1490 words
7 minutes
Part 1: Introduction & Key Concepts

Mastering App Control for Business#

Part 1: Introduction & Key Concepts#


Table of Contents#

  1. Why Application Control Matters
  2. Key Use Cases
  3. How to Deploy App Control for Business
  4. Licensing & Device Requirements
  5. App Control for Business vs. AppLocker
  6. Key Features
  7. Benefits
  8. Policy Formats
  9. Policy Types
  10. Core Terminology

1. Why Application Control Matters#

Traditional security solutions are reactive — they respond after a threat has already executed. This creates a gap between detection and response that attackers actively exploit.

App Control for Business (ACfB) shifts the model from trust everything to trust must be earned. Every application, script, and driver must be verified as safe before it is permitted to run.

Implications#

  • Reduces the attack surface by preventing unauthorized code execution
  • Blocks malicious software before it can run — not after
  • Requires careful planning; misconfiguration can disrupt legitimate workloads

Implementation Recommendations#

#Recommendation
1Establish clear processes for application approval
2Standardize endpoint configurations across the organization
3Understand policy impact before rolling out organization-wide
4Enforce centralized endpoint control — limit user-driven software decisions
flowchart LR
    A[Application Executes] -->|Traditional| B[Antivirus Scans]
    B --> C{Known Threat?}
    C -->|Yes| D[Block / Quarantine]
    C -->|No| E[Allow — GAP EXPLOITED]
    A -->|App Control for Business| F{Trust Verified?}
    F -->|Approved & Trusted| G[Allow Execution]
    F -->|Unknown / Untrusted| H[Block — Zero Gap]
    style E fill:#7f1d1d,color:#fca5a5
    style H fill:#14532d,color:#86efac
    style G fill:#14532d,color:#86efac

2. Key Use Cases#

ACfB is particularly well-suited for the following environments:

  • Privileged Access Workstations (PAW) and administrative jump systems
  • Industrial control systems and OT/SCADA environments
  • Physical security systems — ATMs, cash machines, access control systems
  • Enterprise-wide enforcement where infrastructure is well-documented, software rollout is controlled, and endpoint management is mature
mindmap
  root((ACfB Use Cases))
    Privileged Access
      PAW Workstations
      Admin Jump Systems
    Industrial
      SCADA / OT Systems
      Control Systems
    Physical Security
      ATMs
      Cash Machines
      Entry Systems
    Enterprise Wide
      Controlled Software Rollout
      Strict Endpoint Management

3. How to Deploy App Control for Business#

Smart App Control (SAC) — Built-in, Unmanaged#

Windows 11 (22H2+) ships with Smart App Control (SAC), an automatic, unmanaged enforcement layer that evaluates application reputation using Microsoft’s Intelligent Security Graph (AI/ML-backed).

Important: SAC is disabled on systems upgraded from Windows 10 in-place. It is only active on clean installs of Windows 11.

SAC is powered by Code Integrity (CI), a Windows core component that enforces policy checks beginning at system boot — covering the kernel, drivers, and signed binaries.

Managed Deployment Options#

MethodRecommended
Microsoft IntuneYes (preferred)
PowerShellYes (scripted deployments)
Microsoft Configuration Manager (MECM)Limited built-in support
Group PolicyNot recommended

Rule Criteria Supported#

  • Code-signing certificate attributes
  • Binary metadata: filename, file version, file hash
  • Application reputation (Microsoft Intelligent Security Graph)
  • Managed installer trust (e.g., Intune, SCCM)
  • Execution path (Windows 10 1903+)
  • Initiating/parent process
flowchart TD
    A[App Control for Business] --> B{Deployment Method}
    B --> C[Microsoft Intune\nRECOMMENDED]
    B --> D[PowerShell\nCmdlets]
    B --> E[Group Policy\nNot Recommended]
    B --> F[MECM\nLimited Support]
    C --> G[XML Policy Upload\nor Binary .cip]
    D --> H[CiTool / Scripts]
    E --> I[SiPolicy.p7b]
    style C fill:#1e3a5f,color:#93c5fd
    style E fill:#3b1515,color:#fca5a5

4. Licensing & Device Requirements#

Supported Windows Editions#

Windows ProWindows EnterpriseWindows Pro Education/SEWindows Education
YesYesYesYes

License Entitlements#

Windows Pro/Pro Edu/SEEnterprise E3Enterprise E5Education A3Education A5
YesYesYesYesYes

Supported Device Configurations (via Intune)#

ConfigurationMinimum Version
Windows Enterprise / EducationWindows 10 v1903 or later; Windows 11
Windows ProfessionalWindows 10 with KB5019959; Windows 11 22H2 with KB5019980
Windows 11 SESupported (Education tenants only)
Azure Virtual Desktop (AVD)Supported; multi-session via Endpoint Security node
Co-managed devicesSet Endpoint Protection slider to Intune

An additional Intune license is required to deploy ACfB policies via Intune.

flowchart LR
    A[Windows Device] --> B{Edition?}
    B --> C[Pro / Pro Edu / SE]
    B --> D[Enterprise E3/E5]
    B --> E[Education A3/A5]
    C & D & E --> F{Enrolled in Intune?}
    F -->|Yes| G[Full ACfB Support]
    F -->|No| H[GPO / Script Only]
    G --> I{OS Version?}
    I -->|Win 10 1903+| J[Multi-Policy Format]
    I -->|Win 11| K[Full Feature Set]
    style G fill:#14532d,color:#86efac
    style J fill:#1e3a5f,color:#93c5fd
    style K fill:#1e3a5f,color:#93c5fd

5. App Control for Business vs. AppLocker#

CapabilityApp Control for BusinessAppLocker
Platform supportWindows 10, 11, Server 2016+Windows 8+
ManagementIntune, MECM, GPO, PowerShellGPO (primary), Intune (OMA-URI only)
Rule typesHash, Publisher, Path, File Properties, Reputation, Managed Installer, COMHash, Publisher, Path, File Properties (limited), Packaged Apps
Kernel-mode enforcementYesNo (user-mode only)
Multiple policiesYes (Windows 10 1903+)No — single active policy per system
Managed installer supportYesNo
Reputation-based intelligenceYes (Microsoft ISG)No
Path rule exclusionsNo — runtime user-writeability check enforcedYes
Script enforcementComprehensive (PowerShell, VBScript, JS)Basic (.exe, .com, .bat, .cmd)
AppID TaggingYesNo
MDE integrationStrongLimited
ComplexityHigh initial setup, robust long-termModerate setup, fewer controls

6. Key Features#

Execution Control#

Prevents unauthorized applications, scripts, and drivers from running. Only approved and trusted code executes. This eliminates the majority of initial attack vectors that rely on malicious file or script execution.

Virtualization-Based Security (VBS) Integration#

ACfB leverages VBS to create a protected isolation layer — Virtual Secure Mode (VSM) — within Windows. Security-critical operations occur inside VSM:

  • LSASS Protection — prevents credential dumping via code injection
  • Code Integrity Checks — validates applications before execution in hardware-isolated context

This makes it significantly harder for attackers to bypass Windows security controls even with elevated privileges.


7. Benefits#

Defense Against Advanced Threats and Zero-Days#

By blocking unapproved applications and scripts, ACfB reduces exposure to:

  • Unknown zero-day exploits
  • Fileless malware
  • Living-off-the-land (LotL) attack techniques

Regulatory Compliance Support#

ACfB helps organizations demonstrate compliance with frameworks including:

FrameworkRelevance
HIPAARestricts unauthorized software on systems handling PHI
PCI DSSControls execution environment for cardholder data systems
GDPRReduces risk of unauthorized data access via rogue applications

8. Policy Formats#

ACfB policies are XML-based files compiled to binary and enforced by Code Integrity.

Single Policy Format#

One policy file containing all rules.

  • Most compatible — works on all Windows 10 versions including Server 2016/2019+
  • Simpler to manage but less flexible
  • Analogous to a Local GPO

Storage locations:

EFI System Partition: \Microsoft\Boot\SiPolicy.p7b
OS Volume: \Windows\System32\CodeIntegrity\SiPolicy.p7b

Multiple Policy Format#

Combines a Base Policy with one or more Supplemental Policies.

  • Requires Windows 10 1903+ or Windows Server 2025
  • Supports up to 32 supplemental policies (April 2024 update removes this limit)
  • Analogous to Domain GPOs — layered, scoped control
  • Base Policy = trunk; Supplemental Policies = branches

Storage locations:

OS Volume: \Windows\System32\CodeIntegrity\CiPolicies\Active\{PolicyId GUID}.cip
EFI System Partition: \Microsoft\Boot\CiPolicies\Active\{PolicyId GUID}.cip

Signed Policies#

Policies can be cryptographically signed to prevent tampering or unauthorized removal. This is the most secure configuration but requires careful key management.

Signing details and management procedures will be covered in a future part of this series.

flowchart TD
    subgraph Single["Single Policy Format"]
        direction TB
        SP[SiPolicy.p7b\nOne file — all rules]
    end
    subgraph Multiple["Multiple Policy Format"]
        direction TB
        BP[Base Policy\nCore Rules + Deny List]
        SUP1[Supplemental Policy A\nVendor Apps]
        SUP2[Supplemental Policy B\nDev Tools]
        SUP3[Supplemental Policy N\n...]
        BP --> SUP1
        BP --> SUP2
        BP --> SUP3
    end
    Single -.->|Less flexible\nMax compatibility| RESULT[Policy Deployed\nto Endpoint]
    Multiple -.->|Flexible\nWin 10 1903+ only| RESULT
    style SP fill:#1c2330,color:#e6edf3
    style BP fill:#162032,color:#58a6ff
    style SUP1 fill:#1c2330,color:#e6edf3
    style SUP2 fill:#1c2330,color:#e6edf3
    style SUP3 fill:#1c2330,color:#e6edf3

9. Policy Types#

Base Policy#

  • Standalone — operates independently
  • Can contain both allow and deny rules
  • Multiple base policies can coexist on a single system

Supplemental Policy#

  • Cannot operate independently — extends a Base Policy
  • Can only add allow rules (no deny rules)
  • Deny rules in a base policy cannot be overridden by supplemental allow rules
  • Useful for scoping application exceptions without modifying the core base policy

AppID Tagging Policy#

  • Does not allow or block execution
  • Applies custom labels/tags to applications based on defined rules
  • Tags enable other systems (firewalls, compliance tools) to treat tagged apps differently
  • User-mode only; does not apply to kernel-mode files

Comparison Matrix#

FeatureBase PolicySupplemental PolicyAppID Tagging Policy
Can be standaloneYesNoYes
Can have deny rulesYesNoNo
Applies to kernel-mode filesYesYesNo
Can be signedYesYesYes
Removable without certificate (signed)NoYesNo
Supports audit modeYesNoNo
Supports enforcement modeYesYesNo
Typical audienceSecurity AdminsApp Owners / Project TeamsCompliance / Inventory
Impact if removed/corruptedHighMediumLow
flowchart TD
    BASE[Base Policy\nAllows + Denies\nStandalone] -->|extends| SUP[Supplemental Policy\nAllow rules only\nCannot standalone]
    BASE -.->|independent of| TAG[AppID Tagging Policy\nLabels only\nNo Allow/Deny]
    TAG --> FW[Windows Firewall\nProcess-scoped rules]
    TAG --> CM[Compliance Tools\nIdentity-aware policy]
    SUP --> BASE
    style BASE fill:#162032,color:#58a6ff,stroke:#2563eb
    style SUP fill:#1c2330,color:#a5b4fc
    style TAG fill:#1a1f0a,color:#86efac
    style FW fill:#1c2330,color:#e6edf3
    style CM fill:#1c2330,color:#e6edf3

10. Core Terminology#

TermDefinition
Policy ID (GUID)Unique identifier for every policy. No two policies can share the same ID on a system. Deploying a policy with an existing ID replaces the prior policy.
Audit ModePolicy is active but non-blocking. Events are logged for files that would have been blocked. Used for pre-enforcement validation and policy tuning.
Enforced ModeActive protection. Only explicitly approved files and code can execute. All else is blocked. Default state when audit mode is not specified.
Code Integrity (CI)The Windows subsystem responsible for enforcing ACfB policies. Runs checks at kernel boot for deep, early-stage protection.
Virtual Secure Mode (VSM)Hardware-isolated environment created by VBS. Security-critical operations (LSASS protection, code integrity checks) execute here.
Microsoft Intelligent Security Graph (ISG)AI/ML-powered reputation service used by SAC and ACfB to evaluate application trustworthiness.
Managed InstallerA trusted software deployment system (e.g., Intune, SCCM) whose installations are automatically trusted by ACfB policy.
ApplicationControl CSPThe Windows Configuration Service Provider used by Intune to deploy ACfB policies. Replaces the legacy AppLocker CSP.
sequenceDiagram
    participant Admin
    participant Policy as ACfB Policy
    participant CI as Code Integrity (CI)
    participant App as Application

    Admin->>Policy: Deploy in Audit Mode (Option 3)
    App->>CI: Requests execution
    CI->>Policy: Check rules
    Policy-->>CI: Would be blocked (audit)
    CI-->>App: ALLOW (audit — not blocked)
    CI->>Admin: Log Event 3034 (would-be block)
    Note over Admin: Review logs, tune rules
    Admin->>Policy: Remove Audit Mode → Enforce
    App->>CI: Requests execution
    CI->>Policy: Check rules
    Policy-->>CI: Not in allowlist
    CI-->>App: BLOCK — Event 3077 logged

Series Navigation#

PartTopic
Part 1Introduction & Key Concepts (this document)
Part 2Policy Templates & Rule Options
Part 3Application ID Tagging Policies & Managed Installer
Part 4(forthcoming)
Part 5(forthcoming)
Part 6Sign, Apply, and Remove Signed Policies
Part 7Maintaining Policies with Azure DevOps (or PowerShell)

Document compiled by Anubhav from source material published at ctrlshiftenter.cloud.
Original author: Patrick Seltmann. For organizational reference use.

Part 1: Introduction & Key Concepts
https://mranv.pages.dev/posts/app-control-part-1-introduction-keyconcepts/
Author
Anubhav Gain
Published at
2026-05-01
License
CC BY-NC-SA 4.0