Bewerken

Delen via


Policy CSP - ApplicationManagement

AllowAllTrustedApps

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowAllTrustedApps

This policy setting allows you to manage the installation of trusted line-of-business (LOB) or developer-signed packaged Microsoft Store apps.

  • If you enable this policy setting, you can install any LOB or developer-signed packaged Microsoft Store app (which must be signed with a certificate chain that can be successfully validated by the local computer).

  • If you disable or don't configure this policy setting, you can't install LOB or developer-signed packaged Microsoft Store apps.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 65535

Allowed values:

Value Description
0 Explicit deny.
1 Explicit allow unlock.
65535 (Default) Not configured.

Group policy mapping:

Name Value
Name AppxDeploymentAllowAllTrustedApps
Friendly Name Allow all trusted apps to install
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\Appx
Registry Value Name AllowAllTrustedApps
ADMX File Name AppxPackageManager.admx

AllowAppStoreAutoUpdate

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowAppStoreAutoUpdate

Specifies whether automatic update of apps from Microsoft Store are allowed. Most restricted value is 0.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 2

Allowed values:

Value Description
0 Not allowed.
1 Allowed.
2 (Default) Not configured.

Group policy mapping:

Name Value
Name DisableAutoInstall
Friendly Name Turn off Automatic Download and Install of updates
Location Computer Configuration
Path Windows Components > Store
Registry Key Name Software\Policies\Microsoft\WindowsStore
Registry Value Name AutoDownload
ADMX File Name WindowsStore.admx

AllowAutomaticAppArchiving

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 11, version 21H2 [10.0.22000] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowAutomaticAppArchiving

This policy setting controls whether the system can archive infrequently used apps.

  • If you enable this policy setting, then the system will periodically check for and archive infrequently used apps.

  • If you disable this policy setting, then the system won't archive any apps.

  • If you don't configure this policy setting (default), then the system will follow default behavior, which is to periodically check for and archive infrequently used apps, and the user will be able to configure this setting themselves.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 65535

Allowed values:

Value Description
0 Explicit deny.
1 Explicit enable.
65535 (Default) Not configured. User's Choice.

Group policy mapping:

Name Value
Name AllowAutomaticAppArchiving
Friendly Name Archive infrequently used apps
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\Appx
Registry Value Name AllowAutomaticAppArchiving
ADMX File Name AppxPackageManager.admx

AllowDeveloperUnlock

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowDeveloperUnlock

Allows or denies development of Microsoft Store applications and installing them directly from an IDE.

  • If you enable this setting and enable the "Allow all trusted apps to install" Group Policy, you can develop Microsoft Store apps and install them directly from an IDE.

  • If you disable or don't configure this setting, you can't develop Microsoft Store apps or install them directly from an IDE.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 65535

Allowed values:

Value Description
0 Explicit deny.
1 Explicit allow unlock.
65535 (Default) Not configured.

Group policy mapping:

Name Value
Name AllowDevelopmentWithoutDevLicense
Friendly Name Allows development of packaged Microsoft Store apps and installing them from an integrated development environment (IDE)
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\Appx
Registry Value Name AllowDevelopmentWithoutDevLicense
ADMX File Name AppxPackageManager.admx

AllowGameDVR

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowGameDVR

Windows Game Recording and Broadcasting.

This setting enables or disables the Windows Game Recording and Broadcasting features. If you disable this setting, Windows Game Recording won't be allowed.

If the setting is enabled or not configured, then Recording and Broadcasting (streaming) will be allowed.

Note

 The policy is only enforced in Windows 10 for desktop.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Not allowed.
1 (Default) Allowed.

Group policy mapping:

Name Value
Name AllowGameDVR
Friendly Name Enables or disables Windows Game Recording and Broadcasting
Location Computer Configuration
Path Windows Components > Windows Game Recording and Broadcasting
Registry Key Name Software\Policies\Microsoft\Windows\GameDVR
Registry Value Name AllowGameDVR
ADMX File Name GameDVR.admx

AllowSharedUserAppData

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowSharedUserAppData

Manages a Windows app's ability to share data between users who have installed the app.

  • If you enable this policy, a Windows app can share app data with other instances of that app. Data is shared through the SharedLocal folder. This folder is available through the Windows. Storage API.

  • If you disable this policy, a Windows app can't share app data with other instances of that app. If this policy was previously enabled, any previously shared app data will remain in the SharedLocal folder.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Prevented/not allowed, but Microsoft Edge downloads book files to a per-user folder for each user.
1 Allowed. Microsoft Edge downloads book files into a shared folder. For this policy to work correctly, you must also enable the Allow a Windows app to share application data between users group policy. Also, the users must be signed in with a school or work account.

Group policy mapping:

Name Value
Name AllowSharedLocalAppData
Friendly Name Allow a Windows app to share application data between users
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\CurrentVersion\AppModel\StateManager
Registry Value Name AllowSharedLocalAppData
ADMX File Name AppxPackageManager.admx

AllowStore

Note

This policy is deprecated and may be removed in a future release.

Scope Editions Applicable OS
✅ Device
❌ User
Not applicable ✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/AllowStore

This policy is deprecated.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 1

Allowed values:

Value Description
0 Disallow.
1 (Default) Allow.

ApplicationRestrictions

Note

This policy is deprecated and may be removed in a future release.

Scope Editions Applicable OS
✅ Device
❌ User
Not applicable ✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/ApplicationRestrictions

This policy is deprecated.

Description framework properties:

Property name Property value
Format chr (string)
Access Type Add, Delete, Get, Replace

BlockNonAdminUserInstall

Scope Editions Applicable OS
✅ Device
❌ User
❌ Pro
✅ Enterprise
✅ Education
❌ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 2004 [10.0.19041] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/BlockNonAdminUserInstall

Manages non-Administrator users' ability to install Windows app packages.

  • If you enable this policy, non-Administrators will be unable to initiate installation of Windows app packages. Administrators who wish to install an app will need to do so from an Administrator context (for example, an Administrator PowerShell window). All users will still be able to install Windows app packages via the Microsoft Store, if permitted by other policies.

  • If you disable or don't configure this policy, all users will be able to initiate installation of Windows app packages.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Disabled. All users will be able to initiate installation of Windows app packages.
1 Enabled. Non-administrator users won't be able to initiate installation of Windows app packages.

Group policy mapping:

Name Value
Name BlockNonAdminUserInstall
Friendly Name Prevent non-admin users from installing packaged Windows apps
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\Appx
Registry Value Name BlockNonAdminUserInstall
ADMX File Name AppxPackageManager.admx

DisableStoreOriginatedApps

Scope Editions Applicable OS
✅ Device
❌ User
❌ Pro
✅ Enterprise
✅ Education
❌ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1607 [10.0.14393] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/DisableStoreOriginatedApps

Disable turns off the launch of all apps from the Microsoft Store that came pre-installed or were downloaded. Apps won't be updated. Your Store will also be disabled. Enable turns all of it back on. This setting applies only to Enterprise and Education editions of Windows.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Enable launch of apps.
1 Disable launch of apps.

Group policy mapping:

Name Value
Name DisableStoreApps
Friendly Name Disable all apps from Microsoft Store
Location Computer Configuration
Path Windows Components > Store
Registry Key Name Software\Policies\Microsoft\WindowsStore
Registry Value Name DisableStoreApps
ADMX File Name WindowsStore.admx

LaunchAppAfterLogOn

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1809 [10.0.17763] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/LaunchAppAfterLogOn

List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are to be launched after logon.

This policy allows the IT admin to specify a list of applications that users can run after logging on to the device.

Note

This policy only works on modern apps.

Description framework properties:

Property name Property value
Format chr (string)
Access Type Add, Delete, Get, Replace
Allowed Values List (Delimiter: ;)

For this policy to work, the Windows apps need to declare in their manifest that they'll use the startup task.

Example:

<desktop:Extension Category="windows.startupTask">
   <desktop:StartupTask TaskId="CoffeeStartupTask" Enabled="true" DisplayName="ms-resource:Description" />
</desktop:Extension>

MSIAllowUserControlOverInstall

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1803 [10.0.17134] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/MSIAllowUserControlOverInstall

This policy setting permits users to change installation options that typically are available only to system administrators.

  • If you enable this policy setting, some of the security features of Windows Installer are bypassed. It permits installations to complete that otherwise would be halted due to a security violation.

  • If you disable or don't configure this policy setting, the security features of Windows Installer prevent users from changing installation options typically reserved for system administrators, such as specifying the directory to which files are installed.

If Windows Installer detects that an installation package has permitted the user to change a protected option, it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user.

This policy setting is designed for less restrictive environments. It can be used to circumvent errors in an installation program that prevents software from being installed.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Disabled.
1 Enabled.

Group policy mapping:

Name Value
Name EnableUserControl
Friendly Name Allow user control over installs
Location Computer Configuration
Path Windows Components > Windows Installer
Registry Key Name Software\Policies\Microsoft\Windows\Installer
Registry Value Name EnableUserControl
ADMX File Name MSI.admx

MSIAlwaysInstallWithElevatedPrivileges

Scope Editions Applicable OS
✅ Device
✅ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1803 [10.0.17134] and later
./User/Vendor/MSFT/Policy/Config/ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges

This policy setting directs Windows Installer to use elevated permissions when it installs any program on the system.

  • If you enable this policy setting, privileges are extended to all programs. These privileges are usually reserved for programs that have been assigned to the user (offered on the desktop), assigned to the computer (installed automatically), or made available in Add or Remove Programs in Control Panel. This profile setting lets users install programs that require access to directories that the user might not have permission to view or change, including directories on highly restricted computers.

  • If you disable or don't configure this policy setting, the system applies the current user's permissions when it installs programs that a system administrator doesn't distribute or offer.

Note

This policy setting appears both in the Computer Configuration and User Configuration folders. To make this policy setting effective, you must enable it in both folders.

Caution

Skilled users can take advantage of the permissions this policy setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this policy setting isn't guaranteed to be secure.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Disabled.
1 Enabled.

Group policy mapping:

Name Value
Name AlwaysInstallElevated
Friendly Name Always install with elevated privileges
Location Computer and User Configuration
Path Windows Components > Windows Installer
Registry Key Name Software\Policies\Microsoft\Windows\Installer
Registry Value Name AlwaysInstallElevated
ADMX File Name MSI.admx

RequirePrivateStoreOnly

Scope Editions Applicable OS
✅ Device
✅ User
❌ Pro
✅ Enterprise
✅ Education
❌ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1607 [10.0.14393] and later
./User/Vendor/MSFT/Policy/Config/ApplicationManagement/RequirePrivateStoreOnly
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/RequirePrivateStoreOnly

Denies access to the retail catalog in the Microsoft Store, but displays the private store.

  • If you enable this setting, users won't be able to view the retail catalog in the Microsoft Store, but they will be able to view apps in the private store.

  • If you disable or don't configure this setting, users can access the retail catalog in the Microsoft Store.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Allow both public and Private store.
1 Only Private store is enabled.

Group policy mapping:

Name Value
Name RequirePrivateStoreOnly
Friendly Name Only display the private store within the Microsoft Store
Location Computer and User Configuration
Path Windows Components > Store
Registry Key Name Software\Policies\Microsoft\WindowsStore
Registry Value Name RequirePrivateStoreOnly
ADMX File Name WindowsStore.admx

RestrictAppDataToSystemVolume

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/RestrictAppDataToSystemVolume

Prevent users' app data from moving to another location when an app is moved or installed on another location.

  • If you enable this setting, all users' app data will stay on the system volume, regardless of where the app is installed.

  • If you disable or don't configure this setting, then when an app is moved to a different volume, the users' app data will also move to this volume.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Not restricted.
1 Restricted.

Group policy mapping:

Name Value
Name RestrictAppDataToSystemVolume
Friendly Name Prevent users' app data from being stored on non-system volumes
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\Appx
Registry Value Name RestrictAppDataToSystemVolume
ADMX File Name AppxPackageManager.admx

RestrictAppToSystemVolume

Scope Editions Applicable OS
✅ Device
❌ User
✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1507 [10.0.10240] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/RestrictAppToSystemVolume

This policy setting allows you to manage installing Windows apps on additional volumes such as secondary partitions, USB drives, or SD cards.

  • If you enable this setting, you can't move or install Windows apps on volumes that aren't the system volume.

  • If you disable or don't configure this setting, you can move or install Windows apps on other volumes.

Description framework properties:

Property name Property value
Format int
Access Type Add, Delete, Get, Replace
Default Value 0

Allowed values:

Value Description
0 (Default) Not restricted.
1 Restricted.

Group policy mapping:

Name Value
Name DisableDeploymentToNonSystemVolumes
Friendly Name Disable installing Windows apps on non-system volumes
Location Computer Configuration
Path Windows Components > App Package Deployment
Registry Key Name Software\Policies\Microsoft\Windows\Appx
Registry Value Name RestrictAppToSystemVolume
ADMX File Name AppxPackageManager.admx

ScheduleForceRestartForUpdateFailures

Scope Editions Applicable OS
✅ Device
❌ User
❌ Pro
✅ Enterprise
✅ Education
❌ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC
✅ Windows 10, version 1809 [10.0.17763] and later
./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/ScheduleForceRestartForUpdateFailures

To ensure apps are up-to-date, this policy allows the admins to set a recurring or one time date to restart apps whose update failed due to the app being in use allowing the update to be applied. Value type is string.

Description framework properties:

Property name Property value
Format chr (string)
Access Type Add, Delete, Get, Replace

Allowed values:


Expand to see schema XML
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
  <xs:simpleType name="recurrence" final="restriction">
    <xs:restriction base="xs:string">
      <xs:enumeration value="None" />
      <xs:enumeration value="Daily" />
      <xs:enumeration value="Weekly" />
      <xs:enumeration value="Monthly" />
    </xs:restriction>
  </xs:simpleType>
  <xs:simpleType name="daysOfWeek" final="restriction">
    <xs:restriction base="xs:unsignedByte">
      <xs:minInclusive value="1" />
      <xs:maxInclusive value="127" />
    </xs:restriction>
  </xs:simpleType>
  <xs:simpleType name="daysOfMonth" final="restriction">
    <xs:restriction base="xs:unsignedInt">
      <xs:minInclusive value="1" />
    </xs:restriction>
  </xs:simpleType>
  <xs:element name="ForceRestart">
    <xs:complexType>
      <xs:attribute name="StartDateTime" type="xs:dateTime" use="required" />
      <xs:attribute name="Recurrence" type="recurrence" use="required" />
      <xs:attribute name="RunIfTaskIsMissed" type="xs:boolean" use="required" />
      <xs:attribute name="DaysOfWeek" type="daysOfWeek" />
      <xs:attribute name="DaysOfMonth" type="daysOfMonth" />
    </xs:complexType>
  </xs:element>
</xs:schema>

Example:

<SyncML xmlns="SYNCML:SYNCML1.1">
  <SyncBody>
    <Add>
      <CmdID>2</CmdID>
      <Item>
        <Target>
          <LocURI> ./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/ScheduleForceRestartForUpdateFailures
          </LocURI>
        </Target>
        <Meta>
          <Format xmlns="syncml:metinf">xml</Format>
        </Meta>
        <Data>
          <ForceRestart StartDateTime="2018-03-28T22:21:52Z"
                        Recurrence="[None/Daily/Weekly/Monthly]"
                        DayOfWeek=”1”
                        DayOfMonth=”12”
                        RunIfTaskIsMissed=”1”/>
        </Data>
      </Item>
    </Add>
  </SyncBody>
</SycnML>

Note

The check for recurrence is done in a case sensitive manner. For instance the value needs to be "Daily" instead of "daily". The wrong case will cause SmartRetry to fail to execute.

Policy configuration service provider