Menu
CCMEXEC.COM – Enterprise Mobility
  • General
  • Configuration Manager
  • Windows 10
  • Windows 11
  • Intune
  • GitHub
  • About
CCMEXEC.COM – Enterprise Mobility

Application Control for Business and the story of the unsigned WIX dll’s

Posted on November 10, 2025November 10, 2025 by Jörgen Nilsson

When using Application Control for Business which is the ultimate dream from a security perspective to only allow signed and trusted executables to be executed on our Windows devices. That requires that all binaries are signed, both executables and dll files (which are executables).

WIX Toolset is widely used to create Windows Installer packages even by Microsoft. The challenge is that the Custom Action .dll included in the WIX toolset is not signed, which causes a lot of challenges. This affects Intune agents as well, for example Device Inventory Agent, Intune Management extension and EPM agent. Even if we trust Microsoft signed code and use Trusted Installer the WIX dll’s are not signed.

The first place we identified the error was in settings, Access work or School and Information under the “Managed by” section.

It will look like this in the different event logs.

Application event log – we find the name of the Product that fails to install.

Codeintegrity event log – we find which file it is and the hash

Looking at the details of the event entry, we see that it is a WiX custom action dll

This means we need to create a hash-based rule to allow those Custom Action WiX dll’s to run during installation. The good thing is that all the information needed is in the event log entry. Which means we can open the saved evtx file on a different computer.

Let’s look at how we can detect this and create a supplemental Application Control for Business xml file.

Note: Device Inventory Agent and the EPM agent are installed by the MDM agent and not our trusted installer – Intune Management Extension

Create a supplemental rule

We have all the information we need in the Codeintegrity event entry as shown above, it is easier to use a tool like Microsoft App Control Wizard or the AppControl Manager tool which is available in the Microsoft Store. https://apps.microsoft.com/detail/9PNG1JDDTGP8?hl=en-us&gl=SE&ocid=pdpshare

We need the basepolicy GUID to be able to create a supplemental policy as a supplemental policy must reference an applied basepolicy otherwise our supplemental policy is not valid.

  1. Launch AppControl Manager Tool
  2. Select the option to “Create policy from Event Logs”A screenshot of a computer

AI-generated content may be incorrect.
  3. Select “Create Policy for Base GUID”, and enter your Base policy GUID
  4. Then select “Code Integrity EVTX files”, as I have it saved on my own computer.
    A screenshot of a computer

AI-generated content may be incorrect.
  5. Click “Scan Event Logs” and locate our blocked wixca.dll and we can also see that there is no signature as it is unsigned.A screenshot of a computer

AI-generated content may be incorrect.
  6. Select “Only Use Selected Items”
    A screenshot of a computer

AI-generated content may be incorrect.
  7. Then “Create policy from Event Logs” and our policy is created, we can test ut out our local machine under “Additonal Actions” but in my case I want to edit it first.A screenshot of a computer

AI-generated content may be incorrect.
  8. I recommend editing the newly created .xml file. And rename the rule to reflect the real file name and not the temporary file name along with a policy name if that was not selected.
    A screenshot of a computer program

AI-generated content may be incorrect.

I hope this is useful and will save some time when running into issues with unsigned dll’s which we all run into when using Intune and Application Control for Business.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

My name is Jörgen Nilsson and I work as a Senior Consultant at Onevinn in Malmö, Sweden. This is my blog where I will share tips and stuff for my own and everyone elses use on Enterprise Mobility and Windows related topics.
All code is provided "AS-IS" with no warranties.

Recent Posts

  • Application Control for Business and the story of the unsigned WIX dll’s
  • MMUGSE – Meetup October 24 2026
  • Windows 365 Link – a week and some
  • Prevent software installations disguised as drivers
  • Tip when troubleshooting unexpected reboots during Autopilot – event ID 2800
©2025 CCMEXEC.COM – Enterprise Mobility | WordPress Theme by Superb Themes
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Reject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT