Hi Levi Folk,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
A user at my company has temporary Local Device Admin, but it being blocked from installing software on his laptop with the following message. "This app has been blocked by your system administrator." I checked and we have no App Protection policies and this is a new issue. Until recently local device admin allowed users to install software.
Dear Levi Folk,
Having Local Administrator privileges allows a user to modify system files, but it does not bypass system-wide execution controls or application deployment policies. When Windows displays the specific message that an app was blocked by the system administrator, it indicates that an execution policy like AppLocker, Windows Defender Application Control, or a packaged app restriction is enforcing a hard block at the system level. This effectively overrides the user's local administrative token. You should first determine if the user is trying to install a modern packaged app or a traditional executable.
For modern MSIX or AppX packages, installation is governed by deployment policies rather than standard file permissions. You can investigate this by checking the registry key at HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx. Ensure the AllowAllTrustedApps value is set to 1. If this registry value is restricted, it prevents these installations for everyone in the environment, regardless of their local privileges.
If the user is installing traditional executables, Application Control policies like AppLocker or Windows Defender Application Control are the most likely culprits. AppLocker will actively deny the execution of unrecognized installers and throw this exact error message. You can verify this by checking the Event Viewer under Applications and Services Logs, Microsoft, Windows, AppLocker, and reviewing the EXE and DLL or MSI and Script logs for event ID 8004, which indicates an execution block. Even if you have not explicitly configured this globally, a local policy or a newly applied endpoint security baseline might have activated default rules under the registry path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\SrpV2.
It is also worth reviewing your environment's User Account Control configurations. Aggressive elevation restrictions, such as silently denying elevation requests for administrators, can manifest as a hard block during software installations. You can check the ConsentPromptBehaviorAdmin registry DWORD under HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System to ensure it is not set to zero, which denies elevation requests without prompting. Auditing these execution and deployment policies will help you identify the conflict and restore the user's ability to install software.
Hope this answer brought you some useful information. If it did, please hit "accept answer". Should you have any questions, feel free to leave a comment.
VP
The message “This app has been blocked by your system administrator” when installing or starting apps is typically caused by application control or MSIX/app installation policies, not by local admin rights alone.
In this scenario, even though the user is a local administrator, one of the following is likely true:
BlockNonAdminUserInstallAllowAllTrustedAppsAllowDevelopmentWithoutDevLicenseAllowAllTrustedApps is disabled, installation of trusted apps (like new Outlook or new Teams) fails even for admins. Recommended checks for the affected device:
gpedit.msc).Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlockComputer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppxAllowAllTrustedApps is disabled in these locations, MSIX installs (for example, new Outlook or new Teams) will be blocked. Recent Windows cumulative updates (KB5031455 and later) address a specific issue where disabling AllowAllTrustedApps caused failures, but if the policy is intentionally disabled, the block remains by design.Summary of actions for the admin:
BlockNonAdminUserInstall, AllowAllTrustedApps, and AllowDevelopmentWithoutDevLicense under the documented keys.Once the relevant AppLocker or MSIX-related policies are corrected, local device admins will again be able to install software as before.
References: