Skip to content

Warp installation blocked by Microsoft Defender ASR (prevalence/age rule) – affects updates, fresh installs (exe) and winget #8794

@tmidthjell

Description

@tmidthjell

Pre-submit Checks

Describe the bug

Warp installation blocked by Microsoft Defender ASR (prevalence/age rule)

Summary

Warp cannot be installed in our enterprise Windows environment due to a Microsoft Defender Attack Surface Reduction (ASR) rule.

This does not only affect auto-updates — it also blocks fresh installations, both via:

  • The downloaded .exe installer
  • winget install Warp.Warp

Environment

  • OS: Windows 11
  • Device management: Intune (MDM-managed)
  • Security: Microsoft Defender for Endpoint
  • ASR rule enabled:
    Block executable files from running unless they meet prevalence, age, or trusted list criteria
  • Rule ID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A

What happens

During installation, Microsoft Defender blocks the Warp installer bootstrapper.

Defender alert details:

  • Blocked process: windows.exe
  • Path:
    C:\Users\<user>\AppData\Local\Temp\is-XXXXXXXX.tmp\windows.tmp
  • Detection type: Attack Surface Reduction
  • Action: Blocked by administrator

It appears that the installer extracts and executes a temporary executable from %LOCALAPPDATA%\Temp.

Because:

  • The file has a new hash per release
  • It initially has low global prevalence
  • It runs from a user Temp directory

…it is blocked by the ASR rule.

Interestingly, installation sometimes works after about a week, likely due to Microsoft’s cloud reputation system increasing the file’s prevalence score over time.


Impact

  • Warp cannot be installed in environments using Microsoft security baselines.
  • Both direct installer and winget installation are blocked.
  • Requires ASR exclusions or security policy changes.
  • Affects enterprise-managed developer machines.

Expected behavior

Warp should be installable in enterprise environments with Defender ASR enabled, without requiring security policy exceptions.


Request

Could you consider one or more of the following:

  1. Provide a true MSI installer suitable for enterprise deployment
  2. Avoid executing a temporary bootstrapper from %TEMP%
  3. Provide enterprise deployment guidance for Defender/ASR environments
  4. Adjust the installer/update mechanism to better support Microsoft security baselines

This issue likely affects many enterprise users operating under standard Defender ASR configurations.

If helpful, I can also provide Defender event logs or SHA256 details.

To reproduce

  • tried built-in update in warp terminal
  • tried uninstall and fresh install with newly downloaded .exe
  • tried with winget
  • tried to force other directory rather than default tmp

Expected behavior

No response

Screenshots, videos, and logs

Image

Operating system (OS)

Windows

Operating system and version

11 - 25H2

Shell Version

No response

Current Warp version

No response

Regression

No, this bug or issue has existed throughout my experience using Warp

Recent working Warp date

No response

Additional context

No response

Does this block you from using Warp daily?

Yes, this issue prevents me from using Warp daily.

Is this an issue only in Warp?

Yes, I confirmed that this only happens in Warp, not other terminals.

Warp Internal (ignore): linear-label:b9d78064-c89e-4973-b153-5178a31ee54e

None

Metadata

Metadata

Assignees

No one assigned

    Labels

    BUGBugs, Hangs, Crash, and Freezes

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions