: 03c05466-4fb3-4880-8d3c-0f6f59fc5579
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding AppLocker rule collections # Understanding AppLocker rule collections
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic explains the five different types of AppLocker rules used to enforce AppLocker policies. This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding AppLocker rule condition types (Windows 10) title: Understanding AppLocker rule condition types (Windows)
description: This topic for the IT professional describes the three types of AppLocker rule conditions. description: This topic for the IT professional describes the three types of AppLocker rule conditions.
ms.assetid: c21af67f-60a1-4f7d-952c-a6f769c74729 ms.assetid: c21af67f-60a1-4f7d-952c-a6f769c74729
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding AppLocker rule condition types # Understanding AppLocker rule condition types
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the three types of AppLocker rule conditions. This topic for the IT professional describes the three types of AppLocker rule conditions.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding AppLocker rule exceptions (Windows 10) title: Understanding AppLocker rule exceptions (Windows)
description: This topic describes the result of applying AppLocker rule exceptions to rule collections. description: This topic describes the result of applying AppLocker rule exceptions to rule collections.
ms.assetid: e6bb349f-ee60-4c8d-91cd-6442f2d0eb9c ms.assetid: e6bb349f-ee60-4c8d-91cd-6442f2d0eb9c
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding AppLocker rule exceptions # Understanding AppLocker rule exceptions
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the result of applying AppLocker rule exceptions to rule collections. This topic describes the result of applying AppLocker rule exceptions to rule collections.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding the file hash rule condition in AppLocker (Windows 10) title: Understanding the file hash rule condition in AppLocker (Windows)
description: This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it is applied. description: This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it is applied.
ms.assetid: 4c6d9af4-2b1a-40f4-8758-1a6f9f147756 ms.assetid: 4c6d9af4-2b1a-40f4-8758-1a6f9f147756
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding the file hash rule condition in AppLocker # Understanding the file hash rule condition in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it is applied. This topic explains the AppLocker file hash rule condition, the advantages and disadvantages, and how it is applied.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding the path rule condition in AppLocker (Windows 10) title: Understanding the path rule condition in AppLocker (Windows)
description: This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it is applied. description: This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it is applied.
ms.assetid: 3fa54ded-4466-4f72-bea4-2612031cad43 ms.assetid: 3fa54ded-4466-4f72-bea4-2612031cad43
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding the path rule condition in AppLocker # Understanding the path rule condition in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it is applied. This topic explains the AppLocker path rule condition, the advantages and disadvantages, and how it is applied.

View File

@ -1,5 +1,5 @@
--- ---
title: Understanding the publisher rule condition in AppLocker (Windows 10) title: Understanding the publisher rule condition in AppLocker (Windows)
description: This topic explains the AppLocker publisher rule condition, what controls are available, and how it is applied. description: This topic explains the AppLocker publisher rule condition, what controls are available, and how it is applied.
ms.assetid: df61ed8f-a97e-4644-9d0a-2169f18c1c4f ms.assetid: df61ed8f-a97e-4644-9d0a-2169f18c1c4f
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Understanding the publisher rule condition in AppLocker # Understanding the publisher rule condition in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic explains the AppLocker publisher rule condition, what controls are available, and how it is applied. This topic explains the AppLocker publisher rule condition, what controls are available, and how it is applied.

View File

@ -1,5 +1,5 @@
--- ---
title: Use a reference device to create and maintain AppLocker policies (Windows 10) title: Use a reference device to create and maintain AppLocker policies (Windows)
description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer. description: This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.
ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6 ms.assetid: 10c3597f-f44c-4c8e-8fe5-105d4ac016a6
ms.author: macapara ms.author: macapara
@ -21,8 +21,13 @@ ms.technology: mde
# Use a reference device to create and maintain AppLocker policies # Use a reference device to create and maintain AppLocker policies
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer. This topic for the IT professional describes the steps to create and maintain AppLocker policies by using a reference computer.

View File

@ -1,5 +1,5 @@
--- ---
title: Use AppLocker and Software Restriction Policies in the same domain (Windows 10) title: Use AppLocker and Software Restriction Policies in the same domain (Windows)
description: This topic for IT professionals describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker. description: This topic for IT professionals describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker.
ms.assetid: 2b7e0cec-df62-49d6-a2b7-6b8e30180943 ms.assetid: 2b7e0cec-df62-49d6-a2b7-6b8e30180943
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Use AppLocker and Software Restriction Policies in the same domain # Use AppLocker and Software Restriction Policies in the same domain
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker. This topic for IT professionals describes concepts and procedures to help you manage your application control strategy using Software Restriction Policies and AppLocker.
@ -71,8 +76,8 @@ The following table compares the features and functions of Software Restriction
<tr class="odd"> <tr class="odd">
<td align="left"><p>Enforcement mode</p></td> <td align="left"><p>Enforcement mode</p></td>
<td align="left"><p>SRP works in the “deny list mode” where administrators can create rules for files that they do not want to allow in this Enterprise whereas the rest of the file is allowed to run by default.</p> <td align="left"><p>SRP works in the “deny list mode” where administrators can create rules for files that they do not want to allow in this Enterprise whereas the rest of the file is allowed to run by default.</p>
<p>SRP can also be configured in the “allow list mode” so that by default all files are blocked and administrators need to create allow rules for files that they want to allow.</p></td> <p>SRP can also be configured in the “allowlist mode” so that by default all files are blocked and administrators need to create allow rules for files that they want to allow.</p></td>
<td align="left"><p>AppLocker by default works in the “allow list mode” where only those files are allowed to run for which there is a matching allow rule.</p></td> <td align="left"><p>AppLocker by default works in the “allowlist mode” where only those files are allowed to run for which there is a matching allow rule.</p></td>
</tr> </tr>
<tr class="even"> <tr class="even">
<td align="left"><p>File types that can be controlled</p></td> <td align="left"><p>File types that can be controlled</p></td>
@ -126,7 +131,7 @@ The following table compares the features and functions of Software Restriction
<td align="left"><p>Editing the hash value</p></td> <td align="left"><p>Editing the hash value</p></td>
<td align="left"><p>In Windows XP, you could use SRP to provide custom hash values.</p> <td align="left"><p>In Windows XP, you could use SRP to provide custom hash values.</p>
<p>Beginning with Windows 7 and Windows Server 2008 R2, you can only select the file to hash, not provide the hash value.</p></td> <p>Beginning with Windows 7 and Windows Server 2008 R2, you can only select the file to hash, not provide the hash value.</p></td>
<td align="left"><p>AppLocker computes the hash value itself. Internally, it uses the SHA2 Authenticode hash for Portable Executables (exe and dll) and Windows Installers and a SHA2 flat file hash for the rest.</p></td> <td align="left"><p>AppLocker computes the hash value itself. Internally, it uses the SHA2 Authenticode hash for Portable Executables (exe and dll) and Windows Installers and an SHA2 flat file hash for the rest.</p></td>
</tr> </tr>
<tr class="even"> <tr class="even">
<td align="left"><p>Support for different security levels</p></td> <td align="left"><p>Support for different security levels</p></td>

View File

@ -1,5 +1,5 @@
--- ---
title: Use the AppLocker Windows PowerShell cmdlets (Windows 10) title: Use the AppLocker Windows PowerShell cmdlets (Windows)
description: This topic for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies. description: This topic for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies.
ms.assetid: 374e029c-5c0a-44ab-a57a-2a9dd17dc57d ms.assetid: 374e029c-5c0a-44ab-a57a-2a9dd17dc57d
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Use the AppLocker Windows PowerShell cmdlets # Use the AppLocker Windows PowerShell cmdlets
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies. This topic for IT professionals describes how each AppLocker Windows PowerShell cmdlet can help you administer your AppLocker application control policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Using Event Viewer with AppLocker (Windows 10) title: Using Event Viewer with AppLocker (Windows)
description: This topic lists AppLocker events and describes how to use Event Viewer with AppLocker. description: This topic lists AppLocker events and describes how to use Event Viewer with AppLocker.
ms.assetid: 109abb10-78b1-4c29-a576-e5a17dfeb916 ms.assetid: 109abb10-78b1-4c29-a576-e5a17dfeb916
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Using Event Viewer with AppLocker # Using Event Viewer with AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic lists AppLocker events and describes how to use Event Viewer with AppLocker. This topic lists AppLocker events and describes how to use Event Viewer with AppLocker.

View File

@ -1,5 +1,5 @@
--- ---
title: Use Software Restriction Policies and AppLocker policies (Windows 10) title: Use Software Restriction Policies and AppLocker policies (Windows)
description: This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. description: This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment.
ms.assetid: c3366be7-e632-4add-bd10-9df088f74c6d ms.assetid: c3366be7-e632-4add-bd10-9df088f74c6d
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Use Software Restriction Policies and AppLocker policies # Use Software Restriction Policies and AppLocker policies
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment.

View File

@ -1,5 +1,5 @@
--- ---
title: What Is AppLocker (Windows 10) title: What Is AppLocker (Windows)
description: This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. description: This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies.
ms.assetid: 44a8a2bb-0f83-4f95-828e-1f364fb65869 ms.assetid: 44a8a2bb-0f83-4f95-828e-1f364fb65869
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# What Is AppLocker? # What Is AppLocker?
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies. This topic for the IT professional describes what AppLocker is and how its features differ from Software Restriction Policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Windows Installer rules in AppLocker (Windows 10) title: Windows Installer rules in AppLocker (Windows)
description: This topic describes the file formats and available default rules for the Windows Installer rule collection. description: This topic describes the file formats and available default rules for the Windows Installer rule collection.
ms.assetid: 3fecde5b-88b3-4040-81fa-a2d36d052ec9 ms.assetid: 3fecde5b-88b3-4040-81fa-a2d36d052ec9
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Windows Installer rules in AppLocker # Windows Installer rules in AppLocker
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic describes the file formats and available default rules for the Windows Installer rule collection. This topic describes the file formats and available default rules for the Windows Installer rule collection.

View File

@ -1,5 +1,5 @@
--- ---
title: Working with AppLocker policies (Windows 10) title: Working with AppLocker policies (Windows)
description: This topic for IT professionals provides links to procedural topics about creating, maintaining, and testing AppLocker policies. description: This topic for IT professionals provides links to procedural topics about creating, maintaining, and testing AppLocker policies.
ms.assetid: 7062d2e0-9cbb-4cb8-aa8c-b24945c3771d ms.assetid: 7062d2e0-9cbb-4cb8-aa8c-b24945c3771d
ms.reviewer: ms.reviewer:
@ -21,8 +21,13 @@ ms.technology: mde
# Working with AppLocker policies # Working with AppLocker policies
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals provides links to procedural topics about creating, maintaining, and testing AppLocker policies. This topic for IT professionals provides links to procedural topics about creating, maintaining, and testing AppLocker policies.

View File

@ -1,5 +1,5 @@
--- ---
title: Working with AppLocker rules (Windows 10) title: Working with AppLocker rules (Windows)
description: This topic for IT professionals describes AppLocker rule types and how to work with them for your application control policies. description: This topic for IT professionals describes AppLocker rule types and how to work with them for your application control policies.
ms.assetid: 3966b35b-f2da-4371-8b5f-aec031db6bc9 ms.assetid: 3966b35b-f2da-4371-8b5f-aec031db6bc9
ms.reviewer: ms.reviewer:
@ -19,8 +19,13 @@ ms.technology: mde
# Working with AppLocker rules # Working with AppLocker rules
**Applies to** **Applies to**
- Windows 10
- Windows Server - Windows 10
- Windows 11
- Windows Server 2016 and above
>[!NOTE]
>Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Defender App Guard feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability).
This topic for IT professionals describes AppLocker rule types and how to work with them for your application control policies. This topic for IT professionals describes AppLocker rule types and how to work with them for your application control policies.

Some files were not shown because too many files have changed in this diff Show More