--- title: Troubleshoot App Deployment Issues In Windows Se description: Troubleshoot common issues when deploying apps to Windows SE devices. ms.date: 12/02/2024 ms.topic: tutorial appliesto: - ✅ Windows 11 SE, version 22H2 and later --- # Troubleshoot app deployment issues in Windows SE The following table lists common app deployment issues on Windows 11 SE, and options to resolve them: | **Problem** | **Potential solution** | |---|---| | **App hasn't installed** |
  • Check the type of app:
  • It's possible the app is trying to execute a blocked binary. Check the AppLocker and CodeIntegrity logs in the Event Viewer and verify if any executables related to the app are blocked. If so, you'll need to write a supplemental policy to support the app
  • Check the Intune Management Extension logs to see if there was an attempt to install your app
  • | | **App has problems when running** | It's possible the app is trying to execute a blocked binary
    Check the **AppLocker** and **CodeIntegrity** logs in Event Viewer to see if any executables related to the app are being blocked. If so, you'll need to write a supplemental policy to support the app. | | **My supplemental policy hasn't deployed** |
  • Your XML policy is malformed. Double-check to see if all markup is tagged correctly
  • Check that your policy is correctly applied| ## AppLocker policy validation To query AppLocker policies and validate that they're configured correctly, follow these steps: 1. Open the **Local Security Policy** mmc console (`secpol.msc`) 1. Select **Security Settings > Application Control Policies** 1. Right-click **AppLocker** and select **Export Policy…** :::image type="content" source="images/applocker-export-policy.png" alt-text="Screenshot of the export of the AppLocker policies from the Local Security Policy mmc console." lightbox="images/applocker-export-policy.png" border="false"::: 1. For the policy that sets the Intune Management Extension as a Managed installer, *MICROSOFT.MANAGEMENT.SERVICES.INTUNEWINDOWSAGENT.EXE* should be nested under a RuleCollection section of Type *ManagedInstaller* :::image type="content" source="images/applocker-policy-validation.png" alt-text="Screenshot of the xml file generated by the get-applockerpolicy PowerShell cmdlet." lightbox="images/applocker-policy-validation.png"::: 1. For any policies you added to set other executables you want to be managed installers, look for the rules you defined nested under a RuleCollection section of Type *ManagedInstaller* ### AppLocker service To verify that the AppLocker service is running, follow these steps: 1. Open the **Services** mmc console (`services.msc`) 1. Verify that the service **Application Identity** has a status of **Running** ### AppLocker event log validation 1. Open the **Event Viewer** on a target device 1. Expand **Applications and Services > Microsoft > Windows > AppLocker > MSI and Script** 1. Check for **error events** with code **8040**, and reference [Understanding Application Control event IDs][WIN-2] ## Intune Management Extension - [Collect diagnostics from a Windows device][MEM-1] - Logs can be collected from `%programdata%\Microsoft\IntuneManagementExtension\Logs` [MEM-1]: /mem/intune/remote-actions/collect-diagnostics [WIN-1]: /windows/security/threat-protection/windows-defender-application-control/event-tag-explanations#policy-activation-event-options [WIN-2]: /windows/security/threat-protection/windows-defender-application-control/event-id-explanations