To enable the Enforce rules enforcement setting From the AppLocker console, right-click AppLocker, and then click Properties. On the Enforcement tab of the AppLocker Properties dialog box, select the Configured check box for the rule collection that you are editing, and then verify that Enforce rules is selected.To merge two or more AppLocker policies Open an XML policy file in a text editor or XML editor, such as Notepad. Select the rule collection where you want to copy rules from. Select the rules that you want to add to another policy file, and then copy the text.An AppLocker rule is a control placed on a file to govern whether or not it is allowed to run for a specific user or group. Rules apply to five different types, or collections, of files: An executable rule controls whether a user or group can run an executable file.On a computer running Windows 10 Enterprise, start Group Policy Editor (GPEdit). 2. Under Computer ConfigurationWindows SettingsSecurity SettingsApplication Control Policies[&AppLocker&], right-click and select Properties, then enable Packaged app Rules and select Enforce rules. This turns on our AppLocker rules.
How are AppLocker group policy rules enforced?
Rule collections that are not configured will be enforced. Group Policy does not overwrite or replace rules that are already present in a linked GPO. AppLocker processes the explicit deny rule configuration before the allow rule configuration. For rule enforcement, the last write to the GPO is applied.
How do I merge two or more AppLocker policies?
To merge two or more AppLocker policies Open an XML policy file in a text editor or XML editor, such as Notepad. Select the rule collection where you want to copy rules from. Select the rules that you want to add to another policy file, and then copy the text. Open the policy where you want to add the copied rules.
How does AppLocker decide whether a file is allowed to run?
When determining whether a file is permitted to run, AppLocker processes rules in the following order: Explicit deny. An administrator created a rule to deny a file. Explicit allow. An administrator created a rule to allow a file. Implicit deny.
How do I enforce AppLocker policies on Windows 10 devices?
If you are sure the rules don’t block any important apps or Windows features, change the setting to Enforce rules. The Application Identity service must be running on devices before AppLocker will enforce policies. In Windows 10, AppLocker can also be configured through the Local Group Policy editor.

Below are two helpful articles on a similar topic 👇
How do I edit or delete an AppLocker policy?What is test-applockerpolicy in PowerShell?