Dear CommandX,
Thank you for sharing the details regarding the deployment of Windows Defender Application Control with Secure Boot enabled and the challenges encountered when Secure Boot is disabled. The behavior described indicates that the policy is being enforced only when Secure Boot is active, as Secure Boot ensures that the Code Integrity policy is loaded from the EFI partition. When Secure Boot is disabled, enforcement of the policy from \EFI\Microsoft\Boot\SiPolicy.p7b is bypassed, which results in the driver not being trusted.
A recommended approach is to maintain Secure Boot enabled when deploying custom kernel mode certificates, as this guarantees that the Code Integrity policy is validated during boot. If Secure Boot must be disabled, the policy in C:\Windows\System32\CodeIntegrity\SiPolicy.p7b may not be applied consistently, and additional configuration or validation through Microsoft Support may be required. Providing logs and details of the certificate configuration through the Microsoft Support portal will allow engineers to analyze the environment more thoroughly.
If this answer resolves your concern, please click Accept the answer so that confirmation is received.
Thank you so much!
Best regards,
QQ.