Intune

How to Block App Installations via Intune

Published 18 March 2026 · 8 min read

Preventing users from installing unauthorised software is a key part of endpoint hardening. Intune gives you several tools to do this: Device Restrictions to block the Microsoft Store, AppLocker for rule-based allow/deny lists, and Windows Defender Application Control (WDAC) for modern kernel-enforced application control. This guide covers all three approaches and when to use each.

Three approaches to blocking apps

📊
App blocking methods comparison
Device Restrictions - Store blockQuick win - good for blocking consumer Store apps
Blocks Microsoft Store app installs
Standard user accountsBase layer - effective but users can still install user-scope apps
Prevents .exe install prompts without admin elevation
AppLockerGood for Enterprise/Education - requires Intune OMA-URI config
Rule-based allow/deny list for executables
WDAC (Windows Defender Application Control)Best security posture - works on all editions, Intune native support
Kernel-enforced allow/deny - modern replacement for AppLocker

Block the Microsoft Store

Devices → Configuration → + Create → Windows 10 and later → Templates → Device Restrictions

Under App Store:

⚙️
App Store restrictions
Block Microsoft StorePrevents installing new apps from the Store
Yes
Auto-update apps from storeAlso block silent background updates from Store
Block
All trusted appsPrevents sideloading of unsigned MSIX packages
Block

AppLocker via Intune

AppLocker is deployed via Intune using a custom OMA-URI with an AppLocker XML policy. It requires Windows Enterprise or Education.

# OMA-URI for AppLocker
./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/{Group}/EXE/Policy

# Example AppLocker XML - block a specific app
<AppLockerPolicy Version="1">
  <RuleCollection Type="Exe" EnforcementMode="Enabled">
    <FilePublisherRule Id="..." Name="Block TorBrowser" UserOrGroupSid="S-1-1-0" Action="Deny">
      <Conditions>
        <FilePublisherCondition PublisherName="*TorProject*" ProductName="*" BinaryName="*" />
      </Conditions>
    </FilePublisherRule>
  </RuleCollection>
</AppLockerPolicy>

Windows Defender Application Control (WDAC)

Endpoint Security → Attack Surface Reduction → + Create Policy → Windows 10 and later → App and Browser Control (WDAC)

WDAC is the recommended modern approach. Intune supports deploying WDAC policies natively via the Endpoint Security blade.

For a managed installer policy that allows apps deployed via Intune while blocking everything else:

# PowerShell - create a base WDAC policy allowing only Intune-deployed apps
New-CIPolicy -ScanPath "C:\Program Files" -Level Publisher -FilePath "C:\WDACPolicy.xml"
Set-RuleOption -FilePath "C:\WDACPolicy.xml" -Option 13  # Enable managed installer
ConvertFrom-CIPolicy -XmlFilePath "C:\WDACPolicy.xml" -BinaryFilePath "C:\WDACPolicy.bin"

Preventing Win32 installs via standard user accounts

The simplest control is ensuring users run as standard users rather than local admins. When a user without admin rights tries to run an installer that requires elevation, Windows prompts for admin credentials. Without them, the install fails.

Combine this with Intune's LAPS for local admin password management and you have a solid base layer before adding AppLocker or WDAC on top.

Frequently Asked Questions

Q: How do I prevent users from installing apps via Intune?

Use a Device Restrictions profile in Intune. Under App Store settings, enable "Block all Microsoft Store app" to prevent Store installs, and use AppLocker or WDAC policies to block Win32 app installations for non-admin users.

Q: What is the difference between AppLocker and WDAC for blocking apps?

AppLocker is the older solution - simpler to configure but requires Enterprise/Education edition. Windows Defender Application Control (WDAC) is the modern replacement - works on all editions, is more secure (kernel-enforced), and is configurable via Intune. For new deployments, use WDAC.

Q: Can I block specific apps rather than all apps?

Yes. With WDAC or AppLocker you can create deny rules for specific apps by publisher, file hash, or file path. Intune WDAC policies support publisher rules which are the most maintainable - block a specific vendor or app name without needing to update the policy every version update.

Q: Will blocking app installations affect existing installed apps?

Blocking future installations does not affect apps already installed. Existing apps continue to run. WDAC enforcement only prevents new execution of blocked apps - it does not remove existing installations.

Related Guides
-> Enable LAPS-> Custom Compliance-> Cyber Essentials
// need intune set up properly?
Fixed-price Intune setup for UK businesses

I set up Intune for UK small businesses at a fixed price - app deployment, compliance policies, Conditional Access, and full documentation.

View Packages