Introduction

This post walks through a structured approach to investigating unexpected behavior between Microsoft Intune and a managed endpoint. The scenario: you configure something in the Intune admin center, the device should apply it - but something goes wrong.

This can affect any of the following content types:

  • Device configuration and compliance profiles
  • Endpoint security profiles
  • Settings Catalog policies
  • Scripts and Remediations (formerly Proactive Remediations)
  • Win32 apps, Store apps, and LOB apps

Quick tips

  • Use the new device detail page in the admin center
  • Intune uses new communication protocols and declarative configuration through MMP-C and WinDC and Teams notification delivery Read more
  • Configuration uses the MDM protocol stack, including SyncML
  • Apps, scripts and remediation use the Intune Management Extension (IME), a dedicated service
  • Leverage properties catalog to fetch client side attributes and discover through Advanced Analytics, (Multi-) Device Query
ℹ️
Note: Device join and enrollment issues are not covered here. For Autopilot-specific troubleshooting, refer to the Autopilot Troubleshooting post.

Troubleshooting in a nutshell

Follow these steps for troubleshooting Intune managed devices:

  1. Verify if the issue is seen on multiple devices or if it only persists for a single device/user
  2. Check if the user has an Intune license assigned
  3. Ensure all required network endpoints are available
  4. No conflicts or profile errors should be visible from the admin center
  5. Verify client side reports, logs and settings
  6. If troubleshooting takes longer than > 2 hours, I recommend re-staging the device instead

Troubleshooting flow

  • Start in the Intune portal - make your change, then check the assignment and status of the profile, app, or script from the portal side first.
  • Force a sync on the device - don't wait for the next automatic check-in. Trigger a sync via the Intune portal, Company Portal, or the Windows Settings app or PowerShell.
  • Check whether the content was applied - go back to the Intune portal and look at the device or content status. Did it land successfully or is there an error?
  • If it's an app, script, or Remediation → open the IME log file. This is where app installs and script executions are recorded in detail.
  • If it's a configuration profile or Endpoint Security policy → start with the Event Viewer. Look for warnings or errors in the MDM channel around the time of the last sync.
  • Still no answer? → Run MDMDiagnosticsTool.exe and open the HTML report. It gives you a full overview of everything Intune pushed to the device and the resulting state.
  • Last resort: the Registry - verify directly whether the setting actually landed on the device and what its current effective value is.

Top sources

  • Intune portal - see applied profiles and apps to devices & users
  • Diagnostics and MDMDiagnostics - see all diagnostics data from the MDM channel
  • IntuneManagementExtension log files - IME is the component that is responsible for PowerShell scripts, apps and compliance state from Intune on the end device
  • Event viewer - most of the relevant events are displayed here, especially if you don't know where to look in particular
  • Registry - is always the last point to verify settings

1. Intune Admin Center

The admin center is always the first stop. There are three perspectives worth knowing:

From the content side (policy or app)

Navigate to a specific profile, compliance policy, or app and check:

  • Device assignment status - which devices received it and in what state
  • Per-setting status (Settings Catalog) - granular insight into which individual settings succeeded or failed
  • Last check-in time - a stale timestamp here is often the culprit before anything else

From the device side

Navigate to Devices > All Devices, select the device, and review the Tools and reports and other tabs. This gives you a full picture of everything targeted at that device.

0:00
/0:37

Troubleshooting + Support

The Troubleshooting + support blade (search for a user) shows all of their devices and the assignment status across policies, apps, and compliance. Useful when you want to quickly rule out user-specific assignment issues vs. device-specific ones.


2. Sync the Device

Before diving into logs, make sure the device has received the latest changes. The standard sync cadence for Windows is:

  • Every 3 minutes for the first 15 minutes (post-enrollment)
  • Every 15 minutes for the following 2 hours
  • Every ~8 hours thereafter
When an administrator makes any change in Intune, such as assigning a policy, modifying settings, or deleting content, the device will receive a sync notification event-based & shortly after, without waiting for the next scheduled check-in.

Do not spam sync the device multiple times in a short time period.

To force a sync:

  • From the portal: Devices > select device > Sync
  • From the device: Settings > Accounts > Access work or school > Info > Sync
  • Via PowerShell (local):
[Windows.Management.MdmSessionManager,Windows.Management,ContentType=WindowsRuntime]
$session = [Windows.Management.MdmSessionManager]::TryCreateSession()
$session.StartAsync()

3. Diagnostics and MDMDiagnosticsTool

When portal-level data isn't enough, diagnostics are the next step. You have two options:

Remote (from the Intune portal)

Select a device in the admin center and click Collect diagnostics. After a few minutes, the package appears under Device diagnostics on the left panel and can be downloaded. This is the preferred method for remote or unattended devices. It includes:

  • Registry exports
  • Event Viewer logs
  • Command outputs
  • Key log files

Local (on the device)

Open an elevated Command Prompt and run:

MDMDiagnosticsTool.exe -out C:\Temp\MDMDiag

What you get:

  • Exported event viewer entries from MDM-relevant channels
  • MDMDiagReport.html - a human-readable overview of sync state, enrolled policies, and detected errors
  • A verbose .xml file containing the full MDM sync payload

The report can also be generated from Settings > Accounts > Access work or school > Info > Create report


4. IntuneManagementExtension (IME) Logs

The Intune Management Extension handles Win32 apps, PowerShell scripts, Remediations, and compliance evaluation on Windows devices. Its log files are the go-to for anything in those categories.

Service to restart:

Log location:

C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\

Key files:

  • IntuneManagementExtension.log - Main log covering app installs, script execution, and policy evaluation
  • AgentExecutor.log - PowerShell and Remediation script output
  • ClientHealth.log - IME health evaluation
  • Sensor.log - Endpoint analytics data collection

Recommended tool: CMTrace for real-time log highlighting. Focus on yellow (warning) and red (error) entries and read the surrounding lines for context.


5. Event Viewer

The Event Viewer is useful for finding events you weren't specifically looking for broad issues with MDM communication, Entra ID join state, and enrollment status show up here.

Primary Intune channel:

Applications and Services Logs > Microsoft > Windows >
DeviceManagement-Enterprise-Diagnostics-Provider

Filter the log to Critical, Error, and Warning levels to reduce noise. Additional relevant channels.


6. Registry

The registry is the final confirmation point - use it to verify whether a specific setting actually landed on the device, regardless of what the portal says.

Key paths:

MDM policy area: HKLM:\SOFTWARE\Microsoft\PolicyManager\


More information

  • Every device must have an Intune MDM device certificate Read more
  • Use Oli Kieselbachs SyncML viewer for further sync insights
  • Speedup / troubleshoot Proactive Remediation
  • If you are looking for Edge settings, open Edge and type edge://policy in the address bar to see the applied policies
  • Multi Admin Approval can block certain admin actions and requires a dual control system Read more

powered by Oceanleaf

Oceanleaf
Technology blog on Microsoft Cloud. Learn about cutting edge tech, explained simply & straightforward in quality focused blog posts.
You’ve successfully subscribed to Oceanleaf
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.