Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Manage Windows Package Manager settings with Microsoft Intune
    Intune

    Manage Windows Package Manager settings with Microsoft Intune

    Peter KlapwijkBy Peter KlapwijkDecember 5, 2022Updated:July 24, 202394 Mins Read

    2023-02-23: The below described issue will be fixed in Windows Package Manager version 1.5, see GitHub for more info.

    2022-12-06: The below described settings to block Winget from using the Microsoft Store seem to cause an issue for certain users when the settings is applied during the enrollment. So currently this doesn’t seem a stable solution: DesktopAppInstaller | Microsoft Store App Failed installing (call4cloud.nl)

    Last week I wrote a blog post regarding the new Microsoft store integration in Intune, which made me realize that we might not only want to push some settings regarding the Microsoft Store but also regarding Windows Package Manager/ WinGet.

    IT Admins might have limited the Microsoft Store to only the private store (which completely blocks the store in Windows 11), to only allow installing store apps made available by the IT department. But that doesn’t mean end-users are not able to install applications from the store (at least not on Windows 11 22H2 which I’m running). You might interpret the below text from this Microsoft documentation to completely block installing apps from the store….

    But it does not. Because in recent versions of Windows, we have WinGet available by default. And WinGet allows an end user to install applications from the sources which are available. By default the Microsoft Store is available (and the WinGet source). This allows the standard user to install applications, that don’t require admin permissions, from both sources, even if we blocked access to the (public) Microsoft store.

    As you can see below, the Microsoft store is blocked on my Windows 11 device (by setting the Store\Only display the private store within the Microsoft Store to Enabled), but with WinGet I’m able to install the store version of Whatsapp.

    We have some MDM policy CSPs available, which we can deploy with Microsoft Intune to our devices, to have some control over WinGet. The Desktop App Installer CSP are described on the Microsoft Docs. With a combination of these settings, we can control the sources available via WinGet. By removing the default sources, the user is not able anymore to use WinGet to install store applications.

    I have also tried to disabled App Installer, but the result from this was also installing store apps via the Company Portal failed to install.

    Unfortunately, these settings are not available in the Microsoft Intune portal, and we also can’t import the ADMX file in an Administrative Templates policy in Intune (well importing might work), but the location on the Windows device to which the settings are ingested, is blocked. So, the only thing left for Intune managed devices, is using a custom Intune profile.

    The documentation describes the CSPs are supported on Windows 10 and 11, I only tested this on Windows 11 22H2.

    If you’re not using Intune to manage your devices, you should have a look at this article which describes the good old GPOs.

    Configure the custom Intune profile

    If we have a look at the settings that we have available, we might consider using these three settings to prohibit end users installing applications using WinGet:
    EnableMicrosoftStoreSource
    EnableDefaultSource
    EnableAdditionalSources

    By default, the Microsoft store is available as source on WinGet, by using EnableMicrosoftStoreSource we can disable this.
    By default, we also have the WinGet source available as default source, which we can disable this by setting the policy setting EnableDefaultSource.
    And we have EnableAdditionalSources available, to block the user from adding additional sources.

    Although we currently can only use a custom Intune profile and we need to use the OMA-URI, configuring these three settings is pretty straightforward. These settings can be enabled or disabled; no additional information needs to be added to the string in the profile.

    Let’s sign into the Intune portal and I’ll show you an example.

    • Browse to Devices, Windows, Configuration profile
    • Click Create profile
    • Select Windows 10 and later as Platform
    • Select Templates as Profile type
    • Select Custom and click Create
    • Enter a Name for the profile
    • Enter a Description (optional)
    • Click Next
    • Click Add to add a new OMA-URI row
    • Fill in this information:

    Name: Desktop App Installer – EnableMicrosoftStoreSource (enter what fits your needs)
    OMA-URI: ./Device/Vendor/MSFT/Policy/Config/DesktopAppInstaller/EnableMicrosoftStoreSource
    Data Type: String
    Value:

    <disabled/>

    Repeat this step, by adding new rows for every setting. These are the other OMA-URIs;
    ./Device/Vendor/MSFT/Policy/Config/DesktopAppInstaller/EnableAdditionalSources
    ./Device/Vendor/MSFT/Policy/Config/DesktopAppInstaller/EnableDefaultSource

    Change the Name and set the settings to disabled.

    Finish the creation of the profile by assigning the profile to a security group.

    The end result

    Let’s have a look at the end-user device.

    If we would set EnableAdditionalSources to disabled, we can still access the Microsoft Store source. When we also set EnableMicrosoftStoreSource to disabled, the default sources are removed:
    No sources defined.

    But we can still install UWP apps from the new Microsoft Store.

    And we can install WIN32 apps.

    That’s it for this post. Thanks for reading!

    Desktop App Installer Intune MEM Microsoft Endpoint Manager Windows Windows 10 WinGet
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Automatically enable Bitlocker encryption with Microsoft Intune

    November 11, 2020

    Manage new ADMX Backed Windows 10 policies with Microsoft Intune

    August 19, 2020

    Add an Azure AD group to the local administrators group with Microsoft Intune

    April 18, 2020
    View 9 Comments

    9 Comments

    1. Björn on December 6, 2022 17:38

      End result for me was different after implementing all the mentioned policies 😉

      My End result was that now even the company portal app is not getting installed anymore.

      Must have to do with the Desktop App Installer settings as by just “only private store” policy everything worked fine.

      Reply
      • Peter Klapwijk on December 6, 2022 18:33

        Yes, while I have tested this several times, this behavior is indeed seen by others as well. I therefore already added a note at the beginning of this post, but most likely too late for you to notice.
        An issue is already filed on GitHub https://github.com/microsoft/winget-cli/issues/2742.

        Reply
    2. Daniel on December 28, 2022 13:35

      I’ve tried to configure these settings however it results in an error during the push of the configuration.
      The error is 2016281112 and 0x87d1fde8 which would point towards a missing ADMX locally on the devices.
      Any idea as to why this occurs?

      Reply
      • DPak on January 10, 2023 14:28

        Hi! I have the same problem at Win10 Pro. At this moment can’t find solution.

        Reply
        • DPak on January 10, 2023 14:29

          Ps. Eventviewer show deployment error “System cannot find the file specified”

          Reply
      • Dave Hall on January 25, 2023 19:03

        I’m having the same problem as you ? Did you get anywhere with it ?

        Reply
      • Frank on March 22, 2023 13:13

        I’m also having this issue. Did you manage to resolve?

        Reply
      • Bjørn on June 25, 2023 12:28

        Did you find a way to solve this?
        I ended up with a dirty solution where I push out a local policy.

        Reply
    3. Michael O on November 17, 2023 12:52

      I have the impression that it has changed and that it is only for Windows 11 now: https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-desktopappinstaller

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}