2.0 KiB
title, description, ms.localizationpriority, ms.topic, ms.date
title | description | ms.localizationpriority | ms.topic | ms.date |
---|---|---|---|---|
Add exceptions for an AppLocker rule | This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule. | medium | conceptual | 09/21/2017 |
Add exceptions for an AppLocker rule
Note
Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the Windows Defender Application Control feature availability.
This topic for IT professionals describes the steps to specify which apps can or cannot run as exceptions to an AppLocker rule.
Rule exceptions allow you to specify files or folders to exclude from the rule. For more information about exceptions, see Understanding AppLocker rule exceptions.
You can perform this task by using the Group Policy Management Console for an AppLocker policy in a Group Policy Object (GPO) or by using the Local Security Policy snap-in for an AppLocker policy on a local computer or in a security template. For info how to use these MMC snap-ins to administer AppLocker, see Administer AppLocker.
To configure exceptions for a rule
-
Open the AppLocker console.
-
Expand the rule collection, right-click the rule that you want to configure exceptions for, and then click Properties.
-
Click the Exceptions tab.
-
In the Add exception box, select the rule type that you want to create, and then click Add.
- For a publisher exception, click Browse, select the file that contains the publisher to exclude, and then click OK.
- For a path exception, choose the file or folder path to exclude, and then click OK.
- For a file hash exception, edit the file hash rule, and click Remove.
- For a packaged apps exception, click Add to create the exceptions based on reference app and rule scope.