You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: This article explains the features of Windows using Windows Defender Application Control (WDAC) that can be used to secure your PowerShell environment.
3
-
ms.date: 09/19/2024
4
-
title: Use Windows Defender Application Control to secure PowerShell
2
+
description: This article explains the features of Application Control that can be used to secure your PowerShell environment.
3
+
ms.date: 10/21/2024
4
+
title: Use App Control to secure PowerShell
5
5
---
6
-
# Use Windows Defender Application Control to secure PowerShell
6
+
# Use App Control to secure PowerShell
7
7
8
-
Windows 10 includes two technologies, [Windows Defender Application Control (WDAC)][04] and
9
-
[AppLocker][01]that you can use to control applications. They allow you to create a lockdown
10
-
experience to help secure your PowerShell environment.
8
+
Windows 10 includes two technologies, [App Control for Business][04] and[AppLocker][01],
9
+
that you can use to control applications. They allow you to create a lockdown experience to help
10
+
secure your PowerShell environment.
11
11
12
12
**AppLocker** builds on the application control features of Software Restriction Policies. AppLocker
13
13
allows you to create rules to allow or deny apps for specific users or groups. You identify the apps
14
14
based on unique properties of the files.
15
15
16
-
**WDAC**, introduced with Windows 10, allows you to control which drivers and applications are
17
-
allowed to run on Windows.
16
+
**Application Control for Business**, introduced in Windows 10 as Windows Defender Application
17
+
Control (WDAC), allows you to control which drivers and applications are allowed to run on Windows.
18
18
19
19
## Lockdown policy detection
20
20
21
-
PowerShell detects both AppLocker and WDAC system wide policies. AppLocker doesn't have way to query
22
-
the policy enforcement status. To detect if a system wide application control policy is being
23
-
enforced by AppLocker, PowerShell creates two temporary files and tests if they can be executed. The
24
-
filenames use the following name format:
21
+
PowerShell detects both AppLocker and App Control for Business system wide policies. AppLocker
22
+
doesn't have way to query the policy enforcement status. To detect if a system wide application
23
+
control policy is being enforced by AppLocker, PowerShell creates two temporary files and tests if
24
+
they can be executed. The filenames use the following name format:
0 commit comments