Summary
PowerShell.MCP.Proxy.exe (v1.7.6, win-x64) is not code-signed, which causes it to be blocked on machines with Windows Defender Application Control (WDAC) / Device Guard policies enabled.
Error
'C:\Users\<user>\Documents\PowerShell\Modules\PowerShell.MCP\1.7.6\bin\win-x64\PowerShell.MCP.Proxy.exe' was blocked by your organization's Device Guard policy.
Contact your support person for more info.
Details
Get-AuthenticodeSignature reports NotSigned for the proxy executable.
- Many organizations enforce WDAC policies that block unsigned executables.
- This prevents the MCP server from starting entirely — there is no managed-only fallback.
Environment
- OS: Windows 11
- PowerShell: 7.6.0
- PowerShell.MCP: 1.7.6
- MCP Client: Warp terminal
Request
Please Authenticode-sign PowerShell.MCP.Proxy.exe (and ideally all platform-specific binaries) with a valid code-signing certificate. This would allow the proxy to pass WDAC policies on enterprise-managed machines without requiring per-hash or per-path exceptions from IT.
As a workaround users currently need to request IT to whitelist the binary by SHA-256 hash, which breaks on every module update.
Summary
PowerShell.MCP.Proxy.exe(v1.7.6, win-x64) is not code-signed, which causes it to be blocked on machines with Windows Defender Application Control (WDAC) / Device Guard policies enabled.Error
Details
Get-AuthenticodeSignaturereportsNotSignedfor the proxy executable.Environment
Request
Please Authenticode-sign
PowerShell.MCP.Proxy.exe(and ideally all platform-specific binaries) with a valid code-signing certificate. This would allow the proxy to pass WDAC policies on enterprise-managed machines without requiring per-hash or per-path exceptions from IT.As a workaround users currently need to request IT to whitelist the binary by SHA-256 hash, which breaks on every module update.