Share via

Problems with WDAC and apps blocked

David Rivera 10 Reputation points
2026-04-02T10:55:12.4566667+00:00

We have WDAC configured and applications deployed through Managed Installer (Intune) and signed by Microsoft are being blocked by Application Control for Business (such as Visual Studio, Docker Desktop, and SQL Server Management Studio). We have reviewed the WDAC configuration and everything appears to be correct, but we do not know the source of the application blocking.

Windows for business | Windows Client for IT Pros | Devices and deployment | Set up, install, or upgrade

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-02T10:58:29.6666667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Application Control for Business (WDAC) will block any executable that is not within the trust scope defined by the active base policy plus any supplemental policies. Even when apps are:

    • Deployed via Intune as a managed installer, and
    • Signed by Microsoft (for example Visual Studio, Docker Desktop, SQL Server Management Studio),

    they are still blocked if the WDAC/App Control for Business configuration does not actually grant trust from those sources.

    Key areas to verify in the current configuration:

    1. Behavior for apps not explicitly trusted
      In the App Control for Business policy, the behavior for all other apps and files that are not covered by rules is controlled by Enable trust of Windows components and store apps:
      • If this setting is Enabled, then anything not explicitly trusted by the policy is blocked from running.
      • If this setting is set to Audit only, then those apps are only logged and not blocked. If this is set to Enabled and the additional trust options are not configured correctly, Microsoft‑signed apps like Visual Studio or SSMS can be blocked.
    2. Trust from managed installers
      For apps deployed through Intune to be automatically allowed, the policy must explicitly trust the managed installer:
      • In the App Control for Business policy using Built‑in controls, under Select additional options for trusting apps, ensure Trust apps from managed installers is selected. This allows apps deployed through Intune (after the Intune Management Extension is configured as a managed installer) to run.
      • If using custom XML, the WDAC policy must include the managed installer configuration as described in the managed installer guidance. Without this, Intune‑deployed apps are treated like any other untrusted code and can be blocked.
    3. Additional trust options
      Still under Built‑in controls, consider enabling Trust apps with a good reputation. This uses the Microsoft Intelligent Security Graph to allow reputable apps that are otherwise not explicitly covered by the policy. If this is not enabled and the base policy is restrictive, some Microsoft‑signed desktop apps can be blocked.
    4. Base vs supplemental policies
      WDAC/App Control for Business evaluates the combination of the base policy and any supplemental policies, and the most restrictive result wins. To expand what is allowed:
      • Use one or more supplemental policies to extend the trust defined by the base policy. A supplemental policy can only expand a single base policy, but multiple supplementals can target the same base policy.
      • Ensure each supplemental policy is in XML format and references the correct PolicyID of the base policy. If the supplemental policy is not correctly linked, its allow rules will not apply and the base policy’s more restrictive behavior will continue to block apps like Visual Studio, Docker Desktop, and SSMS.
    5. Confirm policy type and deployment
      • If the App Control for Business policy is configured with Enter xml data and the XML is incomplete or overly restrictive (for example, only allowing a narrow set of publishers or paths), then Microsoft‑signed desktop apps can be blocked even though they are legitimate.
      • Verify that the correct policy (base plus any supplementals) is actually assigned to the device groups in Intune and that devices have received and applied the latest version. WDAC policies apply at the device scope.
    6. Temporarily removing blocks while investigating
      If it is necessary to ensure nothing is blocked while identifying the exact cause:
      • Deploy an updated WDAC/App Control for Business policy that effectively allows everything (for example, modeled on the AllowAll.xml example at %windir%\schemas\CodeIntegrity\ExamplePolicies\AllowAll.xml with rules that Allow /*).
      • After this updated policy is deployed and applied, delete the policy from the Intune portal. As documented, policies deleted from Intune remain in effect until the next reboot; after the reboot, with an allow‑all policy removed, no WDAC blocks remain.

    By checking these specific settings—especially Enable trust of Windows components and store apps, Trust apps from managed installers, and the linkage and content of any supplemental policies—it is possible to identify why Microsoft‑signed, Intune‑deployed apps are still being blocked and adjust the configuration so they are allowed.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.