Thankfully, Windows 11, Windows 10, and a few Server editions come with a built-in app called “AppLocker.” As the name suggests, this utility is used to lock away applications that you do not want the users to use. This can be done if you want to revoke access to authoritative apps, or simply prevent your employees from wasting time on things they should not be doing while at work. If you are looking for a native solution to block certain apps and programs on a computer, let us show you how.

What is AppLocker

AppLocker is a built-in utility for some Microsoft products, including some Windows and Server editions. It is used to control which apps and programs can run on your system, including executable (.exe) files, scripts, Windows Installer files, packaged applications (Microsoft Store apps), etc. AppLocker is used to define rules that allow or block the .exe or the .com files associated with the app. By default, since there are no rules configured, all applications are allowed to run normally. Below you will find a table that explains the default AppLocker rules:PurposeNameGroupPathAllow members of the local Administrators group access to run all executable files(Default Rule) All filesBUILTIN\AdministratorsAllAllow all users to run executable files in the Windows folder(Default Rule) All files located in the Windows folderEveryone%windir%*Allow all users to run executable files in the Program Files folder(Default Rule) All files located in the Program Files folderEveryone%programfiles%*Default AppLocker rules However, if you create an exception for one app, all others are blocked unless you make an exception for them too. Microsoft explains this in the following statement: With that said, there are additional steps you can take to mitigate the issue of all other applications being automatically blocked when creating a new rule in the AppLocker. This has been discussed in the steps given below to block an app.

How to Use AppLocker to Block Executable Files/Apps

Below is a step-by-step guide to configuring AppLocker to block an application from running on a computer: Note: This method uses the Local Security Policy/ Group Policy Editor, which is not available in Windows Home editions by default. Learn how to enable the Group Policy Editor or the Local Security Policy Editor in Windows Home. Note: This can also be done using the Group Policy Editor. Open it up by typing in gpedit.msc in Run, then navigate to the following using the left pane:Computer Configuration » Windows Settings » Security Settings » Application Control Policies » AppLockerThe next steps remain constant. You will now see that the rule has been added to the AppLocker.Rules added to AppLocker You can now repeat steps 9 through 15 to add more apps or folders to block. If you wish to allow an app or an entire folder again, simply navigate to the same location within the Local Security Policy/Group Policy Editor and delete the associated rules. Once the rule has been created, a user who is trying to access the blocked content will see the following prompt:

Closing Words

AppLocker is for those people who do not wish to use third-party applications but want to control which applications are used on their or their employee’s computers. Not only will it prevent other people from doing the tasks they are not permitted to do, but blocking apps that provide administrative rights to users will also enhance your overall security. Also see:

How To Block Or Allow Websites, IPs, Apps, And Ports Using Windows Firewall And PowerShellHow to Add Programs to Startup in Windows 11/102 ways to disable PowerShell in Windows 10How To Enable Group Policy Editor (gpedit.msc) In Windows 10 Home EditionHow to Manage App Execution Aliases in Windows