Allows IT Admins to control whether users are allowed to install apps from places other than the Store.
Note
This policy will block installation only while the device is online. To block offline installation too, SmartScreen/PreventOverrideForFilesInShell and SmartScreen/EnableSmartScreenInShell policies should also be enabled. This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.
Note
This policy will block installation only while the device is online. To block offline installation too, SmartScreen/PreventOverrideForFilesInShell and SmartScreen/EnableSmartScreenInShell policies should also be enabled.
This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
1
Turns on Application Installation Control, allowing users to only install apps from the Store.
2
Turns on Application Installation Control, letting users know that there's a comparable app in the Store.
3
Turns on Application Installation Control, warning users before installing apps from outside the Store.
Group policy mapping:
Name
Value
Name
ConfigureAppInstallControl
Friendly Name
Configure App Install Control
Location
Computer Configuration
Path
Windows Components > Windows Defender SmartScreen > Explorer
As an Information Security Administrator, you plan and implement information security of sensitive data by using Microsoft Purview and related services. You’re responsible for mitigating risks by protecting data inside collaboration environments that are managed by Microsoft 365 from internal and external threats and protecting data used by AI services. You also implement information protection, data loss prevention, retention, insider risk management, and manage information security alerts and activities.