Forum Discussion
Blocking User Mode Installation
Hi Experts,
I have a Hybrid Azure AD Join environment with all Windows devices enrolled in Intune.
I have removed Domain Users from the local Administrators group on all devices via an on-premises Group Policy from the Domain Controller (Restricted Groups / Local Admin configuration).
But what I observe is users are still able to install application in user move no elevation, how can I block this so that when get get a prompt only IT team can enter their credentials which will allow install.
Currently apps are being installed in Appdata folder under user profile.
Thanks
1 Reply
Hi,
What you are seeing is expected behaviour in Windows environments.
Removing users from the local Administrators group only prevents installations that require elevation (for example: Program Files, services, drivers, HKLM changes, system-wide installs). It does not prevent applications that support per-user installation.
These applications typically install under locations such as:
- %LocalAppData%
- %AppData%
- User profile folders
- HKCU registry hive
That is why users can still install software without admin credentials.
How to block this properly
To control user-mode installs, you need application control, not only admin rights removal.
Recommended options
Option 1: AppLocker
If you are using Windows Enterprise/Education, AppLocker is a strong and practical solution.
You can create rules to block execution from:
- %AppData%
- %LocalAppData%
- %Temp%
- Downloads folder
And allow trusted locations such as:
- C:\Program Files\
- C:\Program Files (x86)\
- C:\Windows\
This is a common enterprise approach.
Option 2: Microsoft Defender Application Control (WDAC)
This is the more advanced / modern option.
WDAC allows only approved or trusted applications to run and provides stronger security than AppLocker.
Recommended if you want a long-term Zero Trust application control model.
Option 3: Intune Managed Apps
Use Intune / Company Portal as the approved software channel and block unmanaged executables through AppLocker or WDAC.
About forcing IT credentials
If software requires elevation, standard users already need admin credentials.
The reason no prompt appears now is because those apps install only in user context and do not need admin rights.
To change that behaviour, you must block execution from user-writable locations.
Best path for your environment (Hybrid + Intune)
Since you already use Hybrid Azure AD Join + Intune, I would recommend:
- Start with AppLocker in Audit mode
- Review what users are running from AppData
- Move to Enforced mode
- Publish approved apps through Intune Company Portal
- Consider WDAC later for stronger control
Important note
Test carefully before enforcement, because some legitimate apps also run from AppData.
Final recommendation
Removing local admin rights is only step one.
To stop user-mode installs, use AppLocker or WDAC.Hope this helps.