Hello David Rivera, thank you for posting in the Microsoft Q&A community.
I understand that Microsoft-signed applications like Visual Studio, Docker Desktop, and SQL Server Management Studio are being blocked by WDAC despite being deployed via Intune as a Managed Installer.
This behavior often occurs because Managed Installer trust relies on Extended Attributes (EA) being written to the file at the time of creation; however, complex installers like Visual Studio often extract binaries via sub-processes or perform post-install updates that may not inherit the "Managed" token. Additionally, while these apps are Microsoft-signed, your base policy may not explicitly trust the specific certificates used by these developer tools if you are using a restrictive template.
To resolve this, please verify that the Intune Management Extension is correctly configured as a Managed Installer and check if the blocked files possess the required Extended Attributes by running the following command in a CMD:
fsutil file queryea "C:\Path\To\Blocked\File.dll"
If the EA is missing, you should consider implementing a Supplemental Policy specifically for the Microsoft Publisher or enabling the Intelligent Security Graph (ISG) to allow reputable Microsoft-signed binaries that fall outside the Managed Installer's scope.
To provide a more precise recommendation, please share the details from Event ID 3077 or 3076 found under Applications and Services Logs > Microsoft > Windows > CodeIntegrity > Operational, specifically the FileName and Requested Signing Level.
I will follow up on this thread to ensure your issue is resolved. If this helps, please consider "Accepting" the answer to assist the community.
Official Documentation:
Understanding Application Control for Business policy rules and file rules
Manage Windows Defender Application Control with Managed Installers