Intune Deploy Turn Off Shell Protocol Protected Mode Policy

Here, this post will help you in the deployment of the Turn Off Shell Protocol Protected Mode Policy using Intune. We’ll make use of Intune’s Settings Catalog to install this policy. We are using configuration Profiles of Intune to deploy the Turn Off Shell Protocol Protected Mode Policy Using Intune.

This policy setting enables the configuration of the functionality level for the shell protocol. When utilizing the full functionality, applications have the capability to open folders and launch files. Alternatively, the protected mode restricts the functionality of the protocol, limiting applications to open only a predefined set of folders.

In this mode, applications cannot open files using the protocol, enhancing the security of Windows. It is recommended to keep the protocol in the protected mode to bolster Windows security. Enabling this policy setting grants full functionality to the protocol, allowing the opening of both folders and files.

Conversely, disabling the policy setting or leaving it unconfigured maintains the protected mode, where applications can only open a restricted set of folders. Restricting access to a limited set of files and folders minimizes the system’s potential attack surface.

Patch My PC
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.1
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.1

Turn Off Shell Protocol Protected Mode Policy Using Intune

To create a Turn Off Shell Protocol Protected Mode Policy, follow the steps stated below:

  • Sign in to the Intune Admin Center portal https://intune.microsoft.com/.
  • Select Devices > Windows > Configuration profiles > Create a profile.

In Create Profile, I select Windows 10 and later in Platform and select Profile Type as Settings catalog. Click on the Create button.

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.2
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.2

On the Basics tab pane, I provide a name for the policy “Turn Off Shell Protocol Protected Mode Policy.”

  • Optionally, if you want, you can enter a policy description and proceed by selecting “Next
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.3
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.3

Now in Configuration Settings, Click Add Settings to browse or search the catalog for the settings I want to configure.

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.4
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.4

In the Settings Picker windows, I searched for the keyword File Explorer. I found the category Administrative Templates\System\File Explorer and selected this.

  • When I select that option as stated above, I see the sub-category Turn off shell protocol protected mode. After selecting that, click the cross mark at the right-hand corner, as shown below.
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.5
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.5

Here in Administrative Templates, I have Disabled the Turn off shell protocol protected mode.

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.6
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.6

Using Scope tags, you can assign a tag to filter the profile to specific IT groups. One can add scope tags (if required). More details on Intune Scope Tags Implementation Guide.

  • Click Next to continue.

Now in Assignments, in Included Groups, you need to click on Add Groups and choose Select Groups to include one or more groups. Click Next to continue.

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.7
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.7

In the Review + Create tab, I review settings. After clicking on Create, changes are saved, and the profile is assigned.

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.8
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.8

After successfully creating the “Turn Off Shell Protocol Protected Mode Policy,” a notification will appear in the top right-hand corner confirming the action. You can also verify the policy’s existence by navigating to the Configuration Profiles list, where it will be prominently displayed.

Your groups will receive your profile settings when the devices check in with the Intune service. The Policy applies to the device.

Intune Report for Turn Off Shell Protocol Protected Mode Policy

From the Intune Portal, you can view the Intune settings catalog profile report, which provides an overview of device configuration policies and deployment status.

To track the assignment of the policy, you need to select the relevant policy from the Configuration Profiles list, which is the Turn Off Shell Protocol Protected Mode Policy. Then, you can review the device and user check-in status to determine whether the policy has been successfully applied.

  • If you require more detailed information, you can click on “View Report” to access additional insights.
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.9
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.9

Windows CSP Details ShellProtocolProtectedModeTitle_2

We will see Windows CSP Details for this Policy setting ShellProtocolProtectedModeTitle_2. The configuration of the shell protocol’s functionality is a critical aspect of system security. The choice between full functionality and protected mode should be made thoughtfully, considering the operational needs and security requirements of the organization. It reflects a proactive approach to managing potential security risks within the Windows environment.

CSP URI – ./Device/Vendor/MSFT/Policy/Config/ADMX_WindowsExplorer/ShellProtocolProtectedModeTitle_2

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.10
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.10

Intune MDM Event Log – Turn Off Shell Protocol Protected Mode Policy

You can leverage event IDs 813 and 814 to verify the successful implementation of String or integer policies for the Turn Off Shell Protocol Protected Mode Policy Policy on Windows 10 or 11 devices through Intune.

These event IDs provide valuable insights into the Turn Off Shell Protocol Protected Mode Policy’s application status and the specific value assigned to the policy on those devices. In the case of this particular policy, the value is String and is linked to the event ID 814.

By analyzing these event IDs, you can clearly understand the policy’s application status and the corresponding value associated with it on the devices in question.

To confirm this, you can check the Event log path – Applications and Services Logs â€“ Microsoft – Windows – Devicemanagement-Enterprise-Diagnostics-Provider – Admin.

MDM PolicyManager: Set policy string, Policy: (ShellProtocolProtectedModeTitle_2), Area: (ADMX_WindowsExplorer), EnrollmentID requesting merge: (5B88AEF1-09E8-43BB-B144-7254ACBBDF3E), Current User: (Device), String: (<disabled/>), Enrollment Type: (0x6), Scope: (0x0).

Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.11
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.11

When I opened the above Event log, I found that the Turn Off Shell Protocol Protected Mode Policy I applied to the device was successfully implemented.

  • By reviewing the log entry shown in the above image, the Event Viewer, I came across essential information, including the Area and Enrollment ID.

These details play a significant role in identifying the corresponding registry path. To locate the specific information, please consult the table provided below:

AreaPolicyStringScopedEvent ID
ADMX_WindowsExplorerShellProtocolProtectedModeTitle_2DisabledDevice814
Table 1 – Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune

The details presented in the table above for the Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune can be employed to access the registry settings that hold the group policy configurations on a specific computer. T

To accomplish this, you can execute “REGEDIT.exe” on the target computer and navigate to the precise registry path where these settings are stored.

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\providers\5B88AEF1-09E8-43BB-B144-7254ACBBDF3E\default\Device\ADMX_WindowsExplorer

When you navigate the above path in the Registry Editor, you will find the registry key named ShellProtocolProtectedModeTitle_2. Also, when I navigated to the above path, I saw that the Registry Key was created successfully.

Registry NameData
ShellProtocolProtectedModeTitle_2Disabled
Table 2 – Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.12
Deploy Turn Off Shell Protocol Protected Mode Policy Using Intune Fig.12

We are on WhatsApp. To get the latest step-by-step guides and news updates, Join our Channel. Click hereHTMD WhatsApp.

Author

Abhinav Rana is working as an SCCM and Intune Admin with several years of experience. He loves to help the community by sharing his knowledge. He is a B.Tech graduate in Information Technology.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.