Application Control for Business (WDAC) will block any executable that is not within the trust scope defined by the active base policy plus any supplemental policies. Even when apps are:
- Deployed via Intune as a managed installer, and
- Signed by Microsoft (for example Visual Studio, Docker Desktop, SQL Server Management Studio),
they are still blocked if the WDAC/App Control for Business configuration does not actually grant trust from those sources.
Key areas to verify in the current configuration:
- Behavior for apps not explicitly trusted
In the App Control for Business policy, the behavior for all other apps and files that are not covered by rules is controlled by Enable trust of Windows components and store apps:- If this setting is Enabled, then anything not explicitly trusted by the policy is blocked from running.
- If this setting is set to Audit only, then those apps are only logged and not blocked. If this is set to Enabled and the additional trust options are not configured correctly, Microsoft‑signed apps like Visual Studio or SSMS can be blocked.
- Trust from managed installers
For apps deployed through Intune to be automatically allowed, the policy must explicitly trust the managed installer:- In the App Control for Business policy using Built‑in controls, under Select additional options for trusting apps, ensure Trust apps from managed installers is selected. This allows apps deployed through Intune (after the Intune Management Extension is configured as a managed installer) to run.
- If using custom XML, the WDAC policy must include the managed installer configuration as described in the managed installer guidance. Without this, Intune‑deployed apps are treated like any other untrusted code and can be blocked.
- Additional trust options
Still under Built‑in controls, consider enabling Trust apps with a good reputation. This uses the Microsoft Intelligent Security Graph to allow reputable apps that are otherwise not explicitly covered by the policy. If this is not enabled and the base policy is restrictive, some Microsoft‑signed desktop apps can be blocked. - Base vs supplemental policies
WDAC/App Control for Business evaluates the combination of the base policy and any supplemental policies, and the most restrictive result wins. To expand what is allowed:- Use one or more supplemental policies to extend the trust defined by the base policy. A supplemental policy can only expand a single base policy, but multiple supplementals can target the same base policy.
- Ensure each supplemental policy is in XML format and references the correct PolicyID of the base policy. If the supplemental policy is not correctly linked, its allow rules will not apply and the base policy’s more restrictive behavior will continue to block apps like Visual Studio, Docker Desktop, and SSMS.
- Confirm policy type and deployment
- If the App Control for Business policy is configured with Enter xml data and the XML is incomplete or overly restrictive (for example, only allowing a narrow set of publishers or paths), then Microsoft‑signed desktop apps can be blocked even though they are legitimate.
- Verify that the correct policy (base plus any supplementals) is actually assigned to the device groups in Intune and that devices have received and applied the latest version. WDAC policies apply at the device scope.
- Temporarily removing blocks while investigating
If it is necessary to ensure nothing is blocked while identifying the exact cause:- Deploy an updated WDAC/App Control for Business policy that effectively allows everything (for example, modeled on the
AllowAll.xmlexample at%windir%\schemas\CodeIntegrity\ExamplePolicies\AllowAll.xmlwith rules thatAllow /*). - After this updated policy is deployed and applied, delete the policy from the Intune portal. As documented, policies deleted from Intune remain in effect until the next reboot; after the reboot, with an allow‑all policy removed, no WDAC blocks remain.
- Deploy an updated WDAC/App Control for Business policy that effectively allows everything (for example, modeled on the
By checking these specific settings—especially Enable trust of Windows components and store apps, Trust apps from managed installers, and the linkage and content of any supplemental policies—it is possible to identify why Microsoft‑signed, Intune‑deployed apps are still being blocked and adjust the configuration so they are allowed.
References: