Understanding the AppLocker Policy Deployment Process
Updated: June 21, 2012
Applies To: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012
This planning and deployment topic describes the process to use AppLocker when deploying application control policies.
To successfully deploy AppLocker policies, you need to identify your application control objectives and construct the policies for those objectives. The key to the process is the accurate inventory of your organization's applications, which requires investigation with all the targeted business groups. With an accurate inventory, you can create rules and set enforcement criteria that will allow the organization to use the required applications and allow the IT department to manage a controlled set of applications.
The following diagram shows the main points in the design, planning, and deployment process for AppLocker.
Resources in support of the deployment process
The following documentation contains information about designing, planning, deploying, and maintaining AppLocker policies:
For information about the AppLocker policy design and planning requirements and process, see the AppLocker Policies Design Guide (https://go.microsoft.com/fwlink/?LinkId=215004).
For information about the AppLocker policy deployment requirements and process, see the AppLocker Policies Deployment Guide (https://go.microsoft.com/fwlink/?LinkId=160260).
For information about AppLocker policy maintenance and monitoring for Windows Server 2008 R2 and Windows 7, see the AppLocker Operations Guide (https://go.microsoft.com/fwlink/?LinkId=160259).
For information about AppLocker policy maintenance and monitoring for Windows Server 2012 and Windows 8, see Administering AppLocker.
For information about AppLocker policy architecture, components, and processing, see the AppLocker Technical Reference (https://go.microsoft.com/fwlink/?LinkId=160263).
See Also
Concepts
AppLocker Policies Design Guide
AppLocker Policies Deployment Guide