-
Notifications
You must be signed in to change notification settings - Fork 523
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IntuneSettingCatalogASRRulesPolicyWindows10: Cannot be deployed #3961
Comments
Note that this is not the only issue with IntuneSettingCatalogASRRulesPolicyWindows10, after fixing the schema and trying to deploy it afterwards will result in always saying that the policy was not found and it tries to create a new one which is never created, it always end up with this. VERBOSE: [REDACTED]: [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] Checking for the Intune Endpoint Protection Attack Surface Protection rules Policy {IntuneSettingCatalogASRRulesPolicyWindows10_1}
VERBOSE: [REDACTED]: [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] No Endpoint Protection Attack Surface Protection rules Policy {80d22119-b8cf-466d-bfc5-c2dca1d90f43} was found
VERBOSE: [REDACTED]: [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] No Endpoint Protection Attack Surface Protection rules Policy {IntuneSettingCatalogASRRulesPolicyWindows10_1} was found
VERBOSE: [REDACTED]: [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] Creating new Endpoint Protection Attack Surface Protection rules Policy {IntuneSettingCatalogASRRulesPolicyWindows10_1}
VERBOSE: [REDACTED]: [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] POST https://graph.microsoft.com/beta/deviceManagement/configurationPolicies with 9934-byte payload
VERBOSE: [REDACTED]: [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] received 920-byte response of content type application/json
VERBOSE: [REDACTED]: LCM: [ End Set ] [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1] in 1.4590 seconds.
VERBOSE: [REDACTED]: LCM: [ End Resource ] [[IntuneSettingCatalogASRRulesPolicyWindows10]IntuneSettingCatalogASRRulesPolicyWindows10-IntuneSettingCatalogASRRulesPolicyWindows10_1]
VERBOSE: [REDACTED]: LCM: [ End Set ]
VERBOSE: [REDACTED]: LCM: [ End Set ] in 2.7000 seconds.
VERBOSE: Operation 'Invoke CimMethod' complete.
VERBOSE: Time taken for configuration job to complete is 2.748 seconds and in Event Viewer
|
To summarise the actions to fix this issue
|
@andikrueger Correct, but for point 2 please see that it already tries to do that, it's just that for some reason it's not working because the policy never gets to be created so it never finds it either by Id or DisplayName. I didn't have time to look at the code to figure out what's the problem yet. |
@ricmestre i will rework my pull request and try to fix it as @andikrueger suggested |
I am having the same issue so a fix to this problem would be great, thanks in advance |
Description of the issue
IntuneSettingCatalogASRRulesPolicyWindows10 cannot be deployed, the module was changed to not have Identity as mandatory but its corresponding schema wasn't changed so it complains about it as soon as you try to deploy the policy.
Microsoft 365 DSC Version
1.23.1122.1
Which workloads are affected
other
The DSC configuration
Verbose logs showing the problem
Environment Information + PowerShell Version
The text was updated successfully, but these errors were encountered: