{"id":75505,"date":"2023-05-23T15:37:05","date_gmt":"2023-05-23T19:37:05","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=75505"},"modified":"2025-01-22T01:37:17","modified_gmt":"2025-01-22T06:37:17","slug":"restrict-software-on-windows-devices-using-policy","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/restrict-software-on-windows-devices-using-policy","title":{"rendered":"Restrict Software on Windows Devices Using a Policy"},"content":{"rendered":"\n

Important<\/strong>: <\/strong>Software Restriction Policies were deprecated beginning with Windows 10 build 1803 as well as Windows Server 2019 and later. For more information, see Microsoft’s documentation<\/a>.<\/p>\n\n\n\n

For Windows devices, you can add a Software Restrictions Policy to specify locations where applications can run. A policy can protect a device from potential threats, and you can control access to it by identifying which applications should be allowed access or which should be blocked. For general information on how JumpCloud policies using allow and deny lists work, see Manage Software Restrictions Using Policies<\/a>.  <\/p>\n\n\n\n

You can add file types, applications, and locations to an allow list or deny list in the following ways:<\/p>\n\n\n\n