Consider the following scenario:
- You deploy an AppLocker policy together with a default rule on a Windows 7 Service Pack 1 (SP1)-based or Windows Server 2008 R2 SP1-based computer.
- The administrative users or other high privileged group’s users can run executable files that are in a whitelist that is defined in AppLocker policy without receiving a User Account Control (UAC) prompt on the computer.
- You create a user named "AdminUser" as a member of the Administrators group or other high privileged group.
- You use "AdminUser" to run an executable file that is in the whitelist.
Your system administrator has blocked this program.
Note For more information about high privileged groups, go to the References section.