Deploy the AppLocker Policy into Production
Updated: May 23, 2012
Applies To: Windows 7, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2012, Windows 8
This topic for the IT professional describes the tasks that should be completed before you deploy AppLocker application control settings.
After successfully testing and modifying the AppLocker policy for each Group Policy Object (GPO), you are ready to deploy the enforcement settings into production. For most organizations, this means switching the AppLocker enforcement setting from Audit only to Enforce rules. However, it is important to follow the deployment plan that you created earlier. For more information, see the AppLocker Policies Design Guide. Depending on the needs of different business groups in your organization, you might deploy different enforcement settings for linked GPOs.
Before you deploy an AppLocker policy, you should determine:
For each business group, which applications will be controlled and in what manner. For more information, see Create List of Applications Deployed to Each Business Group.
How to handle requests for application access. For information about what to consider when developing your support policies, see Plan for AppLocker Policy Management.
How to manage events, including forwarding events. For information about event management in AppLocker, see Monitor Application Usage with AppLocker.
Your GPO structure, including how to include policies generated by Software Restriction Policies and AppLocker policies. For more information, see Determine Group Policy Structure and Rule Enforcement.
For information about how AppLocker deployment is dependent on design decisions, see Understand AppLocker Policy Design Decisions.
If you have configured a reference computer, you can create and update your AppLocker policies on this computer, test the policies, and then export the policies to the appropriate GPO for distribution. Another method is to create the policies and set the enforcement setting on Audit only, then observe the events that are generated.
This topic describes the steps to use an AppLocker reference computer to prepare application control policies for deployment by using Group Policy or other means.
This topic describes the steps to deploy the AppLocker policy by changing the enforcement setting to Audit only or to Enforce rules.