windows-itpro-docs/windows/keep-secure/understanding-applocker-rule-collections.md
Brian Lich 0667e1e1fe Revert "reverting changes"
This reverts commit ecd000f39a712dab62dcc117494c8be802a18637.
2017-01-25 14:45:35 -08:00

1.5 KiB

title, description, ms.assetid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author
title description ms.assetid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author
Understanding AppLocker rule collections (Windows 10) This topic explains the five different types of AppLocker rules used to enforce AppLocker policies. 03c05466-4fb3-4880-8d3c-0f6f59fc5579 w10 deploy library security brianlic-msft

Understanding AppLocker rule collections

Applies to

  • Windows 10

This topic explains the five different types of AppLocker rules used to enforce AppLocker policies.

An AppLocker rule collection is a set of rules that apply to one of five types:

  • Executable files: .exe and .com
  • Windows Installer files: .msi, mst, and .msp
  • Scripts: .ps1, .bat, .cmd, .vbs, and .js
  • DLLs: .dll and .ocx
  • Packaged apps and packaged app installers: .appx

If you use DLL rules, a DLL allow rule has to be created for each DLL that is used by all of the allowed apps.

Important:  Each app can load several DLLs, and AppLocker must check each DLL before it is allowed to run. Therefore, creating DLL rules might cause performance problems on some computers. Denying some DLLs from running can also create app compatibility problems. As a result, the DLL rule collection is not enabled by default.   For info about how to enable the DLL rule collection, see Enable the DLL rule collection.