Configure access to Microsoft Store
- Windows 10
- Windows 10 Mobile
For more info about the features and functionality that are supported in each edition of Windows, see Compare Windows 10 Editions.
IT pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store.
All executable code including Microsoft Store applications should have an update and maintenance plan. Organizations that use Microsoft Store applications should ensure that the applications can be updated through the Microsoft Store over the internet, through the Private Store, or distributed offline to keep the applications up to date.
Options to configure access to Microsoft Store
You can use these tools to configure access to Microsoft Store: AppLocker or Group Policy. For Windows 10, this is only supported on Windows 10 Enterprise edition.
Applies to: Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile
AppLocker provides policy-based access control management for applications. You can block access to Microsoft Store app with AppLocker by creating a rule for packaged apps. You'll give the name of the Microsoft Store app as the packaged app that you want to block from client computers.
To block Microsoft Store using AppLocker
Type secpol in the search bar to find and start AppLocker.
In the console tree of the snap-in, click Application Control Policies, click AppLocker, and then click Packaged app Rules.
On the Action menu, or by right-clicking on Packaged app Rules, click Create New Rule.
On Before You Begin, click Next.
On Permissions, select the action (allow or deny) and the user or group that the rule should apply to, and then click Next.
On Publisher, you can select Use an installed app package as a reference, and then click Select.
On Select applications, find and click Store under Applications column, and then click OK. Click Next.
Create a rule for packaged apps has more information on reference options and setting the scope on packaged app rules.
Optional: On Exceptions, specify conditions by which to exclude files from being affected by the rule. This allows you to add exceptions based on the same rule reference and rule scope as you set before. Click Next.
Applies to: Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education
If you have Windows 10 devices in your organization that are managed using a mobile device management (MDM) system, such as Microsoft Intune, you can block access to Microsoft Store app using the following configuration service providers (CSPs):
For more information, see Configure an MDM provider.
For more information on the rules available via AppLocker on the different supported operating systems, see Operating system requirements.
Applies to: Windows 10 Enterprise, Windows 10 Education
Not supported on Windows 10 Pro, starting with version 1511. For more info, see Knowledge Base article #3135657.
You can also use Group Policy to manage access to Microsoft Store.
To block Microsoft Store using Group Policy
Type gpedit in the search bar to find and start Group Policy Editor.
In the console tree of the snap-in, click Computer Configuration, click Administrative Templates, click Windows Components, and then click Store.
In the Setting pane, click Turn off the Store application, and then click Edit policy setting.
On the Turn off the Store application setting page, click Enabled, and then click OK.
Enabling Turn off the Store application policy turns off app updates from Microsoft Store.
Applies to: Windows 10 Mobile
If you have mobile devices in your organization that you upgraded from earlier versions of Windows Phone 8 to Windows 10 Mobile, existing policies created using the Windows Phone 8.1 CSPs with your MDM tool will continue to work on Windows 10 Mobile. If you are starting with Windows 10 Mobile, we recommend using AppLocker to manage access to Microsoft Store app.
When your MDM tool supports Microsoft Store for Business, the MDM can use these CSPs to block Microsoft Store app:
For more information, see Configure an MDM provider.
Show private store only using Group Policy
Applies to Windows 10 Enterprise, version 1607, Windows 10 Education
If you're using Microsoft Store for Business and you want employees to only see apps you're managing in your private store, you can use Group Policy to show only the private store. Microsoft Store app will still be available, but employees can't view or purchase apps. Employees can view and install apps that the admin has added to your organization's private store.
To show private store only in Microsoft Store app
Type gpedit in the search bar, and then select Edit group policy (Control panel) to find and start Group Policy Editor.
In the console tree of the snap-in, go to User Configuration or Computer Configuration > Administrative Templates > Windows Components, and then click Store.
Right-click Only display the private store within the Microsoft Store app in the right pane, and click Edit.
This opens the Only display the private store within the Microsoft Store app policy settings.
On the Only display the private store within the Microsoft Store app setting page, click Enabled, and then click OK.