question

heavy-d avatar image
0 Votes"
heavy-d asked LuDaiMSFT-0289 commented

Intune AppLocker policy error 0x87d101a2

I am trying to setup AppLocker polices for Intune managed devices. I exported the xml file from Windows 10 Ent device and successfully created an Intune Device Configuration Profile. Everything looked good until I when to the AppLocker policy and Device status section. It shows Deployment Status of Error. The error is 0x87d101a2. I looked it up and according to MS the error means "Syncml(418): The requested Put or Add command failed because the target already exists." I what I don't understand is, what target already exists is the error referring to? Any help would be greatly appreciated.
Thanks!!

mem-intune-device-configurations
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

yannara avatar image
0 Votes"
yannara answered yannara commented

This just my thoughts, but I believe Applocker has no built-in control mechanizm, it is "legacy" technology which is still managed only with Group Policies. Unfortunatelly I don't see Microsoft making any efford to support Applocker as it is in Intune. Bringing xml to Intune looks like tweaking for me. I love Applocker, had played years with it, but I gave this idea up when moving to Intune. I believe other Defender technologies should cover this.

· 2
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

Do you now of any documents that talk about using the Defender technologies to combat crypto type malware?
Thanks

0 Votes 0 ·

Maybe Attack Surface is something to get familiar with.

0 Votes 0 ·
LuDaiMSFT-0289 avatar image
0 Votes"
LuDaiMSFT-0289 answered LuDaiMSFT-0289 commented

@heavy-d Thanks for posting in our Q&A.

AppLocker is a feature in Windows Security and it is not a built-in feature in intune. Honestly, I'm not familiar with it.

For the Defender technologies to combat crypto type malware, I have done a lof of research. I find an article about Defending against cryptojacking with Microsoft Defender for Endpoint and Intel TDT. Please read it and check if it is what you need:
https://www.microsoft.com/security/blog/2021/04/26/defending-against-cryptojacking-with-microsoft-defender-for-endpoint-and-intel-tdt/

Hope it will help


If the answer is the right solution, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.


· 1
5 |1600 characters needed characters left characters exceeded

Up to 10 attachments (including images) can be used with a maximum of 3.0 MiB each and 30.0 MiB total.

@heavy-d I am currently standing by for further update from you and would like to know how things are going. If you have any questions or concerns on the recent information I've provided you, please don't hesitate to let me know.

0 Votes 0 ·