Import the AppLocker PoSh module with the below command: import-module AppLocker. And execute the Set-App Locker Policy command to clean everything up. Set-AppLockerPolicy -XMLPolicy. Reboot the machine. Afterwards let’s say in 90% of the scenarios the machine will work as before AppLocker was enabled. Windows 7 Pro has Applocker console where you can create rules and export them, you cannot enforce them. There are no business decisions to limit Applocker to top desktop editions (Ultimate and Enterprise). In small business (SMB) it is easier to keep similar operating systems (say, Windows 7 Pro clients and SBS servers) than for large enterprises. On a computer running Windows 10 Enterprise, start Group Policy Editor (GPEdit). Under Computer Configuration Windows Settings Security Settings Application Control Policies AppLocker, right-click and select Properties, then enable Packaged app Rules and select Enforce rules. This turns on our AppLocker rules. Once done, click OK. This application is for all the people who wants to make their apps password protected. This app covers all the major social networking apps to add extra layer of protection.
Update 01.12.2012: clarified Applocker support on server core installations.
Hello folks! Today I want to share some personal opinions about one Windows whitelisting technology — Applocker, especially about the future.
![Applocker Applocker](/uploads/1/1/9/8/119876841/819445370.jpg)
Not all know that this is not something new (as Microsoft promotes), but a next generation of Software Restriction Policies (SRP). SRP is original Microsoft whitelisting technology which was introduced in 2001 (with Windows XP release). Due to various reasons, SRP didn’t become a popular technology that was used by systems administrators (not talking about home users). Microsoft attempted to make SRP more flexible, user-friendly and simple in configuration and usage. As the result, we got SRPv2 called Applocker, which was introduced in Windows 7 and Windows Server 2008 R2.
From the first look it was a nice replacement for SRP with some useful additions. For example, we can export and import rules in XML format, create rule collections, added new useful variables, nice rule creation wizard and built-in security filtering. I successfully used Applocker on my personal computers when I got an access to Windows 7 (previously I used SRP) as a free and powerful malware protection mechanism.
Even though, Microsoft actively promoted Applocker between IT Pros, the technology remained behind the scene, because it was available only in Windows 7 Ultimate and Enterprise editions. This was a bad move, because small business market not always can purchase Enterprise editions and commonly uses Professional edition (a replacement for Vista Business). Windows 7 Pro has Applocker console where you can create rules and export them, you cannot enforce them. There are no business decisions to limit Applocker to top desktop editions (Ultimate and Enterprise). In small business (SMB) it is easier to keep similar operating systems (say, Windows 7 Pro clients and SBS servers) than for large enterprises. Thus, it is almost impossible for companies to use Applocker as a unified whitelisting technology, because there are systems which do not support Applocker. And companies have to maintain both technologies — Applocker for modern systems and SRP for other systems. Theoretically. In practice, SRP has better support and sometimes is better than Applocker. Here is a full list of operating systems that supports Applocker:
- Windows 7 Ultimate, Enterprise
- Windows 8 Enterprise
- Windows Server 2008 R2 (all editions)
- Windows Server 2012 (all editions, except server core installation)
and SRP support:
Applocker Windows 10 Pro Activator
- Windows XP Professional, MediaCenter
- Windows Vista Business, Ultimate, Enterprise
- Windows 7 Professional, Ultimate, Enterprise
- Windows 8 RT, Professional, Ultimate, Enterprise
- Windows Server 2003 (all editions)
- Windows Server 2008 (all editions)
- Windows Server 2008 R2 (all editions)
- Windows Server 2012 (all editions)
feel the difference. Also Applocker has a serious (in certain cases — blocking) bug: you cannot create path rules for network locations (or mapped drives). On the other hand, SRP lacks in built-in security filtering, as the result we have to maintain multiple group policy objects (GPO) to allow various software usage scenarios depending on a user permissions. Also I would like to show you a quick table that displays feature support in Applocker and SRP:
Windows 10 App Lockers
![Applocker Windows 10 Pro Applocker Windows 10 Pro](/uploads/1/1/9/8/119876841/660682487.jpg)
SRP | AppLocker | |
Rules applies to (in a single GPO): | All users | Specified users and groups |
Default action level | Unrestricted | Deny |
Has explicit “Allow” action | ||
Has explicit “Deny” actions | ||
Has special action | ||
Certificate rules | ||
Publisher rules | ||
Hash rules | ||
Network zone rules | ||
Path rules | ||
System environment variables | ||
Special environment variables | ||
Can read paths from registry | ||
Audit mode | ||
Rule collections | ||
Rule creation wizrd | ||
Policy export/import | ||
PowerShell support | ||
Error messages when application is blocked | ||
Configurable extension list | ||
Can control Metro apps |
The table displays the most important features that we may want to see in any whitelisting technology.
Recently I bought a new notebook and installed Windows 8 Pro. I was really disappointed when I noticed, that Applocker is partially supported there (cannot enforce rules). I spend some time to move Applocker rules to SRP.
Windows 8 is second Windows OS generation where we can use Applocker, however technology support is limited again. Even though, SRP has few disadvantages (comparing with Applocker), better OS support makes more sense and is more decisional than anything else. I don’t see any chances for Applocker to become a popular whitelisting technology in near future. If you have something to tell about the subject — you are welcome in comments.