Uninstall Preinstalled Microsoft Store Apps with New Policy
IT administrators now have a more streamlined method for managing pre-installed Microsoft Store applications on Windows 11 Enterprise and Education devices. A new policy, “Remove default Microsoft Store packages from the system,” allows for the selective uninstallation of these built-in applications, eliminating the need for custom imaging or PowerShell scripts. This feature significantly reduces operational overhead and provides a cleaner, more work-ready environment for users by removing unwanted bloatware.
This policy-based approach offers greater control over the software provisioned on managed devices. Previously, IT departments often relied on complex and brittle scripts that could break with application updates, leading to time-consuming maintenance and inconsistent results. The new policy introduces a more robust and automated solution, ensuring a consistent user experience across an organization’s fleet of devices.
Policy Functionality and Scope
The “Remove default Microsoft Store packages from the system” policy is an opt-in feature, meaning it is disabled by default. Administrators must explicitly enable it and select which applications they wish to remove from a predefined list. This granular control ensures that only necessary applications are uninstalled, preserving essential system components.
This policy operates at the device level, not the user level. Consequently, when the policy is applied, the selected applications are removed for all users on that device. This ensures a consistent environment regardless of who logs into the machine.
The removal of applications is triggered during specific events. These include the initial Out-of-Box Experience (OOBE), upon a user signing in after an operating system upgrade, or following an update to the policy itself when a user signs in. For existing devices, users will need to sign out and sign back in for the policy changes to take effect after it has been applied.
Once an application is removed via this policy, it is blocked from reinstallation. If a user attempts to reinstall the application through the Microsoft Store or by sideloading, the installation will be prevented. This persistent blocking ensures that the device remains in the desired clean state.
System Requirements and Edition Support
The policy-based removal of pre-installed Microsoft Store apps is exclusively available for devices running Windows 11 Enterprise or Windows 11 Education. Furthermore, the operating system must be version 25H2 or later to support this functionality. Devices that do not meet these specific version and edition requirements will show a “Not applicable” status when the policy is applied.
This feature is designed for enterprise and educational environments where IT administrators manage device fleets. Consumer versions of Windows do not support this policy-based removal.
Management Methods: Group Policy and Intune
IT administrators can implement this app removal policy using two primary methods: Group Policy (GP) and Mobile Device Management (MDM) solutions, most notably Microsoft Intune. Both methods offer robust capabilities for deploying and managing the policy across an organization’s devices.
Configuring with Microsoft Intune
To configure the policy using Microsoft Intune, administrators should navigate to Devices > Manage devices > Configuration > Create > New policy within the Microsoft Intune admin center. A Settings Catalog policy should be created, and within the settings, administrators can search for “Remove default Microsoft Store packages from the system.” Each application listed can then be toggled to “True” to initiate its uninstallation from supported devices.
Alternatively, a custom MDM policy can be created by navigating to Devices > Configuration in Intune, selecting Policy > Create > New Policy, and choosing Windows 10 and later as the platform. A Custom profile type is then selected, and the OMA URI for the policy is specified as ./Device/Vendor/MSFT/Policy/Config/ApplicationManagement/RemoveDefaultMicrosoftStorePackages. Within this custom configuration, administrators set the value for each app to “true” to trigger its removal.
When deploying the policy through Intune, it’s crucial to assign it to the appropriate group(s) of devices. Intune will automatically identify unsupported devices and will not apply the policy to them, marking them with a “Not applicable” status.
Configuring with Group Policy
For organizations utilizing Active Directory, the policy can be managed through Group Policy Objects (GPOs). Administrators need to open the Group Policy Editor and navigate to Computer Configuration > Administrative Templates > Windows Components > App Package Deployment. Within this path, they will find the “Remove Default Microsoft Store apps” or “Remove Default Microsoft Store packages from the system” policy.
To enable the policy, it must be set to “Enabled.” Following this, administrators can select the specific Microsoft Store applications they wish to remove from the provided list. For the policy to take effect on individual devices, users typically need to log off and then log back in.
It is important to ensure that administrative template files (ADMX) are updated to the latest Windows 11 version if using Group Policy. This ensures that the policy settings are correctly recognized and applied. Avoid applying both an Intune and a Group Policy removal policy to the same device to prevent potential conflicts.
Predefined List of Removable Apps
Microsoft provides a comprehensive, predefined list of Microsoft Store applications that can be removed using this policy. As of the current implementation, this list includes a variety of common Microsoft applications. Examples of apps available for removal include Feedback Hub, Microsoft Clipchamp, Microsoft Photos, Microsoft Solitaire Collection, Microsoft Teams, MSN Weather, Notepad, Paint, Snipping Tool, Windows Calculator, Windows Camera, Windows Media Player, Windows Terminal, and the Xbox Gaming App.
This curated list ensures that administrators can target specific applications that are not required for their organization’s workflow. The policy allows for precise selection, preventing accidental removal of critical system applications.
It is important to note that not all pre-installed Microsoft apps are included in this removable list. Applications such as Microsoft Edge and OneDrive, which are deeply integrated into the operating system, are typically not part of this policy’s scope. Organizations needing to remove these deeply integrated applications may still require alternative methods.
Verification and Troubleshooting
Verifying the successful application of the policy can be done through several methods. For Group Policy, administrators can check specific registry keys under HKLMSOFTWAREPoliciesMicrosoftWindowsAppxRemoveDefaultMicrosoftStorePackages, where configured values will indicate the policy’s active status. In Microsoft Intune, the deployment status of the policy for targeted devices will indicate success or failure.
If the policy is not being applied, or if apps are not being uninstalled as expected, several factors should be considered. First, ensure that the device meets the minimum Windows 11 version 25H2 and is running either the Enterprise or Education edition. Second, confirm that the policy has been correctly enabled and configured in either Intune or Group Policy, and that the correct applications have been selected for removal.
Another common issue can arise if the policy was applied to users rather than devices, as this is a device-level policy. Additionally, for existing user profiles, a sign-out and sign-in cycle is necessary for the removal to take effect. If issues persist, reviewing the detailed documentation provided by Microsoft for both Group Policy and Intune configurations is recommended.
Benefits for Organizations
The introduction of this policy-based app removal significantly streamlines the deployment and management of Windows devices within an organization. By automating the removal of unwanted pre-installed applications, IT departments can reduce the time and resources previously spent on manual cleanup or script maintenance. This leads to a more efficient IT operation and a faster onboarding process for new devices.
Furthermore, a cleaner operating system environment enhances user productivity and satisfaction. Users are presented with a tailored Windows experience, free from distracting or unnecessary applications, allowing them to focus on their work. This controlled environment also contributes to a more secure posture by reducing the attack surface associated with unneeded software.
This feature empowers IT administrators with greater control over the provisioned software on their managed endpoints. The ability to consistently remove specific applications ensures that all devices adhere to organizational standards, simplifying compliance and software asset management.