mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 13:53:39 +00:00
Add WDAC vs AppLocker comparison chart
This commit is contained in:
@ -93,6 +93,23 @@ Although either AppLocker or WDAC can be used to control application execution o
|
|||||||
- You are using application control to help users avoid running unapproved software, but you do not require a solution designed as a security feature.
|
- You are using application control to help users avoid running unapproved software, but you do not require a solution designed as a security feature.
|
||||||
- You do not wish to enforce application control on application files such as DLLs or drivers.
|
- You do not wish to enforce application control on application files such as DLLs or drivers.
|
||||||
|
|
||||||
|
### Detailed Comparison Chart
|
||||||
|
| Capability | WDAC | AppLocker |
|
||||||
|
|-----------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
|
| Platform support | Available on Windows 10 devices | Available on Windows 8+ devices |
|
||||||
|
| SKU availability | Cmdlets are available on all SKUs on 1909+ builds.<br>For pre-1909 builds, cmdlets are only available on Enterprise but policies are effective on all SKUs. | Policies deployed through GP are only effective on Enterprise devices.<br>Policies deployed through MDM are effective on all SKUs. |
|
||||||
|
| Management solutions | <ul><li>[Intune](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune) (including built-in policies)</li><li>[SCCM](https://docs.microsoft.com/configmgr/protect/deploy-use/use-device-guard-with-configuration-manager) (including built-in policies)</li><li>[Group Policy](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-group-policy) </li><li>PowerShell</li></ul> | <ul><li>Intune (no native support)</li><li>SCCM (no native support)</li><li>Group Policy</li><li>PowerShell</li><ul> |
|
||||||
|
| Per-User and Per-User group rules | Not available (policies are device-wide) | Available on Windows 8+ |
|
||||||
|
| Kernel mode policies | Available on all Windows 10 builds | Not available |
|
||||||
|
| Per-app rules | [Available on 1703+](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules) | Not available |
|
||||||
|
| Managed Installer (MI) | [Available on 1703+](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer) | Available on RS3+ |
|
||||||
|
| Reputation-Based intelligence | [Available on 1709+](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph) | Available on RS3+ |
|
||||||
|
| Multiple policy support | [Available on 1903+](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) | Multiple base policies available on Windows 10 through MDM |
|
||||||
|
| Path-based rules | [Available on 1903+.](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#more-information-about-filepath-rules) Exclusions are not supported. Runtime user-writeability check is available. | Available on Windows 8+. Exclusions are supported. |
|
||||||
|
| COM object configurability | [Available on 1903+](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy) | Not available |
|
||||||
|
| Packaged app rules | [Available on 1903+](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control) | Available on Windows 8+ |
|
||||||
|
| Enforceable file extensions | <ul><li>Driver files: .sys</li><li>Executable files: .exe and .com</li><li>DLLs: .dll and .ocx</li><li>Windows Installer files: .msi, mst, and .msp</li><li>Scripts: .ps1, .vbs, and .js</li><li>Packaged apps and packaged app installers: .appx</li></ul>Driver files and executables cannot be separately configured.<br>Manages system driver files.<br>Does not manage .bat or .cmd files. | <ul><li>Executable files: .exe and .com</li><li>DLLs: .dll and .ocx</li><li>Windows Installer files: .msi, mst, and .msp</li><li>Scripts: .ps1, .bat, .cmd, .vbs, and .js</li><li>Packaged apps and packaged app installers: .appx</li></ul>Driver files and executables can be separately configured.<br>Does not manage system drivers.<br>Manages .bat and .cmd files. |
|
||||||
|
|
||||||
## When to use both WDAC and AppLocker together
|
## When to use both WDAC and AppLocker together
|
||||||
|
|
||||||
AppLocker can also be deployed as a complement to WDAC to add user- or group-specific rules for shared device scenarios where its important to prevent some users from running specific apps.
|
AppLocker can also be deployed as a complement to WDAC to add user- or group-specific rules for shared device scenarios where its important to prevent some users from running specific apps.
|
||||||
|
Reference in New Issue
Block a user