π ~1 min read
Table of contents
Symptom & Impact
AppLocker rules block legitimate Windows Server 2022 binaries on Windows Server 2022 disrupts operations and prevents the affected service from meeting its SLA until remediated.
Environment & Reproduction
The issue reproduces on Windows Server 2022 hosts where the security subsystem is in use, typically following configuration drift or recent updates.
Get-AppLockerFileInformation -Path 'C:WindowsSystem32powershell.exe'
Get-WinEvent -LogName 'Microsoft-Windows-AppLocker/EXE and DLL' -MaxEvents 50
Root Cause Analysis
The defect stems from misaligned applocker settings, missing prerequisites, or a corrupted state that blocks normal operation.
Quick Triage
Confirm the service is running and capture current configuration state before applying any change.
Set-Service AppIDSvc -StartupType Automatic
Start-Service AppIDSvc
Step-by-Step Diagnosis
Walk the security stack from configuration to runtime, collecting logs and counters that point at the failing component.
Get-AppLockerPolicy -Effective | Format-List
Test-AppLockerPolicy -PolicyObject (Get-AppLockerPolicy -Effective) -Path 'C:Program FilesAppapp.exe' -User 'CONTOSOUser1'

Solution β Primary Fix
Apply the corrected configuration and restart dependent services so the applocker component re-initialises cleanly.
Still having issues? Our IT Consulting team can diagnose and resolve this for you. Get in touch for a free consultation.
$policy = Get-AppLockerPolicy -Local
$newRule = New-AppLockerPolicy -RuleType Publisher -FileInformation (Get-AppLockerFileInformation -Path 'C:WindowsSystem32powershell.exe') -User Everyone -Allow
Set-AppLockerPolicy -PolicyObject $newRule -Merge
gpupdate /force

Solution β Alternative Approaches
Where the primary fix is blocked by policy or downtime windows, use the alternative configuration path or staged rollout below.
Set-AppLockerPolicy -XmlPolicy C:Policiesapplocker.xml
New-AppLockerPolicy -FileInformation (Get-ChildItem 'C:WindowsSystem32' -Recurse | Get-AppLockerFileInformation) -RuleType Hash -User Everyone -Allow
Verification & Acceptance Criteria
Confirm the service reports healthy state and end-to-end functionality succeeds against a representative workload.
Get-AppLockerPolicy -Effective | Test-AppLockerPolicy -Path 'C:WindowsSystem32cmd.exe' -User 'Everyone'
Get-WinEvent -LogName 'Microsoft-Windows-AppLocker/EXE and DLL' | Where Id -eq 8002
Rollback Plan
If the fix introduces regressions, revert configuration to the pre-change baseline and restart the service to restore prior behaviour.
Set-AppLockerPolicy -XmlPolicy C:Backupapplocker-prev.xml
gpupdate /force
Prevention & Hardening
Bake the validated applocker configuration into baseline GPOs or DSC and add a monitoring check for early detection.
Set-AppLockerPolicy -XmlPolicy C:Policiesbaseline.xml -Merge
New-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'powershell.exe' -Argument 'Get-AppLockerPolicy -Effective -Xml | Out-File C:Backupapplocker.xml')
Related Errors & Cross-Refs
Related: other security failures, dependent service errors, and downstream client-side symptoms.
Related tutorial: View the step-by-step tutorial for Windows Server 2022.
View all Windows Server 2022 tutorials on the Tutorials Hub β
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
Microsoft Learn documentation for Windows Server 2022 and the relevant component, plus internal runbooks.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β we respond within one business day.