



Application Allowlisting is disabled by default.
When enabled, users can only run applications that have been explicitly allowed. All other applications will be blocked automatically.
Applications can be allowed based on:
Application Name
Publisher
Application Path
Digital Certificate
Important: Any application listed in the Blocked List will always take priority over allowed applications. Ensure all required business applications are added to the Allowed List before enabling allowlisting to avoid user disruption.
These configuration options help balance security with usability:
Disabled by default
Allows all digitally signed user applications to run
Any application with a valid digital signature is automatically trusted
Enabled by default
Allows applications created or run by system accounts
Ensures essential system-level processes can operate normally
Note: Some trusted user applications (such as antivirus software) may spawn system-level processes that require this option to remain enabled.
Enabled by default
Allows secondary or child processes launched by already allowed applications
Prevents dependent processes from being blocked unintentionally
Important: Application allowlisting applies only to User Account applications. System, Network, and Local Service accounts are excluded to prevent misconfiguration and accidental lockouts.
Administrators can add applications using several methods.
Applications can be added:
From the Available Applications list (automatically collected from client endpoint activity)
Manually by entering the executable name or browsing for it
Multiple Versions: If multiple versions of an application are installed (for example, camtasia.exe), allowlisting is enforced by executable name, not version. To control specific versions, use the Application Path method.
Allows all applications digitally signed by a specified publisher to run. This is useful for organizations that rely on trusted vendors.
To locate the publisher in Windows:
Right-click the application executable or shortcut
Select Properties
Open the Digital Signatures tab
View the signer details
Allows applications based on their file location.
Examples:
Specific file: C:\Program Files\ExampleApp\app.exe
Entire folder: C:\Program Files\ExampleApp\
This method provides precise control and supports trusted folders using wildcards.
Allows any application signed with a specific digital certificate, regardless of name or path.
To locate a certificate:
Right-click the application executable
Select Properties
Open the Digital Signatures tab
View the certificate details and copy the Issued by value
Note: Only digitally signed applications support certificate-based allowlisting.
Some applications may display N/A for Publisher or Certificate. This typically indicates:
Unsigned applications
Self-signed or untrusted certificates
Missing or corrupted certificate data
Certain Microsoft Store or packaged apps
Permission or access limitations
These applications can still be allowed, but administrators will see a warning advising caution.
When a blocked application is launched, users will see a customizable warning message.
Users can:
View previously blocked applications
Copy application details to the clipboard for IT review
Suppress repeat notifications for the remainder of the day
This helps reduce disruption while providing transparency and a clear path for application approval.
Provides a complete list of all discovered applications across the environment.
Administrators can:
Allow or block applications
Review last accessed timestamps
Filter and manage custom applications
This view is ideal for ongoing maintenance and auditing of application policies.