When you manage Windows devices in your organization with Windows device management, you can restrict which apps are allowed on those devices by adding custom settings in the Google Admin console. You specify the apps in an XML file that you upload as the value of the custom setting. You can block individual apps or all app files that match a certain type, such as EXE or MSI files.
Step 1: Specify allowed and blocked apps in an XML file
To create the XML file, you can use the command line in PowerShell or the GUI in Windows Group Policy editor. These instructions show you how to build a single policy, but you can combine related policies for apps with the same file type in one XML file. See the examples.
Important: To block different types of app files (EXE, MSI, Script, StoreApps, and DLLs), you must create separate custom settings.
Step 2: Add the custom setting
-
Sign in with an administrator account to the Google Admin console.
If you aren’t using an administrator account, you can’t access the Admin console.
-
Go to Menu
Devices > Mobile and endpoints > Settings > Windows.
Requires having the Services and devices administrator privilege.
- Click Custom settings.
- Click Add a custom setting.
- Configure the custom setting:
- In the OMA-URI field, enter ApplicationLaunchRestriction and select the OMA-URI that corresponds to the file type of the app in the policy:
- For EXE files, select ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/<Enter Grouping>/EXE/Policy.
- For apps available in Microsoft Store, select ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/<Enter Grouping>/AppStore/Policy
- For MSI files, select ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/<Enter Grouping>/MSI/Policy
- For PowerShell scripts, select ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/<Enter Grouping>/Script/Policy
- For DLL files, select ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/<Enter Grouping>/DLL/Policy
For more information, see the Microsoft AppLocker CSP documentation.
- In the OMA-URI, replace <Enter Grouping> with a random alphanumeric string that is unique for each custom setting. For example, if you add one custom setting to block EXE files and another setting to block MSI files, use a different value for each custom setting.
- When you select the OMA-URI, the Name field updates to "Policy". Enter a unique name to help you identify it in the list of custom settings.
- For Data type, select String (XML), click Upload XML, and select the XML configuration file you created in the first section.
- (Optional) Enter a description that describes the action of the custom setting and who it applies to.
- In the OMA-URI field, enter ApplicationLaunchRestriction and select the OMA-URI that corresponds to the file type of the app in the policy:
- Click Next to go on and select the organizational unit the custom setting applies to, or click Add another to start another. Additional policies are not applied to an organizational unit until you click Next and select the organizational unit.
- Choose the organizational unit to apply the policy to.
- Click Apply.
If a user in the organizational unit tries to install or open a blocked app on their Windows device, they get an error message that the app was blocked by their system administrator.
Example XML files
Google, Google Workspace, and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.