What is Application control?

Application control is the cybersecurity discipline of restricting which executables, scripts, and installers are permitted to run on an endpoint — typical…

Definition

Application control — also called application allowlisting, application whitelisting, or in its most aggressive form "default-deny" — is the practice of restricting endpoint execution to a known set of approved software. Where antivirus and EDR ask "is this binary known to be malicious?", application control asks the inverse: "is this binary on the approved list? If not, block it."

The discipline has multiple layers. Basic application control restricts execution by signing certificate, hash, or file path. Ringfencing — typically a feature of more advanced products — additionally restricts what an allowed application can do once it runs (which network destinations it can reach, which files it can read or write, which child processes it can spawn). Elevation control restricts which approved applications can run with administrator rights.

Application control has historically been delivered through a kernel-mode driver, which can mediate every process spawn and every binary load with high fidelity. The trade-off is operational: kernel-mode bugs cause bluescreens, kernel-driver signing depends on Microsoft's certificate authority chain, and Remote Desktop Session Hosts have a long history of instability under kernel-mode endpoint agents. Newer "kernel-free" approaches enforce policy in user-mode or via Microsoft's built-in Windows Defender Application Control / AppLocker, trading some detection depth for substantially better operational reliability.

Core components

  • Allowlisting / whitelisting. The list of executables, scripts, and installers permitted to run. Maintained by signing certificate, hash, file path, or publisher metadata.
  • Default-deny. The policy stance that anything not explicitly on the allowlist is blocked. The strongest form of application control.
  • Ringfencing. Restricting an allowed application's subsequent behaviour — which network destinations it can reach, which files it can read or write, which child processes it can spawn. Typically a kernel-mode feature.
  • Elevation control. Restricting which approved applications can run with administrator privileges. Used to let a standard user perform a one-off admin action without giving them permanent local-admin rights.
  • Learning mode. A discovery phase during which the tool observes what software runs on an endpoint without blocking, to seed the initial allowlist.
  • Pre-approval by signed installer. An allowlisting strategy that approves software by its signing certificate (publisher) rather than by file hash. Survives normal vendor updates without operator intervention; weaker against fully-stolen signing keys.
  • Pre-approval by hash. An allowlisting strategy that approves a specific binary by its SHA-256 hash. Highest fidelity but breaks on every vendor update — operational burden is significant.
  • Kernel-mode vs user-mode enforcement. Where the policy is enforced. Kernel-mode is higher fidelity but can BSOD; user-mode is more reliable but slightly shallower in what it can intercept.

Why it matters

Application control consistently appears in cybersecurity frameworks as one of the highest-impact preventive controls. The Australian Signals Directorate's Essential Eight calls out application control as Strategy 1; CIS Controls v8 designates it as Implementation Group 2 / 3; CMMC 2.0 references it through NIST SP 800-171's SC and CM control families.

Empirically, the reason is straightforward: most ransomware and most commodity malware ship as unsigned or stolen-signed executables that would never be on a properly-maintained allowlist. Endpoint anti-malware catches a large share — but not all. Application control closes the residual gap by preventing unrecognised executables from running at all, even when AV / EDR misses them.

For MSPs, application control is also a frequent cyber-insurance question. Insurance scans increasingly ask about application control implementation, and lower premiums and lower deductibles often follow demonstrable coverage.

How Lavawall® helps with Application control

Lavawall® delivers application control without a kernel driver. The design eliminates the BSOD class of failure, the driver-signing dependency on Microsoft's certificate authority chain, and the historical Remote Desktop Session Host instability of kernel-mode agents. Pre-approval by signed installer means normal vendor updates do not silently break the allowlist on Patch Tuesday.

The Lavawall® pricing page describes the design goal directly: "Replace ThreatLocker and AutoElevate with a faster, lighter approach — built for MSPs who got burned by kernel-level agents." For MSPs whose primary need is preventing unrecognised executables from running and providing controlled elevation for one-off admin tasks, the kernel-free approach delivers 90% of the value at substantially lower operational risk.

Application control events flow into Lavawall®'s GRC evidence automatically — covering CMMC 2.0 SC.L2-3.13.x, NIST SP 800-171 3.4.x and 3.13.x, CIS Controls 2.x and 4.x, and Australian Essential Eight Strategy 1 — without a separate compliance integration tax.

Frequently asked

Is application control the same as antivirus?
No. Antivirus asks "is this binary on a list of known-bad?" Application control asks "is this binary on a list of known-good?" The two are complementary; most modern endpoints run both.
Does application control replace EDR?
No. EDR (Endpoint Detection and Response) detects suspicious behaviour from already-running processes. Application control prevents unauthorised processes from starting in the first place. They cover different parts of the attack lifecycle.
Why does kernel-mode vs user-mode matter so much?
A kernel-mode bug is a bluescreen — at scale, an entire fleet of endpoints simultaneously unbootable. Kernel-mode also makes you dependent on Microsoft's kernel-driver signing infrastructure. User-mode enforcement removes both failure modes at the cost of slightly shallower behavioural mediation. For most MSP allowlisting goals, user-mode is operationally far superior.
Will application control break my users' workflows?
It will surface every unsigned or unapproved executable that was running quietly on their machines — many of which are legitimate but were not in the official software inventory. A learning-mode rollout, followed by a defined approval process for new requests, is the standard way to manage the transition. Lavawall® supports both phases.