Do you have to restrict access to an app on Windows 10? Here’s how.

Spread the love
  • Yum

On Windows 10, the ability to disable access to specific applications can come in handy in many scenarios, like when you want to prevent users from launching built-in tools (such as PowerShell and Command Prompt), to run scripts, or make unwanted system changes. Maybe you need to set up an app that should only be accessible by you and no one else on the computer, or you installed the Microsoft 365 version of Office and since you can’t customize the installation, you need to restrict access to some of the best Windows apps to comply with your organization’s policies.

Whatever the reason it might be, if you must restrict access to some specific applications, Windows 10 includes at least two ways to disable them using Group Policy Editor or Security Policy console.

VPN Deals: Lifetime license for $16, monthly plans at $1 & more

In this Windows 10 guide, we will walk you through the steps to disable access to one or more desktop applications on your computer.

How to disable apps access using Group Policy

To disable access to certain apps on Windows 10 with Group Policy, use these steps:

  1. Open Start.
  2. Search for gpedit and click the top result to open the Local Group Policy Editor.
  3. Browse the following path:

    User Configuration > Administrative Templates > System

  4. On the right side, double-click the Don’t run specified Windows applications policy.

    User Configuration system settings

    Source: Windows Central

  5. Select the Enabled option.
  6. Click the Show button.

    Don't run specified Windows applications

    Source: Windows Central

  7. Confirm the names of the apps you want to block.

    Windows 10 Group Policy block apps

    Source: Windows Central

    Quick note: Only add one name per line. Also, you need to specify the “.exe” file. For example, to block Command Prompt, you would add cmd.exe and pwsh.exe to block the built-in version of PowerShell.

  8. Click the Apply. button 
  9. Click the OK button.

Once you complete the steps, the apps you specified should no longer be accessible by users configured on the device. The settings should apply immediately, but you may need to restart the computer for the changes to take effect in some cases.

You can always revert the changes using the same instructions, but on step 5, make sure to select the Not configured option.

These instructions will disable access to the apps for all users. However, you can also use the Local Group Policy Editor to apply the settings to one or multiple users while excluding the reset.

How to disable apps access using Security Policy

To prevent users from launching specific apps with the Local Security Policy, use these steps:

  1. Open Start.
  2. Search for Local Security Policy and click the top result to open the app.
  3. Double-click to expand the Software Restriction Policies branch.
  4. Right-click the Additional Rules category and select the New Hash Rule option.

    Local Security Policy new hash rule option

    Source: Windows Central

    Quick tip: If the category is not available, right-click the Software Restriction Policies branch and select the New Software Restriction Policies option.

  5. Click the Browse button.

    Windows 10 hash disable app access

    Source: Windows Central

  6. Browse to the location of the application folder.
  7. Select the main executable (.exe) file – for example, cmd.exe.

    Windows 10 Security Policy block Command Prompt

    Source: Windows Central

  8. Click the Open button.
  9. Click the Apply button.
  10. Click the OK button.
  11. Restart the computer.

After you complete the steps, users will no longer be able to launch the application you specified. You can always repeat the steps to block access to other desktop applications.

If you want to undo the changes, you can use the same instructions outlined above, but on steps 4, right-click the hash of the app currently blocked, and select the Delete option.

If you are disabling applications to prevent users from making system changes, you can use these instructions to restrict access to PowerShell or Command Prompt. You can also restrict access to the Task Manager and Registry.

Furthermore, you can try switching the account type to “Standard User” to prevent users from making system changes and make the account more secure. The only caveat with this approach is that users will still have access to apps like PowerShell and Command Prompt to perform some non-administrative tasks.

More Windows 10 resources

For more helpful articles, coverage, and answers to common questions about Windows 10, visit the following resources:

Leave a Reply

%d bloggers like this: