How to configure a local installer as a managed installer in WDAC policy

Li, Andrew (Ming) 1 Reputation point
2025-09-18T05:20:22.6+00:00

Hello everyone,

I wanted to deploy a WDAC policy on a medical device workstation to prevent malware. I used the WDAC Wizard and selected Default Windows Mode as the base policy, which worked fine. I then tried to install an application on my workstation, but WDAC blocked it. I added the installer's publisher to the WDAC policy and redeployed it. The installer launched, but failed because the PowerShell script it dropped was blocked. I found a managed installer configuration, which I thought was the right direction.

https://free.blessedness.top/en-us/windows/security/application-security/application-control/app-control-for-business/design/configure-authorized-apps-deployed-with-a-managed-installer

I added the local installer to the AppLocker configuration file and deployed the AppLocker policy, but encountered the following issues:

  1. The PowerShell script dropped by the installer was still blocked by WDAC.
  2. Some DLLs required for msiexec.exe to load were blocked by WDAC.

Adding "Disabled: Script Enforcement" to the WDAC policy file resolved issue 1.

Adding msiexec.exe as a managed executable in the AppLocker configuration resolved issue 2.

I'd like to know if there is any way to set up the installer as a managed installer simply by adding a code signature to the installer and ensure that the files and scripts dropped by the installer can also run.

Thanks,

Andrew

Windows for business | Windows Client for IT Pros | Devices and deployment | System management components
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Henry Mai 6,505 Reputation points Independent Advisor
    2025-09-18T09:40:46.5666667+00:00

    Hello Andrew, I am Henry and I want to share my insight about your issue.

    The relationship between AppLocker and WDAC is key. In this scenario, AppLocker is not used for enforcement. Its only job is to provide a list of trusted installers to the WDAC engine.

    1. You create an AppLocker rule that identifies your specific installer (e.g., YourInstaller.exe) based on its publisher signature.
    2. The Application Identity service (AppIDSvc) reads this rule and begins tracking your installer process when it runs.
    3. You enable the "Managed Installer" option in your WDAC policy.
    4. When WDAC sees a new file being created on disk (like a DLL or a PowerShell script), it checks if the parent process is being tracked by AppIDSvc.
    5. If it is, WDAC automatically trusts the new file without needing an explicit rule for it in your policy.

    To answer why Your Initial Attempts Failed

    • "Disabled: Script Enforcement" and "Making msiexec.exe a Managed Installer" are insecure workarounds that create large security holes. You were right to question them. Your goal is to trust your installer, not to disable script protection or trust every MSI on the system.

    Here is the step-by-step process you can refer to.

    Step 1: The entire process depends on this service. Use a GPO or Intune to set the AppIDSvc service to Automatic startup on your workstations.

    Step 2: Create a Targeted AppLocker Policy for Your Installer

    1. Open PowerShell as an Administrator on a machine with the installer.
    2. Run the following command to generate an AppLocker policy based on your installer's signature and merge it into the local policy. (Replace the path with your installer's location.) Get-AppLockerFileInformation -Path "C:\Path\To\YourInstaller.exe" | New-AppLockerPolicy -RuleType Exe -User Everyone -RuleName "Allow My Medical App Installer as a Managed Installer" -Optimize | Set-AppLockerPolicy -PolicyObject $_ -Merge
    3. You can then export this policy (Get-AppLockerPolicy -Local | Export-Clixml C:\Path\To\AppLocker.xml) to deploy it via GPO or Intune.

    Step 3: Enable the Managed Installer Option in Your WDAC Policy

    1. Run this command against your WDAC policy XML file: Set-RuleOption -FilePath "C:\Path\To\Your_WDAC_Policy.xml" -Option 13
    2. Verify that Rule Option 3 ("Disabled: Script Enforcement") is not enabled in your policy.

    Step 4: Deploy the new AppLocker policy and your updated WDAC policy (.cip file) to your workstations.

    I hope you’ll give my recommendation a try and let me know how it goes. And if this answer helps, feel free to hit “Accept Answer” so others can benefit too.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.