Hello, thank you for the clear explanation. In our case, all our end users have admin access to their computers. Will this process work to prevent users from installing unauthorized applications on their computers?
Nice video, but I couldn't see any difference between the default policy and the specific app policy, they looked the same at the end user level and back in Entra Endpoint. Also, does this work for apps that have already been installed but still require an admin to *run*? Thanks 👍🏻
Thanks for the feedback. In my tests it shows the 2 different ways of using support approved. But the experience comes down to the combination of the default settings together with app rules. If the default is set to deny approval but app rule has support approved set then only apps with these settings will receive elevated requests. Hopefully that makes sense
Great video and explanation 👍
Hello, thank you for the clear explanation. In our case, all our end users have admin access to their computers. Will this process work to prevent users from installing unauthorized applications on their computers?
Nice video, but I couldn't see any difference between the default policy and the specific app policy, they looked the same at the end user level and back in Entra Endpoint.
Also, does this work for apps that have already been installed but still require an admin to *run*?
Thanks 👍🏻
Thanks for the feedback. In my tests it shows the 2 different ways of using support approved. But the experience comes down to the combination of the default settings together with app rules. If the default is set to deny approval but app rule has support approved set then only apps with these settings will receive elevated requests. Hopefully that makes sense
Should work for existing apps assuming the device meets the pre-reqs
Nice one, thanks for the quick reply.