So if you are using PMPC you do know its really good product by now. But what if you don’t have servers anymore to publish your products?
Patch My PC addressed this problem by developing online portal (https://portal.patchmypc.com/). Its not at all perfect at the moment. Its still being developed. But this is still a quick browse through:
This is the basic example of what it looks like.
Deployments can be made using the portal as well as updates and uninstalls.
This is really simple and well thought out. More features are incoming but I’d venture a guess that this will be the use case in the future.
The above has also guides on how to onboard to your cloud with patch my pc portal. There is no point of me taking the steps once again, as PMPC does documentation better than I do. My main goal was just to basically promote this as the current users of PMPC doesn’t even know they currently has the option to use this even. So it doesn’t hurt to acknowledge there is other ways to use PMPC product as well.
Lets be clear. There are easier ways of doing this but I am not looking for a cut corners solution. I have made a multi app based kiosk with powershell scripts as Windows 11 and multi app kiosks are not really thought through.
Win11 leaves too much wiggle room for kioskuser so I make the assigned access by hand. And oh boy what problems does this make…
So in short I make a kiosk that has basics in place. Lets say browsers, Nomacs – Image Lounge, shutdown and explorer.
Setup is quite basic. So last month Microsoft did something to Windows 11 and when running this idea of kiosks then you’ll lose ability to see desktop after 2024-10-cumulative update. Have not seen why this is but… It is what it is.
So now you have to make your own task bar icons so you have start menu and task bar to allow your kioskuser to fuction well. I would rather had desktop but M$ doesn’t agree.
Limiting Win11 kiosk experience
So now we have a bases setup for you if you’d choose this way. There is much uncertainty based on this so I wouldn’t recommend this unless you wanted more security.
So my idea is to use xml and have kioskuser0 be added to guest group. This will strict down access quite a bit and user will only allowed to use locally installed application – no UWP apps available.
So all needs to be setup in xml that then is imported to powershell and I use app install to use it in Intune. Powershell has scheduled tasks so there will be nothing left after the session is booted. All downloads will be removed, on log in and shutdown.
# Specify the username of the user you want to add to the Guests group
$username = "KioskUser0"
# Check if the user exists
$user = Get-LocalUser -Name $username -ErrorAction SilentlyContinue
if ($user) {
# Check if the Guests group exists
if (Get-LocalGroup -SID "S-1-5-32-546" -ErrorAction SilentlyContinue) {
Add-LocalGroupMember -SID "S-1-5-32-546" -Member $username
Write-Host "User '$username' successfully added to the 'Guests' group."
Write-Host "Password for '$username' set to never expire."
} else {
Write-Host "Error: The 'Guests' group does not exist."
}
} else {
Write-Host "Error: User '$username' does not exist."
}
# Set password to never expire
$user | Set-LocalUser -PasswordNeverExpires $true
So for me this is a key feature on this. You really do need to do this when using Win11. Well this i my opinion of course.
I don’t want to bore you with massive texts so lets put the key piece in here to emphasize what assigned was in this example:
This is NOT the whole assigned access. This is only an example that has the required parts. So please don’t use this as “whole xml” since its not. You need to put your own layout but might use this as an example.
How Windows 11 kiosk looks
Virtual machine will get desktop so bare this in mind. As this is a virtual machine, it will actually see the public desktop icons. This is why there is a full screen explorer open, so you will not have false sense of hope that you can use desktopicons with Win11 kiosk. This is not something you will experience with proper computer:
There will be the option to use removeable drives but with VM being the test subject there is none available. It works tho.
Updated: This is an example of a real computer screen. Finnish OS that has been built with Windows 11 kiosk with limited access to only Downloads and removable drives. All the icons that should be in users desktop are gone. There are all icons in available in the public desktop, but kioskuser0 will not see these after last CU update and running the autopilot after these updates.
I bet when you have been googling, you haven’t found anything worthy results that actually makes the security portals hide the classic teams. Well I made a script that is bad, I mean its bad as it really should have been Microsoft all along to fix this and not IT admins.
So this can be done with application based “install” or remediation based script.
SCCM – Application example
Detection method:
# Microsoft Teams Classic Uninstall Detection
$goRemediate = $false
$UserProfiles = Get-ChildItem "C:\Users" -Directory
$TeamsClassicFound = $false
foreach ($profile in $UserProfiles) {
$TeamsClassicPath = "$($profile.FullName)\AppData\Local\Microsoft\Teams\current\Teams.exe"
if (Test-Path $TeamsClassicPath) {
#write-host "Teams Classic found in user profile located in $($profile.FullName), setting remediation needs to $true"
$TeamsClassicFound = $true
break
}
}
if (!$TeamsClassicFound) {
#write-host "No Teams Classic found." -ForegroundColor Green
} else {
# write-host "Teams Classic was found, needs to be remediated."
$goRemediate = $true
}
$registryPath = @(
"HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
$MachineWide = Get-ItemProperty -Path $registryPath | Where-Object -Property DisplayName -eq "Teams Machine-Wide Installer"
$classic = Get-WmiObject -Query "SELECT * FROM Win32_Product WHERE Name = 'Microsoft Teams classic'"
$hkuKeys = Get-ChildItem -Path "Registry::HKEY_USERS"
foreach ($userKey in $hkuKeys) {
$teamsKeyPath = "Registry::HKEY_USERS\$($userKey.PSChildName)\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Teams"
if (Test-Path $teamsKeyPath) {
# write-host "User registry still lurking, setting remediation needs to $true"
$goRemediate = $true
}
}
if ($MachineWide) {
#write-host "Still lurking: Teams Machine-Wide Installer, setting remediation needs to $true"
$goRemediate = $true
}
if ($classic) {
#write-host "Still lurking: Microsoft Teams Classic Installer, setting remediation needs to $true"
$goRemediate = $true
}
# Finding SIDs for loop
$PatternSID = 'S-1-5-\d+-\d+-\d+\-\d+\-\d+$'
# Get Username, SID, and location of ntuser.dat for all users
$ProfileList = gp 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\*' | Where-Object {$_.PSChildName -match $PatternSID} |
Select @{name="SID";expression={$_.PSChildName}},
@{name="UserHive";expression={"$($_.ProfileImagePath)\ntuser.dat"}},
@{name="Username";expression={$_.ProfileImagePath -replace '^(.*[\\\/])', ''}}
# Get all user SIDs found in HKEY_USERS (ntuder.dat files that are loaded)
$LoadedHives = gci Registry::HKEY_USERS | ? {$_.PSChildname -match $PatternSID} | Select @{name="SID";expression={$_.PSChildName}}
# Get all users that are not currently logged
$UnloadedHives = Compare-Object $ProfileList.SID $LoadedHives.SID | Select @{name="SID";expression={$_.InputObject}}, UserHive, Username
# Loop through each profile on the machine
Foreach ($item in $ProfileList) {
IF ($item.SID -in $UnloadedHives.SID) {
reg load HKU\$($Item.SID) $($Item.UserHive) | Out-Null
}
# Check and potentially remove outdated Teams versions
$teamsUninstallKeys = Get-ItemProperty registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\Teams*
if ($teamsUninstallKeys) {
foreach ($teamsKey in $teamsUninstallKeys) {
#write-host "Teams found in user profile: $($item.Username) with version $displayVersion"
$goRemediate = $true
}
}
}
IF ($item.SID -in $UnloadedHives.SID) {
[gc]::Collect()
reg unload HKU\$($item.SID) | Out-Null
}
if (!$goRemediate) {
write-output "Installed."
}
So as you might wonder. This is reverse logic. If not found then Installed. This app is only to remove and use “INSTALL” as the logic of which is build:
So there you have the detection method and why its done weirdly.
Application install – SCCM
#"C:\ProgramData\Microsoft\IntuneManagementExtension\Logs"
#"C:\Windows\CCM\Logs\TeamsUninstaller.log"
$logFilePath = "C:\ProgramData\Microsoft\IntuneManagementExtension\Logs"
function Log-Message {
param (
[string]$Message
)
$timestamp = Get-Date -Format "yyyy-MM-dd HH:mm:ss"
Add-Content -Path $logFilePath -Value "$timestamp - $Message"
}
$UserProfiles = Get-ChildItem "C:\Users" -Directory
$TeamsClassicFound = $false
foreach ($profile in $UserProfiles) {
$TeamsClassicPath = "$($profile.FullName)\AppData\Local\Microsoft\Teams\current\Teams.exe"
if (Test-Path $TeamsClassicPath) {
Log-Message "Teams Classic found in user profile located in $($profile.FullName)"
}
}
if (!$TeamsClassicFound) {
Log-Message "No Teams Classic found."
}
$registryPath = @(
"HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
$MachineWide = Get-ItemProperty -Path $registryPath | Where-Object -Property DisplayName -eq "Teams Machine-Wide Installer"
Log-Message "$($MachineWide.DisplayName) Was found in the installed applications."
$hkuKeys = Get-ChildItem -Path "Registry::HKEY_USERS"
foreach ($userKey in $hkuKeys) {
$teamsKeyPath = "Registry::HKEY_USERS\$($userKey.PSChildName)\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Teams"
if (Test-Path $teamsKeyPath) {
Log-Message "User registry still lurking, setting remediation needs to true"
}
}
function Uninstall-TeamsClassic($TeamsPath) {
try {
$process = Start-Process -FilePath "$TeamsPath\Update.exe" -ArgumentList "--uninstall /s" -PassThru -Wait -ErrorAction Stop
if ($process.ExitCode -ne 0) {
Log-Message "Uninstallation failed with exit code $($process.ExitCode)."
}
}
catch {
Log-Message "Uninstallation failed: $($_.Exception.Message)"
}
}
$AllUsers = Get-ChildItem -Path "$($ENV:SystemDrive)\Users"
foreach ($User in $AllUsers) {
Log-Message "Processing user: $($User.Name)"
$localAppData = "$($ENV:SystemDrive)\Users\$($User.Name)\AppData\Local\Microsoft\Teams"
$programData = "$($env:ProgramData)\$($User.Name)\Microsoft\Teams"
if (Test-Path "$localAppData\Current\Teams.exe") {
Log-Message "Uninstall Teams for user $($User.Name)"
Uninstall-TeamsClassic -TeamsPath $localAppData
} elseif (Test-Path "$programData\Current\Teams.exe") {
Log-Message "Uninstall Teams for user $($User.Name)"
Uninstall-TeamsClassic -TeamsPath $programData
} else {
Log-Message "Teams installation not found for user $($User.Name)"
}
}
$TeamsIcon_old = "$($ENV:SystemDrive)\Users\*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft Teams*.lnk"
Get-Item $TeamsIcon_old | Remove-Item -Force -Recurse
$registryPath = @(
"HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
$MachineWide = Get-ItemProperty -Path $registryPath | Where-Object -Property DisplayName -eq "Teams Machine-Wide Installer"
if ($MachineWide) {
$registryKeyPath = $MachineWide.PSPath
$cleanRegistryPath = $registryKeyPath -replace "Microsoft.PowerShell.Core\\Registry::", "Registry::"
Remove-Item -Path $cleanRegistryPath -Recurse -Force
} else {
Log-Message "Teams Machine-Wide Installer not found in the registry."
}
$PatternSID = 'S-1-5-\d+-\d+-\d+\-\d+\-\d+$'
$ProfileList = Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\*' | Where-Object {$_.PSChildName -match $PatternSID} |
Select @{name="SID";expression={$_.PSChildName}},
@{name="UserHive";expression={"$($_.ProfileImagePath)\ntuser.dat"}},
@{name="Username";expression={$_.ProfileImagePath -replace '^(.*[\\\/])', ''}}
$LoadedHives = Get-ChildItem Registry::HKEY_USERS | Where-Object {$_.PSChildname -match $PatternSID} | Select @{name="SID";expression={$_.PSChildName}}
$UnloadedHives = Compare-Object $ProfileList.SID $LoadedHives.SID | Select @{name="SID";expression={$_.InputObject}}, UserHive, Username
function Load-Hive {
param (
[string]$SID,
[string]$HivePath
)
$maxRetries = 2
$retryDelay = 2 # seconds
for ($attempt = 1; $attempt -le $maxRetries; $attempt++) {
try {
# Attempt to load the hive
reg load HKU\$SID $HivePath | Out-Null
Log-Message "Successfully loaded hive for SID $SID"
return $true
} catch {
Log-Message "Failed to load hive for SID $SID on attempt: $(${_}.Exception.Message)"
if ($attempt -lt $maxRetries) {
Log-Message "Retrying in $retryDelay seconds..."
Start-Sleep -Seconds $retryDelay
} else {
Log-Message "Maximum retries reached for loading hive $SID. Skipping this profile."
return $false
}
}
}
}
foreach ($item in $ProfileList) {
Log-Message "Checking $($item.Username)"
if ($item.SID -in $UnloadedHives.SID) {
Log-Message "Hive not loaded for $($item.Username). Attempting to load hive."
$hiveLoaded = Load-Hive -SID $item.SID -HivePath $item.UserHive
if (-not $hiveLoaded) {
Log-Message "Skipping user $($item.Username) due to failed hive load."
continue
}
}
$teamsUninstallKeys = Get-ItemProperty registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\Teams*
if ($teamsUninstallKeys) {
foreach ($teamsKey in $teamsUninstallKeys) {
# Remove the Teams uninstall key
Remove-Item -Path "registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\$($teamsKey.PSChildName)" -Recurse
# Remove Teams folder from profile
if ($teamsPath) {
Remove-Item -Path $teamsPath -Recurse -Force
}
}
}
if ($item.SID -in $UnloadedHives.SID) {
Log-Message "Unloading hive for $($item.Username)"
[gc]::Collect()
reg unload HKU\$($item.SID) | Out-Null
}
}
exit 0
This to run on client that have detected that there are still hints of Legacy Teams in user profiles or in some user accounts appdata folder.
But that’s that then. Deploy with caution. This isn’t very professional way to approach this, but neither was Microsoft’s approach to deploy new teams and not do anything for legacy Teams.
Intune Remediation
Discovery script:
# Microsoft Teams Classic Uninstall Detection
$goRemediate = $false
$UserProfiles = Get-ChildItem "C:\Users" -Directory
$TeamsClassicFound = $false
foreach ($profile in $UserProfiles) {
$TeamsClassicPath = "$($profile.FullName)\AppData\Local\Microsoft\Teams\current\Teams.exe"
if (Test-Path $TeamsClassicPath) {
#write-host "Teams Classic found in user profile located in $($profile.FullName), setting remediation needs to $true"
$TeamsClassicFound = $true
break
}
}
if (!$TeamsClassicFound) {
#write-host "No Teams Classic found." -ForegroundColor Green
} else {
# write-host "Teams Classic was found, needs to be remediated."
$goRemediate = $true
}
$registryPath = @(
"HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
$MachineWide = Get-ItemProperty -Path $registryPath | Where-Object -Property DisplayName -eq "Teams Machine-Wide Installer"
$classic = Get-WmiObject -Query "SELECT * FROM Win32_Product WHERE Name = 'Microsoft Teams classic'"
$hkuKeys = Get-ChildItem -Path "Registry::HKEY_USERS"
foreach ($userKey in $hkuKeys) {
$teamsKeyPath = "Registry::HKEY_USERS\$($userKey.PSChildName)\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Teams"
if (Test-Path $teamsKeyPath) {
# write-host "User registry still lurking, setting remediation needs to $true"
$goRemediate = $true
}
}
if ($MachineWide) {
#write-host "Still lurking: Teams Machine-Wide Installer, setting remediation needs to $true"
$goRemediate = $true
}
if ($classic) {
#write-host "Still lurking: Microsoft Teams Classic Installer, setting remediation needs to $true"
$goRemediate = $true
}
# Define minimum acceptable version (replace with your desired version)
$minVersion = "1.7.0.4689"
# Finding SIDs for loop
$PatternSID = 'S-1-5-\d+-\d+-\d+\-\d+\-\d+$'
# Get Username, SID, and location of ntuser.dat for all users
$ProfileList = gp 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\*' | Where-Object {$_.PSChildName -match $PatternSID} |
Select @{name="SID";expression={$_.PSChildName}},
@{name="UserHive";expression={"$($_.ProfileImagePath)\ntuser.dat"}},
@{name="Username";expression={$_.ProfileImagePath -replace '^(.*[\\\/])', ''}}
# Get all user SIDs found in HKEY_USERS (ntuder.dat files that are loaded)
$LoadedHives = gci Registry::HKEY_USERS | ? {$_.PSChildname -match $PatternSID} | Select @{name="SID";expression={$_.PSChildName}}
# Get all users that are not currently logged
$UnloadedHives = Compare-Object $ProfileList.SID $LoadedHives.SID | Select @{name="SID";expression={$_.InputObject}}, UserHive, Username
# Loop through each profile on the machine
Foreach ($item in $ProfileList) {
IF ($item.SID -in $UnloadedHives.SID) {
reg load HKU\$($Item.SID) $($Item.UserHive) | Out-Null
}
# Check and potentially remove outdated Teams versions
$teamsUninstallKeys = Get-ItemProperty registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\Teams*
if ($teamsUninstallKeys) {
foreach ($teamsKey in $teamsUninstallKeys) {
$displayVersion = $teamsKey.DisplayVersion
if ($displayVersion -lt $minVersion) {
#write-host "Teams found in user profile: $($item.Username) with version $displayVersion"
$goRemediate = $true
}
}
}
IF ($item.SID -in $UnloadedHives.SID) {
[gc]::Collect()
reg unload HKU\$($item.SID) | Out-Null
}
}
if (!$goRemediate) {
write-output "Installed."
}
if ($goRemediate) {
write-host "Issues detected. Proceeding with remediation."
exit 1
} else {
write-host "No issues detected. No remediation needed."
exit 0
}
Remediation:
#"C:\ProgramData\Microsoft\IntuneManagementExtension\Logs"
#"C:\Windows\CCM\Logs\TeamsUninstaller.log"
$logFilePath = "C:\ProgramData\Microsoft\IntuneManagementExtension\Logs"
function Log-Message {
param (
[string]$Message
)
$timestamp = Get-Date -Format "yyyy-MM-dd HH:mm:ss"
Add-Content -Path $logFilePath -Value "$timestamp - $Message"
}
$UserProfiles = Get-ChildItem "C:\Users" -Directory
$TeamsClassicFound = $false
foreach ($profile in $UserProfiles) {
$TeamsClassicPath = "$($profile.FullName)\AppData\Local\Microsoft\Teams\current\Teams.exe"
if (Test-Path $TeamsClassicPath) {
Log-Message "Teams Classic found in user profile located in $($profile.FullName)"
}
}
if (!$TeamsClassicFound) {
Log-Message "No Teams Classic found."
}
$registryPath = @(
"HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
$MachineWide = Get-ItemProperty -Path $registryPath | Where-Object -Property DisplayName -eq "Teams Machine-Wide Installer"
Log-Message "$($MachineWide.DisplayName) Was found in the installed applications."
$hkuKeys = Get-ChildItem -Path "Registry::HKEY_USERS"
foreach ($userKey in $hkuKeys) {
$teamsKeyPath = "Registry::HKEY_USERS\$($userKey.PSChildName)\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Teams"
if (Test-Path $teamsKeyPath) {
Log-Message "User registry still lurking, setting remediation needs to true"
}
}
function Uninstall-TeamsClassic($TeamsPath) {
try {
$process = Start-Process -FilePath "$TeamsPath\Update.exe" -ArgumentList "--uninstall /s" -PassThru -Wait -ErrorAction Stop
if ($process.ExitCode -ne 0) {
Log-Message "Uninstallation failed with exit code $($process.ExitCode)."
}
}
catch {
Log-Message "Uninstallation failed: $($_.Exception.Message)"
}
}
$AllUsers = Get-ChildItem -Path "$($ENV:SystemDrive)\Users"
foreach ($User in $AllUsers) {
Log-Message "Processing user: $($User.Name)"
$localAppData = "$($ENV:SystemDrive)\Users\$($User.Name)\AppData\Local\Microsoft\Teams"
$programData = "$($env:ProgramData)\$($User.Name)\Microsoft\Teams"
if (Test-Path "$localAppData\Current\Teams.exe") {
Log-Message "Uninstall Teams for user $($User.Name)"
Uninstall-TeamsClassic -TeamsPath $localAppData
} elseif (Test-Path "$programData\Current\Teams.exe") {
Log-Message "Uninstall Teams for user $($User.Name)"
Uninstall-TeamsClassic -TeamsPath $programData
} else {
Log-Message "Teams installation not found for user $($User.Name)"
}
}
$TeamsIcon_old = "$($ENV:SystemDrive)\Users\*\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft Teams*.lnk"
Get-Item $TeamsIcon_old | Remove-Item -Force -Recurse
$registryPath = @(
"HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*",
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
$MachineWide = Get-ItemProperty -Path $registryPath | Where-Object -Property DisplayName -eq "Teams Machine-Wide Installer"
if ($MachineWide) {
$registryKeyPath = $MachineWide.PSPath
$cleanRegistryPath = $registryKeyPath -replace "Microsoft.PowerShell.Core\\Registry::", "Registry::"
Remove-Item -Path $cleanRegistryPath -Recurse -Force
} else {
Log-Message "Teams Machine-Wide Installer not found in the registry."
}
$PatternSID = 'S-1-5-\d+-\d+-\d+\-\d+\-\d+$'
$ProfileList = Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\*' | Where-Object {$_.PSChildName -match $PatternSID} |
Select @{name="SID";expression={$_.PSChildName}},
@{name="UserHive";expression={"$($_.ProfileImagePath)\ntuser.dat"}},
@{name="Username";expression={$_.ProfileImagePath -replace '^(.*[\\\/])', ''}}
$LoadedHives = Get-ChildItem Registry::HKEY_USERS | Where-Object {$_.PSChildname -match $PatternSID} | Select @{name="SID";expression={$_.PSChildName}}
$UnloadedHives = Compare-Object $ProfileList.SID $LoadedHives.SID | Select @{name="SID";expression={$_.InputObject}}, UserHive, Username
function Load-Hive {
param (
[string]$SID,
[string]$HivePath
)
$maxRetries = 2
$retryDelay = 2 # seconds
for ($attempt = 1; $attempt -le $maxRetries; $attempt++) {
try {
# Attempt to load the hive
reg load HKU\$SID $HivePath | Out-Null
Log-Message "Successfully loaded hive for SID $SID"
return $true
} catch {
Log-Message "Failed to load hive for SID $SID on attempt: $(${_}.Exception.Message)"
if ($attempt -lt $maxRetries) {
Log-Message "Retrying in $retryDelay seconds..."
Start-Sleep -Seconds $retryDelay
} else {
Log-Message "Maximum retries reached for loading hive $SID. Skipping this profile."
return $false
}
}
}
}
foreach ($item in $ProfileList) {
Log-Message "Checking $($item.Username)"
if ($item.SID -in $UnloadedHives.SID) {
Log-Message "Hive not loaded for $($item.Username). Attempting to load hive."
$hiveLoaded = Load-Hive -SID $item.SID -HivePath $item.UserHive
if (-not $hiveLoaded) {
Log-Message "Skipping user $($item.Username) due to failed hive load."
continue
}
}
$teamsUninstallKeys = Get-ItemProperty registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\Teams*
if ($teamsUninstallKeys) {
foreach ($teamsKey in $teamsUninstallKeys) {
# Remove the Teams uninstall key
Remove-Item -Path "registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\$($teamsKey.PSChildName)" -Recurse
# Remove Teams folder from profile
if ($teamsPath) {
Remove-Item -Path $teamsPath -Recurse -Force
}
}
}
if ($item.SID -in $UnloadedHives.SID) {
Log-Message "Unloading hive for $($item.Username)"
[gc]::Collect()
reg unload HKU\$($item.SID) | Out-Null
}
}
exit 0
That’s that then. Try and be careful. Do not deploy to all computers at once.
Intune and SCCM has remediation scripts available. The basic idea of these are that you do a detection script weather you should run a fix or not for the client. Idea is to gather all the local admin accounts and groups and whitelist the wanted groups.
In my case I run the script with Intune and detect local admin accounts and output the admin accounts if detected.
<#
Script written by Tommi Voutilainen
Set whitelisted account so you allow some admins to stay in your computer. Whitelisted account on the base script are Domain admins group and local admin WindowsLAPS. Note there is no example of Intune admin groups.
#>
# Specify the SID prefix for the built-in administrator account
$AdminSIDPrefix = "S-1-5-21-*-500"
$adminAccounts = Get-WmiObject -Class Win32_UserAccount | Where-Object { $_.SID -like "$AdminSIDPrefix*" }
# Whitelisted users who are allowed to remain in the local administrator group
$whitelist = @("Domain Admins", "WindowsLAPS")
$adminAccounts | ForEach-Object {
if ($_ -notin $whitelist) {
$whitelist += $_.Name
}
}
# Specify the SID for the Administrators group
$remediate = $false
$AdminGroupSid = "S-1-5-32-544"
$AdminGroup = New-Object System.Security.Principal.SecurityIdentifier($AdminGroupSid)
$AdminGroupName = $AdminGroup.Translate([System.Security.Principal.NTAccount]).Value -replace '.+\\'
$localAdmins = (([ADSI]"WinNT://./$AdminGroupName").psbase.Invoke('Members') | % {$_.GetType().InvokeMember('AdsPath','GetProperty',$null,$($_),$null)}) -match '^WinNT'| %{$_.Replace("WinNT://","")}
foreach ($adminUser in $localAdmins) {
$adminUser = $adminUser.Replace('/', '\')
$whitelistUsername = ($adminUser -split '\\')[-1]
if ($whitelist -notcontains $whitelistUsername) {
write-output "Found $adminUser from local admin group. Going to Remediation."
$Remediate = $true
}
else {
#Log -Message "Whitelisted user: $adminUser was found." -Type "Warning"
}
}
if ($remediate) {
exit 1
}
else {
exit 0
}
The above is detection script for local admin accounts present with whitelisted group of Domain admins and local user WindowsLAPS.
<#
Script written by Tommi Voutilainen
Set Log file according to SCCM or Something else...
C:\Windows\CCM\Logs\AdminUsers.log"
C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\AdminUsers.log
#>
# Specify the SID prefix for the built-in administrator account
$AdminSIDPrefix = "S-1-5-21-*-500"
$adminAccounts = Get-WmiObject -Class Win32_UserAccount | Where-Object { $_.SID -like "$AdminSIDPrefix*" }
# Whitelisted users who are allowed to remain in the local administrator group
$whitelist = @("Domain Admins", "WindowsLAPS")
$adminAccounts | ForEach-Object {
if ($_ -notin $whitelist) {
$whitelist += $_.Name
}
}
function Log {
Param (
[Parameter(Mandatory=$false)]
$Message,
[Parameter(Mandatory=$false)]
$ErrorMessage,
[Parameter(Mandatory=$false)]
$Component,
[Parameter(Mandatory=$false)]
$Type,
[Parameter(Mandatory=$false)]
$LogFile
)
# Mapping string type values to integer values
$typeMap = @{
"Normal" = 1
"Warning" = 2
"Error" = 3
}
$Time = Get-Date -Format "HH:mm:ss.ffffff"
$Date = Get-Date -Format "MM-dd-yyyy"
$LogFile = "C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\AdminUsers.log" # Remember to set this one
if ($ErrorMessage -ne $null) {
$Type = "Error"
}
if ($Component -eq $null) {
$Component = "Temporary Admin Rights"
}
if ($Type -eq $null) {
$Type = "Normal"
}
$LogMessage = "<![LOG[$Message $ErrorMessage" + "]LOG]!><time=`"$Time`" date=`"$Date`" component=`"$Component`" context=`"`" type=`"$($typeMap[$Type])`" thread=`"`" file=`"`">"
$LogMessage | Out-File -Append -Encoding UTF8 -FilePath $LogFile
}
#$adminGroupName = "Administrators"
Log -Message "----------------------"
Log -Message "Whitelisted accounts are: $whitelist"
# Specify the SID for the Administrators group
$AdminGroupSid = "S-1-5-32-544"
$AdminGroup = New-Object System.Security.Principal.SecurityIdentifier($AdminGroupSid)
$AdminGroupName = $AdminGroup.Translate([System.Security.Principal.NTAccount]).Value -replace '.+\\'
$localAdmins = (([ADSI]"WinNT://./$AdminGroupName").psbase.Invoke('Members') | % {$_.GetType().InvokeMember('AdsPath','GetProperty',$null,$($_),$null)}) -match '^WinNT'| %{$_.Replace("WinNT://","")}
foreach ($adminUser in $localAdmins) {
$adminUser = $adminUser.Replace('/', '\')
$whitelistUsername = ($adminUser -split '\\')[-1]
if ($whitelist -notcontains $whitelistUsername) {
Write-output "Removing $adminUser from local admin group."
Log -Message "Removing $adminUser from local admin group."
Remove-LocalGroupMember -Group $AdminGroupName -Member $adminUser -ErrorAction SilentlyContinue
}
else {
Log -Message "Whitelisted user: $adminUser was found." -Type "Warning"
}
}
$remainingAdmins = (([ADSI]"WinNT://./$AdminGroupName").psbase.Invoke('Members') | % {$_.GetType().InvokeMember('AdsPath','GetProperty',$null,$($_),$null)}) -match '^WinNT'| %{$_.Replace("WinNT://","")}
foreach ($adminUser in $remainingAdmins) {
$adminUser = $adminUser.Replace('/', '\')
$whitelistUsername = ($adminUser -split '\\')[-1]
if ($whitelist -notcontains $whitelistUsername) {
Log -Message "$adminUser should not be local administrator anymore, but still is." -Type "Error"
}
}
Log -Message "Script was run" (Get-Date -format "HH:mm d.M.yyyy")
Log -Message "----------------------"
exit 0
This way you gain access to see what local admin accounts you have and are there problems that you didn’t know in your environment.
Remember – There was no Intune admin rights here and to whitelist Intune admin rights you need to use graph.