--- title: Use Software Restriction Policies and AppLocker policies (Windows 10) description: This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. ms.assetid: c3366be7-e632-4add-bd10-9df088f74c6d ms.prod: W10 ms.mktglfcycl: deploy ms.sitesec: library author: brianlic-msft --- # Use Software Restriction Policies and AppLocker policies **Applies to** - Windows 10 This topic for the IT professional describes how to use Software Restriction Policies (SRP) and AppLocker policies in the same Windows deployment. ## Understand the difference between SRP and AppLocker You might want to deploy application control policies in Windows operating systems earlier than Windows Server 2008 R2 or Windows 7. You can use AppLocker policies only on the supported versions and editions of Windows as listed in [Requirements to use AppLocker](requirements-to-use-applocker.md). However, you can use SRP on those supported editions of Windows plus Windows Server 2003 and Windows XP. To compare features and functions in SRP and AppLocker so that you can determine when to use each technology to meet your application control objectives, see [Determine your application control objectives](determine-your-application-control-objectives.md). ## Use SRP and AppLocker in the same domain SRP and AppLocker use Group Policy for domain management. However, when policies are generated by SRP and AppLocker exist in the same domain, and they are applied through Group Policy, AppLocker policies take precedence over policies generated by SRP on computers that are running an operating system that supports AppLocker. For info about how inheritance in Group Policy applies to AppLocker policies and policies generated by SRP, see [Understand AppLocker rules and enforcement setting inheritance in Group Policy](understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md). **Important** As a best practice, use separate Group Policy Objects to implement your SRP and AppLocker policies. To reduce troubleshooting issues, do not combine them in the same GPO. The following scenario provides an example of how each type of policy would affect a bank teller software app, where the app is deployed on different Windows desktop operating systems and managed by the Tellers GPO.
Operating system | Tellers GPO with AppLocker policy | Tellers GPO with SRP | Tellers GPO with AppLocker policy and SRP |
---|---|---|---|
Windows 10, Windows 8.1, Windows 8,and Windows 7 |
AppLocker policies in the GPO are applied, and they supersede any local AppLocker policies. |
Local AppLocker policies supersede policies generated by SRP that are applied through the GPO. |
AppLocker policies in the GPO are applied, and they supersede the policies generated by SRP in the GPO and local AppLocker policies or policies generated by SRP. |
Windows Vista |
AppLocker policies are not applied. |
Policies generated by SRP in the GPO are applied, and they supersede local policies generated by SRP.AppLocker policies are not applied. |
Policies generated by SRP in the GPO are applied, and they supersede local policies generated by SRP. AppLocker policies not applied. |
Windows XP |
AppLocker policies are not applied. |
Policies generated by SRP in the GPO are applied, and they supersede local policies generated by SRP. AppLocker policies are not applied. |
Policies generated by SRP in the GPO are applied, and they supersede local policies generated by SRP. AppLocker policies not applied. |