--- title: Executable rules in AppLocker description: This topic describes the file formats and available default rules for the executable rule collection. ms.reviewer: ms.author: vinpa ms.prod: windows-client ms.localizationpriority: medium author: vinaypamnani-msft manager: aaroncz ms.topic: conceptual ms.date: 09/21/2017 ms.technology: itpro-security --- # Executable rules in AppLocker >[!NOTE] >Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the [Windows Defender Application Control feature availability](/windows/security/threat-protection/windows-defender-application-control/feature-availability). This topic describes the file formats and available default rules for the executable rule collection. AppLocker defines executable rules as any files with the .exe and .com extensions that are associated with an app. Because all of the default rules for the executable rule collection are based on folder paths, all files under those paths will be allowed. The following table lists the default rules that are available for the executable rule collection. | Purpose | Name | User | Rule condition type | | - | - | - | - | | Allow members of the local Administrators group access to run all executable files | (Default Rule) All files| BUILTIN\Administrators | Path: * | | Allow all users to run executable files in the Windows folder| (Default Rule) All files located in the Windows folder| Everyone| Path: %windir%\*| | Allow all users to run executable files in the Program Files folder | (Default Rule) All files located in the Program Files folder| Everyone | Path: %programfiles%\*| ## Related topics - [Understanding AppLocker Default Rules](understanding-applocker-default-rules.md)