mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
troubleshooting
This commit is contained in:
parent
ef9b446e70
commit
41c17d7b86
@ -25,9 +25,10 @@ The following table details the two policy types to allow apps to run:
|
||||
|
||||
## WDAC supplemental policies
|
||||
|
||||
You can create WDAC supplemental policies and then deploy them through Intune.
|
||||
A *supplemental policy* can expand only one base policy, but multiple supplemental policies can expand the same base policy. When you use supplemental policies, the apps allowed by the base or its supplemental policies will be allowed to execute.\
|
||||
The base policy that you must target for Windows SE devices has a PolicyID of **{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}**.
|
||||
|
||||
To allow apps to install and run, you must write *supplemental policies* targeting the correct base policy. The base policy that you must target has a PolicyID of `{82443E1E-8A39-4B4A-96A8-F40DDC00B9F3}`.
|
||||
After you create WDAC supplemental policies, you must sign them and deploy them through Intune.
|
||||
|
||||
In the following video, Jeffrey Sutherland provides an overview and explains how to create supplemental policies for apps blocked by the E Mode policy.
|
||||
|
||||
@ -80,7 +81,7 @@ There are different ways to write a supplemental policy. The suggested method is
|
||||
1. Once you have a policy that works for your app, reset the supplemental policy's Base policy to the official Windows 11 SE BasePolicyId. From an elevated PowerShell session, run the following command:
|
||||
|
||||
```PowerShell
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to .xml from step #3>" -SupplementsBasePolicyId "{82443E1E-8A39-4B4A-96A8-F40DDC00B9F3}"
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to .xml from step #3>" -SupplementsBasePolicyId "{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}"
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
@ -109,7 +110,7 @@ UWP apps don't work out-of-box due to the Windows 11 SE E Mode policy. You can c
|
||||
1. The policy isn't yet targeting the right base policy. Run the following PowerShell command to set the base policy to the Windows 11 SE E Mode policy:
|
||||
|
||||
```PowerShell
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to.xml file from previous step>" -SupplementsBasePolicyId "{82443E1E-8A39-4B4A-96A8-F40DDC00B9F3}"
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to.xml file from previous step>" -SupplementsBasePolicyId "{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}"
|
||||
```
|
||||
|
||||
1. The creation of the supplemental policy is complete. You must sign and deploy the policy to your devices to take effect.
|
||||
|
@ -80,7 +80,7 @@ Advance to the next article to learn about important considerations for your ten
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
>
|
||||
> - [Considerations for your tenant](considerations.md)
|
||||
> [Considerations for your tenant](considerations.md)
|
||||
|
||||
[MEM-1]: /mem/intune/apps/intune-management-extension
|
||||
[WIN-4]: /windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 295 KiB After Width: | Height: | Size: 447 KiB |
Binary file not shown.
After Width: | Height: | Size: 594 KiB |
@ -13,13 +13,13 @@ The following table lists common problems and options to resolve them:
|
||||
|
||||
| **Problem** | **Potential solution** |
|
||||
|---|---|
|
||||
| **App hasn't installed** | <li>Check the type of app:<ul><li>Win32 apps should be able to install with no problem</li><li>UWP and Store apps require writing an additional supplemental policy</li></ul></li><li>Check that the managed installer policies are deployed correctly</li><li>It's possible the app is trying to execute a blocked binary. Check the AppLocker and CodeIntegrity logs in Event Viewer to see if any executables related to the app are being blocked.If so, you'll need to write a supplemental policy to support the app</li><li> Check the Intune Management Extension logs to see if there was an attempt to install your app</li>|
|
||||
| **App hasn't installed** | <li>Check the type of app:<ul><li>Win32 apps should be able to install with no problem</li><li>UWP and Store apps require writing an additional supplemental policy</li></ul></li><li>Check that the managed installer policies are deployed correctly</li><li>It's possible the app is trying to execute a blocked binary. Check the AppLocker and CodeIntegrity logs in the Event Viewer and verify if any executables related to the app are blocked. If so, you'll need to write a supplemental policy to support the app</li><li> Check the Intune Management Extension logs to see if there was an attempt to install your app</li>|
|
||||
| **App has problems when running** | It's possible the app is trying to execute a blocked binary. <br> Check the *AppLocker* and *CodeIntegrity* logs in Event Viewer to see if any executables related to the app are being blocked. If so, you'll need to write a supplemental policy to support the app. |
|
||||
| **My supplemental policy hasn't deployed** |<li>Your XML policy is malformed. Double-check to see if all markup is tagged correctly</li><li>Check that your policy was correctly applied.|
|
||||
|
||||
## WDAC Supplemental policy validation
|
||||
|
||||
Use the Event Viewer to see if a supplemental policy has deployed correctly. These rules apply to both the policy that allows managed installers and any additional supplemental policies that you deploy.
|
||||
Use the Event Viewer to see if a supplemental policy is deployed correctly. These rules apply to both the policy that allows managed installers and any supplemental policies that you deploy.
|
||||
|
||||
1. Open the *Event viewer* on a target device
|
||||
1. Expand **Applications and Services** > **Microsoft** > **Windows** > **CodeIntegrity** > **Operational**
|
||||
@ -45,11 +45,13 @@ You can also verify that the policy has been activated by running the following
|
||||
|
||||
1. Check for **error events** with code **3077**: and reference [Understanding Application Control event IDs][WIN-1]
|
||||
|
||||
:::image type="content" source="images/image9.png" alt-text="Error in the CodeIntegrity operational log":::
|
||||
:::image type="content" source="images/troubleshoot-codeintegrity-log.png" alt-text="Error in the CodeIntegrity operational log showing that PowerShell execution is prevented by policy." lightbox="images/troubleshoot-codeintegrity-log.png":::
|
||||
|
||||
When checking an error event, you can observe that the information in the *General* tab may show something like the following:
|
||||
|
||||
>`Code Integrity determined that a process (\Device\HarddiskVolume3\Windows\System32\svchost.exe) attempted to load` **`\Device\HarddiskVolume3\Program Files\Epic Games\Launcher\Portal\SelfUpdateStaging\Install\Portal\Extras\Redist\LauncherPrereqSetup_x64.exe`** `that did not meet the Enterprise signing level requirements or violated code integrity policy Policy ID:`**`{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}`**`).`
|
||||
```
|
||||
Code Integrity determined that a process (\Device\HarddiskVolume3\Windows\System32\svchost.exe) attempted to load **\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe** that did not meet the Enterprise signing level requirements or violated code integrity policy (Policy ID:**{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}**).
|
||||
```
|
||||
|
||||
The important things to parse here are:
|
||||
|
||||
@ -57,17 +59,15 @@ The important things to parse here are:
|
||||
- **Error reason**: indicates why this the application was unable to run. `...did not meet the Enterprise signing level requirements or violated code integrity policy` is what should be seen
|
||||
- **Policy ID**: is the policy that is being violated, meaning that a rule in this policy is preventing the application from running
|
||||
|
||||
> **Note**
|
||||
>
|
||||
> **`{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}`** is the base policy, which is what restricts most third-party apps from running. If you see another policy ID, it's worth taking note of that.
|
||||
> [!NOTE]
|
||||
> **{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}** is the base policy, which is what restricts most third-party apps from running. If you see another policy ID, it's worth taking note of that.
|
||||
|
||||
Alternatively you can use `cidiag.exe /stop`, which parses and copies all the relevant events to a text file.
|
||||
|
||||
## AppLocker policy validation
|
||||
|
||||
> **Note**
|
||||
>
|
||||
> The validation process described below requires access to PowerShell, which is not available on production devices.
|
||||
> [!NOTE]
|
||||
> The validation process described below requires access to PowerShell, which is not available on Windows SE devices. The process can be used to validate the policy from non-SE devices.
|
||||
|
||||
You can query the existing AppLocker policy via PowerShell running from a device.
|
||||
|
||||
@ -80,32 +80,26 @@ get-applockerpolicy -xml -effective
|
||||
- For any policies you added to set additional executables you want to be managed installers, look for the rules you defined nested under a RuleCollection section of Type *ManagedInstaller*
|
||||
|
||||
You can check the AppLocker service status with the following commands:
|
||||
|
||||
```cmd
|
||||
sc.exe query appidsvc
|
||||
sc.exe query applockerfltr
|
||||
```
|
||||
|
||||
When executing the `sc.exe query` commands, the *STATE* property should show a state of *4 RUNNING* for both services:
|
||||
When executing the `sc.exe query` commands, the **STATE** property should show a state of **4 RUNNING** for both services:
|
||||
|
||||
:::image type="content" source="images/sc-commands.png" alt-text="Output of the command sc.exe query.":::
|
||||
|
||||
## AppLocker - MSI and Script
|
||||
### AppLocker event log validation
|
||||
|
||||
1. Open the **Event Viewer** on a target device
|
||||
1. Expand **Applications and Services** > **Microsoft** > **Windows** > **AppLocker** > **MSI and Script**
|
||||
1. Check for **error events** with code *8040*, and reference [Understanding Application Control event IDs][WIN-1]
|
||||
1. Check for **error events** with code **8040**, and reference [Understanding Application Control event IDs][WIN-1]
|
||||
|
||||
## Intune Management Extension
|
||||
|
||||
- [Collect diagnostics from a Windows device][MEM-1]
|
||||
- Logs can be collected from `%programdata%\Microsoft\IntuneManagementExtension\Logs`
|
||||
|
||||
## Next steps
|
||||
|
||||
Advance to the next article to learn about additional considerations before deploying apps with managed installer.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: considerations >](./considerations.md)
|
||||
|
||||
[MEM-1]: /mem/intune/remote-actions/collect-diagnostics
|
||||
[WIN-1]: /windows/security/threat-protection/windows-defender-application-control/event-id-explanations
|
Loading…
x
Reference in New Issue
Block a user