1.9 KiB

title, description, ms.assetid, ms.reviewer, ms.author, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.localizationpriority, author, manager, audience, ms.topic, ms.date, ms.technology
title description ms.assetid ms.reviewer ms.author ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.localizationpriority author manager audience ms.topic ms.date ms.technology
Executable rules in AppLocker This topic describes the file formats and available default rules for the executable rule collection. 65e62f90-6caa-48f8-836a-91f8ac9018ee vinpa windows-client deploy library security medium vinaypamnani-msft aaroncz ITPro conceptual 09/21/2017 itpro-security

Executable rules in AppLocker

Applies to

  • Windows 10
  • Windows 11
  • Windows Server 2016 and above

Note

Some capabilities of Windows Defender Application Control are only available on specific Windows versions. Learn more about the Windows Defender Application Control feature availability.

This topic describes the file formats and available default rules for the executable rule collection.

AppLocker defines executable rules as any files with the .exe and .com extensions that are associated with an app. Because all of the default rules for the executable rule collection are based on folder paths, all files under those paths will be allowed. The following table lists the default rules that are available for the executable rule collection.

Purpose Name User Rule condition type
Allow members of the local Administrators group access to run all executable files (Default Rule) All files BUILTIN\Administrators Path: *
Allow all users to run executable files in the Windows folder (Default Rule) All files located in the Windows folder Everyone Path: %windir%*
Allow all users to run executable files in the Program Files folder (Default Rule) All files located in the Program Files folder Everyone Path: %programfiles%*