If you use Azure AD as identity provider for your webbased third party applications, you might want to consider use the Google Chrome extension called “Windows 10 Accounts”. This extension provide the complete single sign on experience for applications that use Azure Activery Directory based identities.
I will provide an instruction on how to deploy this extension via Intune for Windows 10 devices.
For example, the Windows 10 accounts extension looks like this:
Prerequisites
- WinAppUtil, this application is needed to package applications in Microsoft Intune. You can download it here: Link
- Appropriate licenses to deploy a Windows 10 device via Intune.
- Windows 10 Intune enrolled device.
- Google Chrome installed
Preparation
Let’s start with the deployment. First of all start by creating a folder. For example: “C:\temp\ChromeAddOnWindows10Accounts”
Create 2 files in this directory:
The first file (ChromeAddOnWindows10Accounts.ps1) contains a powershell script, this powershell creates a registry key with forces Google Chrome to install the extension. Link to original creator of the script
#Set variables as input for the script $KeyPath = "HKLM:\Software\Policies\Google\Chrome\ExtensionInstallForcelist" $KeyName = "1" $KeyType = "String" $KeyValue = "ppnbnpeolgkicgegkbkbjmhlideopiji;https://clients2.google.com/service/update2/crx" #Verify if the registry path already exists if(!(Test-Path $KeyPath)) { try { #Create registry path New-Item -Path $KeyPath -ItemType RegistryKey -Force -ErrorAction Stop } catch { Write-Output "FAILED to create the registry path" } } #Verify if the registry key already exists if(!((Get-ItemProperty $KeyPath).$KeyName)) { try { #Create registry key New-ItemProperty -Path $KeyPath -Name $KeyName -PropertyType $KeyType -Value $KeyValue } catch { Write-Output "FAILED to create the registry key" } }
You can use this script to implement every Chrome extension. Replace the $KeyValue with the value needed for your extension. and replace the $KeyName with a number other than 1. Otherwise you will overwrite this value.
The second file (install.cmd) calls the powershell script, you will use this in the Intune configuration. The file contains the following code:
Powershell.exe -Executionpolicy bypass -File ChromeAddOnWindows10Accounts.ps1
Packaging
Now it’s time to create the package. Start Powershell and run the WinAppUtil, for me the location is “C:\temp\Intune\IntuneWinAppUtil.exe”.
Use the paths in the screen below accordingly and hit enter:
A ChromeAddOnWindows10Accounts.intunewin is created in the folder “C:\temp\Output”. This file will used in the deployment via Intune.
Deployment
Log on to the Intune Portal at https://devicemanagement.microsoft.com/
Go to Apps:
After that go to Windows and add an App:
Add a Win32App:
Select app package file and browse to the ChromeAddOnWindows10Accounts.intunewin file.
Specify the package information:
Specify the installation instructions:
Install command: “Install.cmd”
Uninstall command: “reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist /v “1” /f “
Device restart behavior: “no specific action”
Specify the requirements:
I have created a custom detection script, these are the settings in Intune:
This is the code of the detection script:
#ChromeAddOnDetectionScript $KeyPath = "HKLM:\Software\Policies\Google\Chrome\ExtensionInstallForcelist" $KeyName = "1" $KeyType = "String" $KeyValue = "ppnbnpeolgkicgegkbkbjmhlideopiji;https://clients2.google.com/service/update2/crx" (Get-ItemProperty -Path $KeyPath -Name $KeyName).1 -eq $KeyValue
No depencies and no scope tags are assigned.
Assign the groups that need the application:
The detection rules show installed:
And it’s a wrap! If you have any questions feel free to contact me.
Regards,
Niels
Niels
Great piece.
So I was playing around our environment using this technique. I’m having a difficulty figuring out how to uninstall the extension. Any Tips?
Hi Carl,
If you delete the key the extension will be removed.
Kind Regards,
Niels
I was wondering how to add multiple extensions. Also i cannot find urls to 2 or 3 of my extensions. Do i just leave them blank after entering the id or do i put in the link to the chrome store? any help will be appreciated. Thank you
This is possible, you need to edit the script to have a foreach loop and create an array where the links to all your chrome extension reside.
Need a PowerShell script to account for multiple already existing extensions and a detection script for the same issue.
$KeyPath = “HKLM:\Software\Policies\Google\Chrome\ExtensionInstallForcelist”
$KeyName = “1”
**this could be 1,2,3 etc that are already installed**
True, I will update that blog in the upcoming months. I hope.
Where do I find the key value? If I install the extension, is it the name of the folder after here?
C:\Users\USER1\AppData\Local\Google\Chrome\User Data\Default\Extensions\[THISSTRINGHERE?]
I’ve deployed everything according your guide (trying to deploy RingCentral for Chrome extension), synced my device and I had a pop-up telling me Intune was installing it. But nothing seems to change on Chrome. Thanks
Hi Ralph,
You can find the key in the registry.
For Example:
HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\PreferenceMACs\Profile 1\extensions.settings
You can build a detection script based on that.
Let me know if you need more help!
Niels
from my testing, seems intune even doesn’t work with batch file
This post is old. You can now set this via Configuration Profiles.
Installation is working pretty fine. Unfortunately the uninstall is not working.
I always get the message “uninstallation failed”. Any ideas?
Aron
Hi Aron,
Save this as a .ps1 file:
#Set variables as input for the script
$KeyPath = “HKLM:\Software\Policies\Google\Chrome\ExtensionInstallForcelist”
$KeyName = “1”
$KeyType = “String”
$KeyValue = “ppnbnpeolgkicgegkbkbjmhlideopiji;https://clients2.google.com/service/update2/crx”
#Verify if the registry path already exists
if(!(Test-Path $KeyPath)) {
try {
#Create registry path
Remove-Item -Path $KeyPath -ItemType RegistryKey -Force -ErrorAction Stop
}
catch {
Write-Output “FAILED to create the registry path”
}
}
#Verify if the registry key already exists
if(!((Get-ItemProperty $KeyPath).$KeyName)) {
try {
#Create registry key
Remove-ItemProperty -Path $KeyPath -Name $KeyName -PropertyType $KeyType -Value $KeyValue
}
catch {
Write-Output “FAILED to create the registry key”
}
}
After that, repackage the chrome extension installation and try use this uninstall command:
powershell.exe -ExecutionPolicy Bypass -File .\FILENAME.ps1
Thanks,
Niels
Hi Niels,
thanks for your help.
Unfortunately I receive the same error “uninstallation failed”.
Any other ideas?
Thanks,
Aron
Hi Aron,
Could you check to log (C:\ProgramData\Microsoft\IntuneManagementExtension) for further information and get back to me?
Thanks,
Niels
Hi Niels,
attached you can find some lines from the log:
[Win32App] ExecManager: processing targeted app (name=’Chrome Extension – LocalFiles’, id=’276227b9-96a9-482b-ae0a-6224563b7596′) with intent=4, appApplicabilityStateDueToAssginmentFilters= for user session 2 IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App][ReevaluationScheduleManager] Subgraph reevaluation interval is expired.
Hash = /LnxwZ5wxve2t0KKwHuPXAQ5OaGVCtPuao2VZeJZjVY= IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App][ReevaluationScheduleManager] Setting subgraph reevaluation time with value: 21/03/2022 01:00:53 for subgraph with hash /LnxwZ5wxve2t0KKwHuPXAQ5OaGVCtPuao2VZeJZjVY=. IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] ProcessAppWithoutDependency starts for 276227b9-96a9-482b-ae0a-6224563b7596 with name Chrome Extension – LocalFiles IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
—->>[Win32App] Processing app (id=276227b9-96a9-482b-ae0a-6224563b7596, name = Chrome Extension – LocalFiles) with mode = DetectInstall IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
—-[Win32App] app with name = Chrome Extension – LocalFiles dependency detect only is False IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] ===Step=== Start to NotPresent app 276227b9-96a9-482b-ae0a-6224563b7596 IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] ===Step=== Detection rules IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] ProcessDetectionRules starts IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] ProcessDetectionRules Parsing InstallEx… IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] DetectionType 3 IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] Start detectionManager SideCarScriptDetectionManager IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] Detection script file C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1 is saved. IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
“C:\Program Files (x86)\Microsoft Intune Management Extension\agentexecutor.exe” -powershellDetection “C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1” “C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1quotedResultFilePath.txt” “C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1quotedErrorFilePath.txt” “C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1quotedTimeoutFilePath.txt” 3600 “C:\Windows\System32\WindowsPowerShell\v1.0” 0 “C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1quotedExitCodeFilePath.txt” False IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] SideCarScriptDetectionManager create files for outputs IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] SideCarScriptDetectionManager Launch powershell executor in machine session IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] SideCarScriptDetectionManager Create proxy process successfully. IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] SideCarScriptDetectionManager process id = 8704 IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] SideCarScriptDetectionManager Powershell execution process timeout milliseconds: 3600000. IntuneManagementExtension 21.03.2022 02:00:53 34 (0x0022)
[Win32App] SideCarScriptDetectionManager Execution is done, collecting result IntuneManagementExtension 21.03.2022 02:00:54 34 (0x0022)
[Win32App] SideCarScriptDetectionManager Powershell execution got lpExitCode: 0 lastWin32Error: 0 IntuneManagementExtension 21.03.2022 02:00:54 34 (0x0022)
[Win32App] SideCarScriptDetectionManager Powershell ExitCode: 0 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Detection script file C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1quotedExitCodeFilePath.txt is deleted. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Checked Powershell script result: False
IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Checked Powershell script exitCode: 0 EnforceSignatureCheck: 0 RunAs32Bit: 0 InstallExRunAs: 1, result of applicationDetected: True IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Detection script file C:\Program Files (x86)\Microsoft Intune Management Extension\Content\DetectionScripts\276227b9-96a9-482b-ae0a-6224563b7596_1.ps1 is deleted. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] detectionManager SideCarScriptDetectionManager got applicationDetectedByCurrentRule: True as system IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Completed detectionManager SideCarScriptDetectionManager, applicationDetectedByCurrentRule: True IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] ===Step=== Check applicability IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] applicationRequirementMetadata RequiredOSArchitecture: 2, client Is64BitOperatingSystem: True, nativeMachine IsArm64: False, applicability: Applicable. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] applicationRequirementMetadata expected version: 10.0.19043, client version: 10.0.22000, applicability: Applicable. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] applicationRequirementMetadata.RequiredFreespace is , skip check. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] applicationRequirementMetadata.RequiredMemory is , skip check. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] applicationRequirementMetadata.RequiredCPUSpeed is , skip check. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] applicationRequirementMetadata.MinimumNumberOfProcessors is , skip check. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] ===Step=== Check Extended requirement rules IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] No ExtendedRequirementRules for this App. Skipping Check Extended requirement rule IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[StatusService] Unable to get error code and hence returning unknown. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[StatusService] Returning Status2 as Unknown for uninstall intent because the compliance state is Installed. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[StatusService] Saved AppInstallStatusReport for user 14ead5f9-ac6f-405e-9329-328399ec1ac9 for app 276227b9-96a9-482b-ae0a-6224563b7596 in the StatusServiceReports registry. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[StatusService] No subscribers to SendUpdateHandler. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] ===Step=== Check detection without existing AppResult IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[AppStatusMgr] debug report is {“AppId”:”276227b9-96a9-482b-ae0a-6224563b7596″,”InternalVersion”:1,”UserId”:”14ead5f9-ac6f-405e-9329-328399ec1ac9″,”DeviceId”:”6f583a8f-ac32-4378-ba3a-b206e46348b7″,”ExitCode”:null,”ComplianceStateMessage”:{“Applicability”:0,”ComplianceState”:1,”DesiredState”:1,”ErrorCode”:null,”TargetingMethod”:0,”InstallContext”:2,”TargetType”:2,”ProductVersion”:null,”AssignmentFilterIds”:null},”EnforcementStateMessage”:null,”RebootStatus”:0,”RebootReason”:0,”RebootSetTimeUTC”:”\/Date(-62135596800000)\/”,”ResultCreatedTimeUTC”:”\/Date(1647824453019)\/”,”DownloadStartTimeUTC”:”\/Date(-62135596800000)\/”,”Intent”:4,”Ack”:false,”DeliveryOptimizationJobStatus”:null,”ErrorDetails”:null,”Info”:null,”ApplicationName”:”Chrome Extension – LocalFiles”} IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[AppStatusMgr] downloadTime is 01/01/0001 00:00:00 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] GRS is expired. kick off download & install IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] StartDeadlineEx check IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] StartDeadlineEx(TimeFormat) is null and considered as ASAP, continue IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] ===Step=== Download IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Downloading app on session 2. App: 276227b9-96a9-482b-ae0a-6224563b7596 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[ManagedInstallerSync] SKU is 48. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
osVersion is 10.0.22000 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[EnvironmentHelper] osVersion is 10.0.22000. winVersion is 10.0.22000 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[ManagedInstallerSync] Managed installer is not supported in Windows 11. Is only supported on Windows 10. IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
Get content info from Intune IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Load global Win32App settings IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Load each existing app result for user: 14ead5f9-ac6f-405e-9329-328399ec1ac9 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Finished checking previous app report, the error code is -2147024895 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] content info request is {“ApplicationId”:”276227b9-96a9-482b-ae0a-6224563b7596″,”ApplicationVersion”:”1″,”ApplicationName”:”Chrome Extension – LocalFiles”,”Intent”:”4″,”ContentInfo”:null,”UploadLocation”:null,”TargetingMethod”:”0″,”ErrorCode”:”-2147024895″,”TargetType”:”2″,”InstallContext”:”2″,”EspPhase”:”NotInEsp”,”AssignmentFilterIds”:”[]”,”ManagedInstallerStatus”:”0″} IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] espPhase = NotInEsp, isRetryNeeded = False IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[ServiceBase], check in using device check in AAD App IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
Getting UserToken For Web Request… IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
starting impersonation, session id = 2 IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
After impersonation: IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[TokenManager::GetTokenForNewRequestUsingDeviceCheckInAppId] IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
provider id = https://login.microsoft.com, authority = organizations IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
get provider, provider name = Work or school account IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
Successfully get the token with client id fc0f3af4-6835-4174-b806-f7db311fd2f3 and resource id 26a4ae64-5862-427f-a9b0-044e62572a4f IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
Add Token with length 1814 into WebRequest IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
Add MdmDeviceCertificate FEEEF467AF92C156A33A4670829B63A44AE72409 into WebRequest IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
SendWebRequest, client-request-id: dbe75b45-c76a-4145-86fc-f5bfd8b8c4f3, Method: PUT IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
Current proxy is https://fef.msub06.manage.microsoft.com/TrafficGateway/TrafficRoutingService/SideCar/StatelessSideCarGatewayService/SideCarGatewaySessions('be1dd066-ebf7-4562-ba62-73ed4af30760‘)%3Fapi-version=1.1 IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
Sending network request… isRetryNeeded = False, total retryCount = 1, current iteration = 0 IntuneManagementExtension 21.03.2022 02:00:55 39 (0x0027)
Get content info from service,ret = {“ApplicationId”:”276227b9-96a9-482b-ae0a-6224563b7596″,”ApplicationVersion”:”1″,”ApplicationName”:null,”Intent”:”0″,”ContentInfo”:”{\”DownloadType\”:2,\”AzureStorageLink\”:null,\”DownloadServiceLink\”:null,\”ContentEncryptionKey\”:null,\”UploadLocation\”:\”http://swdb02-mscdn.manage.microsoft.com/a3be0e20-0d37-4fc4-a65f-e8a194f7154f/21a1bc66-919a-409e-99bd-8aabef3b2a31/4139dc25-c748-4adc-9ce8-a2647c34ab5a.intunewin.bin\”,\”OriginalSize\”:1132,\”DoFileId\”:\”501FCB7D-A970-4E34-A753-4B48FE5D8BEF_a3be0e20-0d37-4fc4-a65f-e8a194f7154f_21a1bc66-919a-409e-99bd-8aabef3b2a31_4139dc25-c748-4adc-9ce8-a2647c34ab5a-intunewin-bin_276227b9-96a9-482b-ae0a-6224563b7596_1\”}”,”UploadLocation”:null,”TargetingMethod”:”0″,”ErrorCode”:null,”TargetType”:”0″,”InstallContext”:”0″,”EspPhase”:”NotInEsp”,”AssignmentFilterIds”:”[]”,”ManagedInstallerStatus”:”0″} IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] DownloadType = 2, DownloadUrl = http://swdb02-mscdn.manage.microsoft.com/a3be0e20-0d37-4fc4-a65f-e8a194f7154f/21a1bc66-919a-409e-99bd-8aabef3b2a31/4139dc25-c748-4adc-9ce8-a2647c34ab5a.intunewin.bin IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] After impersonation: IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Toast message with: “C:\Program Files (x86)\Microsoft Intune Management Extension\agentexecutor.exe” -toast “ToastDownloadingMessageUninstall” “Q2hyb21lIEV4dGVuc2lvbiAtIExvY2FsRmlsZXM=” “eyJDb21wYW55TmFtZSI6IiIsIkNvbG9yQmFja2dyb3VuZExvZ29VcmkiOm51bGwsIldoaXRlQmFja2dyb3VuZExvZ29VcmkiOm51bGwsIkFjY2VudENvbG9yIjoyOTM4Mn0=” “0” IntuneManagementExtension 21.03.2022 02:00:55 34 (0x0022)
[Win32App] Content cache found for app id 276227b9-96a9-482b-ae0a-6224563b7596, skip downloading. IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Starts verifying encrypted hash IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
Find 1 MDM certificates. IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] hmac validation is pass. IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] file hash validation pass, starts decrypting IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Decryption is done successfully. IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] content is decrypted and verified successfully. IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Downloaded file size 1,132.00 IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Downloaded file time 0.00 IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Start unzipping. IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Unzipping file on session 2 from C:\Program Files (x86)\Microsoft Intune Management Extension\Content\Staging\276227b9-96a9-482b-ae0a-6224563b7596_1\276227b9-96a9-482b-ae0a-6224563b7596_1.zip to C:\windows\IMECache\276227b9-96a9-482b-ae0a-6224563b7596_1 IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
Cleaning up staging content C:\Program Files (x86)\Microsoft Intune Management Extension\Content\Staging\276227b9-96a9-482b-ae0a-6224563b7596_1 IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] Saving DownloadTime for user: 14ead5f9-ac6f-405e-9329-328399ec1ac9 IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] StartDeadlineEx check IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] StartDeadlineEx(TimeFormat) is null and considered as ASAP, continue IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] ===Step=== ExecuteWithRetry IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] ExecuteWithRetry Parsing InstallEx… IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] ===Step=== Execute retry 0 IntuneManagementExtension 21.03.2022 02:00:56 34 (0x0022)
[Win32App] ===Step=== InstallBehavior RegularWin32App, Intent 4, UninstallCommandLine reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist /v “4” /f
Is there anything about the uninstall failure?
Thanks,
Aron
Hi Aron,
I can’t see the uninstallation command. Can you manually try to uninstall the extension via Powershell? After that use that script in the uninstallation command.
Thanks,
Niels
Hi Niels,
I found the issue…
In the following command:
if(!((Get-ItemProperty $KeyPath).$KeyName)) {
try {
#Create registry key
Remove-ItemProperty -Path $KeyPath -Name $KeyName -PropertyType $KeyType -Value $KeyValue
}
catch {
Write-Output “FAILED to create the registry key”
}
}
We have to remove the exclamation mark “!” in the beginning.
Now the script works as expected.
Thanks for your help,
Aron
Thanks for getting back to me Aron!