Windows 11 App Permissions: Enterprise Admin Hardening Guide

Windows 11 utilizes a robust permission architecture to enforce the principle of least privilege for Universal Windows Platform (UWP) and Win32 applications. Proper configuration of these settings is essential for maintaining device integrity and data privacy. This guide outlines the navigation paths and six critical hardening changes identified in recent security reviews.


Accessing App Permissions

To manage the granular access levels granted to installed software, navigate to the following path:

Settings > Privacy & security > App permissions

From this interface, administrators can manage global toggles for specific categories or drill down into per-app configurations. Primary categories include:

  • Camera and Microphone
  • Location Services
  • Notifications
  • Background Apps
  • File System Access (Documents, Pictures, Videos)
  • App Diagnostics

6 Essential Hardening Changes

Change Technical Fix Enterprise / Admin Note
1. Background Activity Navigate to Privacy & security > Background apps. Disable the global toggle. For per-app control, go to Apps > Installed apps > [App] > Advanced options and set Background permissions to Never. Intune: Deploy a Device Restrictions policy under the Compliance or Configuration profile to manage background app execution.
2. Camera & Mic Lockdown Set Let apps access your camera to Off under Privacy settings. Apply the same for the Microphone. Manually whitelist essential apps like Microsoft Teams or Zoom. Audit: Run `Get-Process
3. Location Tracking Enable Location services for system-level functions (e.g., Find My Device) but set Let apps access your location to Off. Utilize the Clear location history tool. GPO: Configure Computer\Policies\Admin Templates\Windows Components\LocationAndSensors to enforce state-wide location disabling.
4. Notification Curation Disable Let apps show notifications globally. Configure Focus Mode to Alarms only to prevent unauthorized telemetry or “nagware” popups. Event Log: Monitor for notification abuse at Applications and Services > Microsoft > Windows > User Notification Platform.
5. File System Restrictions Restrict access to Documents, Pictures, and Videos folders. Disable global access and only grant exceptions to verified productivity suites (e.g., Microsoft Office). Audit: Enable Object Access auditing in the Security Policy, then review logs in Event Viewer > Security to track unauthorized access attempts.
6. Startup Optimization Navigate to Apps > Startup and disable non-essential auto-launchers. Only maintain critical services like OneDrive or security agents. Intune: Use a Configuration Profile with a PowerShell script to manage the registry path: HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.

Enterprise Lockdown Script

Administrators can use the following PowerShell script to enforce a baseline privacy configuration across the fleet.

PowerShell

# Global privacy hardening
Set-MpPreference -DisablePrivacyMode $true
New-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" -Name "NoInstrumentation" -Value 1 -PropertyType DWORD -Force

# Disable background app execution for the current user
Get-AppxPackage | ForEach-Object { 
    Set-AppxState -Name $_.Name -AllowBackgroundExecution 0 
}

# App Permission Audit
# Generates a report of Camera and Microphone access for all UWP packages
Get-AppxPackage | Select-Object Name, 
    @{Name="Camera"; Expression={(Get-AppxAppPermission -Package $_.PackageFamilyName).Camera}}, 
    @{Name="Mic"; Expression={(Get-AppxAppPermission -Package $_.PackageFamilyName).Microphone}}

Verification and Compliance

Follow these steps to verify that permissions have been successfully restricted:

  1. Performance Metrics: Monitor the Processes tab in Task Manager. You should observe a measurable drop in idle CPU and GPU utilization.
  2. Battery Health: Mobile users should see an increase of approximately 20 to 30 minutes in daily runtime due to reduced background polling.
  3. Log Review: Check the Event Viewer for frequent “Access Denied” entries, which confirm the system is successfully blocking unauthorized permission requests.
  4. Sandbox Testing: Install a non-trusted UWP application and attempt to initiate a camera or microphone call. The system should block the action without a user prompt if the global toggle is disabled.

Note: Major Windows Feature Updates may reset certain privacy flags. It is recommended to enforce these settings via Intune Configuration Profiles to ensure persistent compliance.