Skip to content

Latest commit

 

History

History
184 lines (111 loc) · 11.3 KB

troubleshoot-policies-in-microsoft-intune.md

File metadata and controls

184 lines (111 loc) · 11.3 KB
title description keywords author ms.author manager ms.date ms.topic ms.service ms.localizationpriority ms.technology ms.assetid ROBOTS ms.reviewer ms.suite search.appverid ms.custom ms.collection
Troubleshoot policies in Microsoft Intune - Azure | Microsoft Docs
See how to use the built-in troubleshoot feature, and read about Common problems or issues and their resolutions when using compliance policies and configuration profiles in Microsoft Intune
MandiOhlinger
mandia
dougeby
06/20/2019
troubleshooting
microsoft-intune
medium
99fb6db6-21c5-46cd-980d-50f063ab8ab8
tscott
ems
MET150
intune-classic
M365-identity-device-management

Troubleshoot policies and profiles and in Intune

Microsoft Intune includes some built-in troubleshooting features. Use these features to help troubleshoot compliance policies and configuration profiles in your environment.

This article lists some common troubleshooting techniques, and describes some issues you may experience.

Check tenant status

Check the Tenant Status and confirm the subscription is Active. You can also view details for active incidents and advisories that may impact your policy or profile deployment.

Use built-in troubleshooting

  1. In Intune, select Troubleshoot:

    In Intune, go to Help and Support, and select Troubleshoot

  2. Choose Select user > select the user having an issue > Select.

  3. Confirm that Intune License and Account Status both show green checks:

    In Intune, select the user and confirm Account status and Intune license show green checks marks for the status

    Helpful links:

  4. Under Devices, find the device having an issue. Review the different columns:

    • Managed: For a device to receive compliance or configuration policies, this property must show MDM or EAS/MDM.

      • If Managed isn't set to MDM or EAS/MDM, then the device isn't enrolled. It doesn't receive compliance or configuration policies until it's enrolled.

      • App protection policies (mobile application management) don't require devices to be enrolled. For more information, see create and assign app protection policies.

    • Azure AD Join Type: Should be set to Workplace or AzureAD.

      • If this column is Not Registered, there may be an issue with enrollment. Typically, unenrolling and re-enrolling the device resolves this state.
    • Intune compliant: Should be Yes. If No is shown, there may be an issue with compliance policies, or the device isn't connecting to the Intune service. For example, the device may be turned off, or may not have a network connection. Eventually, the device becomes non-compliant, possibly after 30 days.

      For more information, see get started with device compliance policies.

    • Azure AD compliant: Should be Yes. If No is shown, there may be an issue with compliance policies, or the device isn't connecting to the Intune service. For example, the device may be turned off, or may not have a network connection. Eventually, the device becomes non-compliant, possibly after 30 days.

      For more information, see get started with device compliance policies.

    • Last check in: Should be a recent time and date. By default, Intune devices check in every 8 hours.

      • If Last check in is more than 24 hours, there may be an issue with the device. A device that can't check in can't receive your policies from Intune.

      • To force check-in:

        • On the Android device, open the Company Portal app > Devices > Choose the device from list > Check Device Settings.
        • On the iOS device, open the Company portal app > Devices > Choose the device from list > Check Settings.
      • On a Windows device, open Settings > Accounts > Access Work or School > Select the account or MDM enrollment > Info > Sync.

    • Select the device to see policy-specific information.

      Device Compliance shows the states of compliance policies assigned to the device.

      Device Configuration shows the states of configuration policies assigned to the device.

      If the expected policies aren't shown under Device Compliance or Device Configuration, then the policies aren't targeted correctly. Open the policy, and assign the policy to this user or device.

      Policy states:

      • Not Applicable: This policy isn't supported on this platform. For example, iOS policies don't work on Android. Samsung KNOX policies don't work on Windows devices.
      • Conflict: There's an existing setting on the device that Intune can't override. Or, you deployed two policies with the same setting using different values.
      • Pending: The device hasn't checked into Intune to get the policy. Or, the device received the policy but hasn't reported the status to Intune.
      • Errors: Look up errors and possible resolutions at Troubleshoot company resource access problems.

      Helpful links:

You're unsure if a profile is correctly applied

  1. Sign in to Intune.

  2. Select Devices > All devices > select the device > Device configuration.

    Every device lists its profiles. Each profile has a Status. The status applies when all of the assigned profiles, including hardware and OS restrictions and requirements, are considered together. Possible statuses include:

    • Conforms: The device received the profile and reports to Intune that it conforms to the setting.

    • Not applicable: The profile setting isn't applicable. For example, email settings for iOS devices don't apply to an Android device.

    • Pending: The profile is sent to the device, but hasn't reported the status to Intune. For example, encryption on Android requires the user to enable encryption, and might show as pending.

Helpful link: Monitor configuration device profiles

Note

When two policies with different levels of restriction apply to the same device or user, the more restrictive policy applies.

Policy troubleshooting resources

Alert: Saving of Access Rules to Exchange has Failed

Issue: You receive the alert Saving of Access Rules to Exchange has Failed in the admin console.

If you create policies in the Exchange On-Premises Policy workspace (Admin console), but are using Office 365, then the configured policy settings aren't enforced by Intune. In the alert, note the policy source. Under the Exchange On-premises Policy workspace, delete the legacy rules. The legacy rules are Global Exchange rules within Intune for on-premises Exchange, and aren't relevant to Office 365. Then, create new policy for Office 365.

Troubleshoot the Intune on-premises Exchange connector may be a good resource.

Can't change security policies for enrolled devices

Windows Phone devices don't allow security policies set using MDM or EAS to be reduced in security once you've set them. For example, you set a Minimum number of character password to 8, and then try to reduce it to 4. The more restrictive policy is applied to the device.

Windows 10 devices may not remove security policies when you unassign the policy (stop deployment). You may need to leave the policy assigned, and then change the security settings back to the default values.

Depending on the device platform, if you want to change the policy to a less secure value, you may need to reset the security policies.

For example, in Windows 8.1, on the desktop, swipe in from right to open the Charms bar. Choose Settings > Control Panel > User Accounts. On the left, select Reset Security Policies link, and choose Reset Policies.

Other platforms, such as Android, iOS, and Windows Phone 8.1, may need to be retired and re-enrolled to apply a less restrictive policy.

Troubleshoot device enrollment may be a good resource.

PCs using the Intune software client - classic portal

Note

This section applies to the classic portal.

Microsoft Intune policy-related errors in policyplatform.log

For Windows PCs managed with the Intune software client, policy errors in the policyplatform.log file may be from non-default settings in the Windows User Account Control (UAC) on the device. Some non-default UAC settings can affect Microsoft Intune client installations and policy execution.

Resolve UAC issues

  1. Retire the computer. See Remove devices.

  2. Wait 20 minutes for the client software to be removed.

    [!NOTE] Don't attempt to remove the client from Programs and Features.

  3. On the start menu, type UAC to open the User Account Control settings.

  4. Move the notification slider to the default setting.

ERROR: Cannot obtain the value from the computer, 0x80041013

Occurs if the time on the local system is out of sync by five minutes or more. If the time on the local computer is out of sync, secure transactions fail because the time stamps are invalid.

To resolve this issue, set the local system time as close as possible to Internet time. Or, set it to the time on the domain controllers on the network.

Next steps

Common issues and resolutions with email profiles

Get support help from Microsoft, or use the community forums.