Microsoft has quietly removed the long-standing clean install requirement for Smart App Control (SAC), making the Windows 11–exclusive security feature toggleable from the Windows Security app without reinstalling the operating system — a change now rolling out to Windows Insiders and being staged toward broader availability.
Smart App Control (SAC) launched as part of Windows 11’s security stack with the 22H2 update, positioning itself as a proactive, cloud-powered application execution control that blocks untrusted or potentially harmful apps before they run. SAC uses Microsoft’s app intelligence services and Windows code integrity features to allow only applications that are predicted to be safe or properly signed by a trusted certificate authority. When SAC was introduced, Microsoft required a clean installation of Windows 11 in order to enable it — a deliberate design choice intended to ensure SAC could be evaluated and enforced from a known-good system state. That installation requirement proved a friction point for many users. Reinstalling or resetting Windows to obtain a single security feature is disruptive, particularly for users migrating upgrades in-place from Windows 10 or for those with heavily customized systems. Third-party reporting and community feedback repeatedly called out the requirement as a barrier to adoption. Microsoft has now acted to remove that barrier, exposing a toggle in the Windows Security app so SAC can be turned on or off without a clean install — starting with Insider Preview build 26220.7070 (KB5070300) and continuing in more recent Dev/Beta channel flights such as build 26220.7344 (KB5070316).
The toggle is now visible to Insiders in the Dev and Beta channels and will roll out more widely as Microsoft confirms stability and compatibility across its ecosystem. Users who want proactive, gatekeeper-style protection without reinstalling Windows can prepare to trial SAC when the toggle lands on their devices; IT teams should treat the change as an opportunity to pilot SAC but continue to rely on established app-control tooling and testing discipline before broader deployment.
Source: Neowin Microsoft removes mandatory clean install requirement for a Windows 11-exclusive feature
Background
Smart App Control (SAC) launched as part of Windows 11’s security stack with the 22H2 update, positioning itself as a proactive, cloud-powered application execution control that blocks untrusted or potentially harmful apps before they run. SAC uses Microsoft’s app intelligence services and Windows code integrity features to allow only applications that are predicted to be safe or properly signed by a trusted certificate authority. When SAC was introduced, Microsoft required a clean installation of Windows 11 in order to enable it — a deliberate design choice intended to ensure SAC could be evaluated and enforced from a known-good system state. That installation requirement proved a friction point for many users. Reinstalling or resetting Windows to obtain a single security feature is disruptive, particularly for users migrating upgrades in-place from Windows 10 or for those with heavily customized systems. Third-party reporting and community feedback repeatedly called out the requirement as a barrier to adoption. Microsoft has now acted to remove that barrier, exposing a toggle in the Windows Security app so SAC can be turned on or off without a clean install — starting with Insider Preview build 26220.7070 (KB5070300) and continuing in more recent Dev/Beta channel flights such as build 26220.7344 (KB5070316). What changed: the technical details
The toggle, where to find it, and how it behaves
Microsoft updated the Insider release notes to say SAC will be controllable from Settings > Windows Security > App & Browser Control > Smart App Control settings. This change removes the explicit requirement to reset or perform a fresh OS install purely to enable or disable SAC. The Insider announcement also clarifies that the toggle is being rolled out gradually — meaning availability will vary by device, channel, and staging flag.- To check or change SAC: open Settings > Privacy & Security > Windows Security > App & Browser Control > Smart App Control settings.
Builds and rollouts to watch
The change was first detailed in Windows Insider Preview Build 26220.7070 (KB5070300) and is present in later 25H2–era builds such as 26220.7344 (KB5070316). These releases are being distributed to the Dev and Beta channels first, with Microsoft noting many of these capabilities are gradually rolling out under feature toggles for Insiders. That pattern indicates Microsoft intends to test the control in the wild before pushing it to the Release Preview or general channels.Why this matters technically
SAC relies on cloud-based app intelligence to predict app trustworthiness. Previously, SAC’s lifecycle management was tied to the OS image state to ensure predictable evaluation of installed software and user behavior. Allowing SAC to be turned on/off without reinstall reduces operational friction and makes end-user testing, IT piloting, and consumer adoption much simpler. It also means Microsoft has built safeguards to evaluate device state and user scenarios dynamically, rather than treating SAC as strictly a post-install-only policy.Verification of the claim and primary sources
- Official Windows Insider announcement for build 26220.7070 (KB5070300) explicitly states: “We’re updating Smart App Control (SAC) so you will now be able to switch SAC off or on without any clean install requirement.” This is the authoritative product communication for Insiders.
- Microsoft’s product documentation and Support articles continue to describe what SAC does and how it previously required a clean install for initial enablement — those pages have been updated over time but still document SAC’s evaluation and enforcement modes and the role of clean installs in the feature’s lifecycle. Use the Windows Security app to view and manage SAC settings.
- Third‑party coverage from multiple outlets picked up the Insider notes and fleshed out the implications: reporting confirmed the toggle and emphasized the staged rollout and Insider channel testing. These independent reports corroborate Microsoft’s Insider blog and provide situational context for adoption timelines.
How Smart App Control works — a technical primer
Smart App Control blends cloud intelligence, reputation data, and local code integrity checks to decide whether to allow an application to run. In practice:- SAC queries Microsoft’s app intelligence service to determine whether an executable is known-good, known-bad, or unknown.
- If the service provides a high-confidence prediction that the app is safe, the binary is allowed to run.
- If the service cannot generate a confident prediction, SAC will fall back to digital signature checks — allowing binaries that are signed by certificate authorities in the Trusted Root Program. Unsigned or low-confidence binaries are blocked by default.
Performance claims and reality check
Microsoft’s claim
Microsoft promotes SAC as having a lighter impact on PC performance because it adopts a proactive, gatekeeping approach — blocking harmful apps before they run, which reduces the need for continuous, resource-intensive scanning typical of traditional antivirus engines. The company’s marketing explicitly describes SAC as reducing system strain and helping maintain responsiveness for work and gaming.Independent coverage and testing
Independent outlets (including major tech publications) have explained the theoretical performance advantages and noted the conceptual difference between proactive app blocking and reactive scanning. Some community and forum commentary also points to observable snappiness in common-sense scenarios (e.g., fewer I/O spikes from background scans). However, there is currently no comprehensive, widely accepted benchmark suite showing SAC’s real-world performance delta across diverse hardware, workloads, and usage patterns. Independent benchmark studies remain scarce. Where available, early reports are primarily qualitative or limited to small-scale tests.Takeaway
Microsoft’s performance claim is plausible and grounded in how SAC is architected, but the assertion should be considered a vendor claim until independent, repeatable benchmarks across a representative sample of systems are published. Users who are sensitive to performance should evaluate SAC on test systems matching their real workloads before broadly enabling it in production environments.Practical implications for different user groups
Home users and enthusiasts
- The new toggle removes the reinstall barrier. Home users who were deterred by the clean-install requirement can now trial SAC more easily. Because SAC can block unsigned or uncommon apps, enthusiasts who sideload custom utilities, developer builds, or niche tools should expect some friction and may need to temporarily disable SAC for certain workflows.
- If enabled, SAC will run alongside Microsoft Defender; it is not a full replacement for endpoint security suites but an additional control layer that reduces the attack surface presented by unknown binaries.
Developers, power users, and IT pros
- Developers and sysadmins who frequently run unsigned builds, scripts, or internal tools will need to validate SAC’s compatibility with their toolchains. Historically SAC prevented switching back to evaluation mode without reinstalling; Microsoft’s toggle changes the initial installation restriction but does not fully remove the need for controlled testing of development workflows. Proceed with caution in dev machines and use testing rings to validate compatibility.
- For enterprise-managed devices, Windows Defender Application Control (WDAC) and Intune-based policies remain the recommended approach for tightly managed application control. SAC is most useful as a consumer-grade proactive safeguard, while enterprises will continue to rely on managed application control policies.
Enterprises and admins
- Admins evaluating SAC should consider pilot groups and compatibility validation before mass enabling. The toggle simplifies pilot deployment but does not negate the need for app whitelisting strategies, impact assessments, and configuration management. SAC’s cloud-dependent reputation checks also mean it’s important to consider environments with restricted outbound connectivity.
Risks and limitations
- False positives and productivity impact: SAC’s conservative posture can block legitimate, unsigned or low-reputation utilities. That may disrupt workflows for developers, content creators, or users who depend on niche software. Historically SAC had limited options for whitelisting or returning to evaluation without reinstall; the toggle helps, but false positives remain a concern.
- Cloud dependency and privacy surface: SAC leverages cloud signals to make trust predictions. That cloud dependency raises two considerations: (1) devices without reliable outbound connectivity might see degraded SAC functionality, and (2) the mechanism necessarily shares telemetry about apps and binaries with Microsoft’s services as part of reputation calculations. Administrators should weigh these against organizational privacy and compliance policies.
- Compatibility with enterprise app control: Enterprises with established WDAC/AppLocker deployments should test for interactions. SAC is intended for consumer and simpler small-business use cases; it is not a drop-in replacement for centrally managed application control in complex IT environments.
- Limited independent performance data: Microsoft’s performance claims are credible, but the lack of broad, independent benchmarking means performance benefits are still a vendor claim. Administrators and power users should validate impact on representative hardware and workloads.
How to enable or disable Smart App Control (practical steps)
- Open Settings.
- Go to Privacy & Security > Windows Security > App & Browser Control.
- Select Smart App Control settings.
- Toggle SAC to On or Off according to your preference.
Recommended rollout approach for IT teams
- Pilot: Enable SAC on a controlled pilot group that mirrors production software portfolios and usage patterns.
- Test: Run daily and weekly workflows, automated build systems, and admin tools to detect false positives.
- Policy alignment: Confirm enterprise management (Intune, Group Policy) interactions and update documentation.
- Communications: Notify users about possible blocked apps and provide a clear remediation path (e.g., approved alternatives, IT support channels).
- Measure: Track blocked app events, support tickets, and performance metrics pre/post-enable to quantify SAC’s impact.
What remains uncertain and what to watch for
- General availability timeline: Microsoft’s Insider release notes state the SAC toggle is being rolled out gradually to Insiders. The company has not provided a firm date for when the capability will appear in a general retail build, though the staged Insider testing suggests wider availability could follow after additional validation. Watch Release Preview channel announcements and the Windows release cadence for signals.
- Behavioral nuances around evaluation mode: Microsoft’s documentation previously indicated that evaluation and enforcement transitions were one-way without reinstall. The new toggle removes the clean-install requirement for enabling/disabling SAC, but full operational details (for example, whether evaluation windows and auto-disable heuristics remain unchanged) require confirmation from Microsoft docs or later release notes. Until Microsoft updates the product documentation in full, assume some legacy constraints may remain. Flag any policy or behavior change that affects rollback or re-evaluation for additional testing.
- Comprehensive performance benchmarks: Expect vendors and independent labs to publish more rigorous benchmarks. Until then, treat performance claims as vendor-asserted and validate in representative environments.
Strategic analysis: why Microsoft made the change
Microsoft’s decision to remove the clean-install requirement is a pragmatic shift with multiple strategic benefits:- Lower friction for adoption: Making SAC toggleable dramatically reduces the setup cost for consumers and pilots, improving the odds of widespread usage and real-world telemetry collection.
- Faster feedback loop: A toggle enables Microsoft to gather more diverse telemetry about compatibility and user experience across varied hardware and software stacks — data that insiders and staged rollouts can provide.
- Competitive positioning: By simplifying access to a proactive control mechanism, Microsoft strengthens Windows 11’s security differentiation against competing platforms and third-party endpoint vendors.
- Operational flexibility: Enterprises and power users still have centralized tools (WDAC, Intune) for fine-grained control, while SAC provides a simplified consumer-grade policy that can be adopted without IT involvement.
Bottom line
The removal of the mandatory clean-install requirement for Smart App Control is a meaningful usability and deployment improvement for Windows 11 users. It reduces friction for adoption, simplifies trialing the feature, and may accelerate Microsoft’s ability to learn from a broader set of real-world systems. That said, SAC remains a conservative, cloud-aware gatekeeper that can block unsigned or unusual binaries; organizations and power users should pilot and validate the feature before enabling it across production fleets. Microsoft’s performance claims are reasonable given SAC’s design, but comprehensive independent benchmarks are still needed to substantiate real-world gains. For now, expect staged availability through the Insider program and incremental documentation updates as Microsoft moves this capability toward general release.The toggle is now visible to Insiders in the Dev and Beta channels and will roll out more widely as Microsoft confirms stability and compatibility across its ecosystem. Users who want proactive, gatekeeper-style protection without reinstalling Windows can prepare to trial SAC when the toggle lands on their devices; IT teams should treat the change as an opportunity to pilot SAC but continue to rely on established app-control tooling and testing discipline before broader deployment.
Source: Neowin Microsoft removes mandatory clean install requirement for a Windows 11-exclusive feature


