Intune Unknown State Meme Fun

MPA Tools

TroubleshootingIntune PowerShell Scripts

There are multiple ways to run PowerShell scripts using Microsoft Intune or Microsoft Endpoint Manager (MEM). These include the in-built PowerShell feature for running scripts once, proactive remediations for scheduling script runs or fixing common support issues, and Win32 for deploying scripts as an app package.

In this article, we will focus on the in-built Intune PowerShell feature for one-time script execution. We will address the challenges in troubleshooting PowerShell scripts and explore how MPA Tools can simplify the process of identifying these issues.

Quickly about Intune management extension (IME)

Intune Management Extension (IME) improves the management of Windows devices using MDM, facilitating the transition to modern management. The IME is installed automatically on devices when either a PowerShell script or a Win32 app is targeted to the device or associated user. Upon execution of the PowerShell script, the IME downloads and runs it from the path C:\Program Files (x86)\Microsoft Intune Management Extension\Policies\Scripts. The action is recorded in the IME log file C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log.

The IME log records detailed and verbose information about every policy execution transaction. However, it can be quite challenging to find the necessary information to troubleshoot issues in your scripts. Unfortunately, the Intune portal doesn’t provide much reporting information, so we have to rely on the IME log file to see the execution return code and the resulting message (stderr or stdout) returned from the PowerShell execution environment. To demonstrate, a failed PowerShell execution can reveal a simple underlying issue that may seem obvious once discovered. However, identifying it using the Intune portal and IME log can prove to be not so obvious.

OK, our quick config

  • First, we have set up a PowerShell script in Intune titled “Remove Access Rule on System Drive” which should execute the PS script Remove-AccessRuleOnSystemDrive.ps1. This script removes the Access Control Entry in the ACL for Authenticated Users on the system drive to prevent users from creating folders on the root of C:\.
  • We have validated with stand-alone execution on a test device that the script works as intended and successfully performs the ACL changes without error.
  • However, an error is returned when we assign the “Remove Access Rule on System Drive” PowerShell script in Intune (as shown below).

Debugging Intune PowerShell Script

Intune PowerShell Script

When we click on the error, we see the device and username, but the status displays an “Unknown” error. From the portal view, there isn’t much information other than messaging to show that there was an error.

Unknown State Intune PowerShell Script

We see the same “Unknown” error status in the “Device Status” view.

PowerShell Script Device View. State Unknown.

We also see the same “Unknown” error status if we export the results in the “Device Status” view.

Intune PowerShell Script Export

Since the portal does not offer any useful information that can be used to troubleshoot the issue, we will need to investigate further using the registry and IME log. For this, we will need the policy ID, which we can retrieve from the address bar in the Intune portal (when viewing the PowerShell script configuration). In this case the policy ID is 9203dbb9-67bb-49f4-b017-45ec87c6ece6.

Intune PowerShell Script Remove Access Rule on System Drive

If we navigate to the registry path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IntuneManagementExtension\Policies and expand the registry key for policy 9203dbb9-67bb-49f4-b017-45ec87c6ece6, we can see some of the policy execution information. But unfortunately, the Result value only shows “Failed,” which doesn’t provide us with the actual PowerShell execution error. Although, in the ResultDetails value, we can see the ExecutionMessage that was returned is “3”. We are getting closer, but we still do not have any information that can tell us what the actual script error is.

Troubleshooting Intune PowerShell Script Failure Registry

Dive Deeper with Troubleshooting Intune PowerShell Script

Next, we can search the IME log file (C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log) for the policy ID. Hopefully, we will find the information we need in order to troubleshoot the script. However, we will have to do a fair amount of searching before we can find this information (as shown below).

We will now be reviewing some logs that may be difficult to read, but are extremely useful. Please follow along with me.

Debugging Intune PowerShell Script Logs

This IME log entry suggests that there was an error file generated in the C:\Program Files (x86)\Microsoft Intune Management Extension\Policies\Results folder, however, the file would need to be captured at the time of the PowerShell script execution. After which, the file is cleared from the folder (as shown below).

Debugging Intune PowerShell Script Logs

First, take a look into the highlighted in the previous picture folder, it will be empty!

If we keep searching the IME log, we eventually find the policy result, which shows as “Failed” (same as the registry value).

“Remove-LocalGroupMember : The term ‘Remove-LocalGroupMember’ is not recognized as the name of a cmdlet, function, \r\nscript file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is \r\ncorrect and try again. 

The PS script appears to have failed to execute the cmdlet Remove-LocalGroupMember, which is odd because the Remove-AccessRuleOnSystemDrive.ps1 script does not use this cmdlet. This is the “penny drop” moment when we realize the script content might be wrong.

Debugging Intune PowerShell Script Logs

If we search back up through the IME log file, we can find the PS script content and as shown below, it is clear that the PS script name is in fact Remove-AccountsFromLocalAdminGroup and not Remove-AccessRuleOnSystemDrive as expected.

Debugging Intune PowerShell Script Logs

Troubleshooting Intune PowerShell Script With MPA Tools

Now, let’s compare this painful and arduous process of trawling through the IME log file for root cause information with what MPA Tools can provide easily…

If we select the test device in MPA Tools and then select the Intune Deployed PowerShell Scripts node, we can see the failure for the “Remove Access Rule on SystemDrive” policy (as shown below).

Troubleshooting PowerShell Script Failure with MPA Tools

If we use the navigation slider to scroll to the right, we can see that the script file name is Remove-AccountsFromLocalAdminGroup.ps1. We can also see the result message is “3” (as shown before in the registry), and the error description is “The system cannot find the path specified“.

Troubleshooting PowerShell Script Failure with MPA Tools

From here, it is easy to tell that if I revisit the “Remove Access Rule on SystemDrive” Intune configuration, the script settings are not showing the correct PowerShell script and that we must have selected the wrong script when we were uploading the script during the initial configuration.

IT HAPPENS!!! 🙂

All we need to do now is to fix our PowerShell package by uploading a correct Script file.

In conclusion, MPA Tools easily provides the status messages and return codes required for troubleshooting PowerShell scripts fast and effectively, which can be done remotely before having to access the IME log file that is stored locally on the device. Granted, there may be times where extensive troubleshooting using the IME log may be required but MPA Tools will quickly provide you most of what you need to get started and point you in the right direction when it comes to resolving PowerShell script issues!

Also, Microsoft Intune troubleshooting articles can be found here

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Pin It on Pinterest

Share This