Based on the vendor’s own description, this looks more like an “advanced Task Manager + monitoring/alerts” tool than a true “application control” product.
Why it’s probably not a strong “blacklist application control”
- The site markets AppControl as a historical Task Manager with “controls” like permanently disabling apps and blocking publishers. That usually means it can kill/stop processes and/or disable startup/scheduled tasks, not necessarily prevent code from executing in the first place.
- Their EULA explicitly describes it as a “simple rule system” that can “disable or kill processes,” and even warns about breaking remote access/critical processes. That wording strongly suggests reactive control (after something starts) rather than OS-enforced execution blocking.
- Blacklist-style control in general is weaker than allowlisting because attackers can change filenames/hashes, use living-off-the-land binaries, script hosts, side-loading, etc. Even a well-made deny list tends to be bypassable compared to allowlist policies.
What “real” Windows application control usually means
Microsoft’s “application control” (WDAC / App Control for Business, and in some cases AppLocker) is about enforcing what is allowed to run, using Code Integrity-based policy, not just terminating a process after it starts. Microsoft explicitly frames it as moving from “everything runs unless AV says it’s bad” to “only runs if policy allows it.”
So if your goal is actual application control (especially for security hardening), WDAC/App Control for Business (or AppLocker where appropriate) is the category to look at, not a Task Manager-style utility.
Where AppControl (appcontrol.com) can still be useful
It may still be useful as a visibility/response tool:
- Historical monitoring (CPU/RAM/GPU usage, activity over time)
- Alerts about “new/unusual apps”
- Quickly stopping/disable-looping nuisance processes
- Optional “suspicious app detection” (note: their privacy policy says it can send executable name/hash/publisher details if you enable it)
Just don’t treat that as equivalent to policy-enforced application control.
Practical recommendation
If you want “application control” for security, prefer Windows-native enforcement (WDAC/App Control for Business; possibly AppLocker depending on edition/use case) and keep AV/Defender enabled. Consider AppControl (this app) only as a supplementary monitoring/management tool, not as your primary execution-control layer.
Sources