A set of .NET Framework managed libraries for developing graphical user interfaces.
- Yes, this is expected behavior when Smart App Control is enabled in enforcement (On) mode. Smart App Control blocks apps and binaries that are considered untrusted, including unknown or unsigned code. Development builds of WinForms/WPF apps typically produce unsigned executables that Smart App Control will treat as untrusted and block at runtime.
Smart App Control allows apps to run only if:
- They are recognized as safe by Microsoft’s app intelligence services, or
- They are signed with a certificate issued by a certificate authority in the Trusted Root Program.
Unsigned, unknown development builds fall outside these criteria and are therefore blocked when Smart App Control is enforcing.
- To prevent Smart App Control from blocking development builds, use one of these supported approaches:
- Turn Smart App Control Off while doing local development:
- Go to Settings > Privacy & Security > Windows Security > App & browser control > Smart App Control settings.
- Set Smart App Control to Off.
- Note: Changing from On to Off is a one-way operation via Settings; returning to Evaluation requires a reset or reinstall of Windows.
- Develop on a device or VM where Smart App Control is not enforcing:
- Use a separate development environment (for example, a VM) where Smart App Control is left in Evaluation mode or disabled.
- Sign development builds with a trusted certificate:
- If the binaries are code-signed with a certificate trusted by Windows (Trusted Root Program), Smart App Control will allow them to run, assuming they are not otherwise classified as unsafe.
For troubleshooting and validation:
- Use the Code Integrity event log to confirm Smart App Control is blocking the binaries:
- Open Event Viewer > Application and Services Logs > Microsoft > Windows > CodeIntegrity > Operational.
- Look for event ID 3077 (enforcement mode) entries showing the blocked executables.
If testing how Smart App Control treats a given build (without blocking it), configure it in Evaluation mode and use audit policies as described in the Smart App Control testing guidance.
References:
- Smart App Control overview
- Smart App Control overview#frequently-asked-questions
- Test your app's signature with Smart App Control
- Test your app's signature with Smart App Control#configure-smart-app-control-for-testing
- Test your app's signature with Smart App Control#configure-the-smart-app-control-audit-policy
- App & browser control in the Windows Security App