Skip to main content

Keeping Windows Store Apps Updated with Microsoft Intune

· loading ·
Intune Windows 10 and later Updates Remediation Apps PowerShell Windows Autopilot Security
Author
Nick Benton
Principal Cloud Endpoint Consultant and Intune Blogger
Table of Contents

So we’re all onboard with the New Microsoft Store, and deploying both UWP and Win32 apps from Microsoft Intune is an absolute breeze, and reduces the effort of deploying applications to a click click next OK exercise. What about the UWP apps that are already installed on a Windows Autopilot device, shouldn’t we give them a bit of love? If you care at all about users and security you should.

Allowing App Updates
#

Regardless of how you are blocking or allowing the Microsoft Store, remembering that the store needs to be available to allow for apps from Microsoft Intune to be deployed, we should at least configure devices to allow for updates.

A simple Settings Catalog profile will do the job here, with the below settings configured.

Area Item Setting
Microsoft App Store Allow apps from the Microsoft app store to auto update Allowed

Settings Catalog Profile
Screenshot of a Settings Catalog profile for Microsoft Store

Assign this profile to your devices, all of them obviously, no testing needed here.

Forcing App Updates
#

There’s a lot of chatter about how to force store apps to update, but essentially we can kick off an update using the below Get-CimInstance query.

Get-CimInstance -Namespace "Root\cimv2\mdm\dmmap" -ClassName "MDM_EnterpriseModernAppManagement_AppManagement01" | Invoke-CimMethod -MethodName UpdateScanMethod

Now as we’re calling areas that require elevation, standard users are bang out of luck from running this, and even running this elevated as Administrator does absolutely nothing for the apps themselves, something about install context.

So what are our options? Well for testing it’s PsExec.

Running the above from PowerShell running as system using PsExec.exe -s -i powershell.exe, we can kick off the app update query.

PsExec Run
Screenshot of PSEXEC running the store app update command

Nothing much to look at here, but if you’ve got the store open, you should now see updates in the Downloads and Updates section, if you’re lazy run start ms-windows-store://downloadsandupdates as a standard user to open the correct area of the store.

Store App Updates
Screenshot of the Microsoft Store updating apps

Brilliant, apps are now trying their hardest to update. Now we’ve got a method to update the apps, no one is going to run this manually on a regular basis, and we love a Microsoft Intune Remediation.

Remediation Settings
#

So now we’ve got a way to start the update of the apps, let’s find a way to work out if we need to kick off an update. Back to the initial query we created, and if we run the below section of the command, we’ll get an output that we might be able to work with.

Get-CimInstance -Namespace "Root\cimv2\mdm\dmmap" -ClassName "MDM_EnterpriseModernAppManagement_AppManagement01"

Command Output
Screenshot of the result of the Get-CimInstance query

Guess what, we do, that LastScanError is looking mighty interesting, and it being Microsoft I bet that an exit code of zero means success, but we should have a look at the reference document just in case.

Reports the last error code returned by the update scan.

This is a required node.

OK, so it isn’t that clear, but we’ve got a way to detect whether the last update of apps was successful, and with the Settings Catalog policy created earlier we should be keeping apps up to date from then on.

Detection Script
#

We can use the above, and a little logic to detect whether the result of the LastScanError is a zero or not, and if it’s not a zero throw an Exit 1 to allow a remediation to run.

try {
    $wmiObj = Get-CimInstance -Namespace "Root\cimv2\mdm\dmmap" -ClassName "MDM_EnterpriseModernAppManagement_AppManagement01"
    if ($wmiObj.LastScanError -ne '0') {
        Write-Output "Windows Store Apps not updated."
        Exit 1
    }
    else {
        Write-Output "Windows Store Apps updated."
        Exit 0
    }
}
catch {
    Write-Output "Unable to query Store App Update status."
    Exit 2000
}

On to the remediation portion.

Remediation Script
#

We’ve already done the ground work with the previous queries to test the update of apps, so this one is very straightforward.

Try {
    Get-CimInstance -Namespace "Root\cimv2\mdm\dmmap" -ClassName "MDM_EnterpriseModernAppManagement_AppManagement01" | Invoke-CimMethod -MethodName UpdateScanMethod
    Write-Output "Windows Store Apps updated."
    Exit 0
}
Catch {
    Write-Output "Windows Store Apps not updated."
    Exit 2000
}

Just make sure we’re exiting with the correct codes, and giving an explanation, as per the detection script, of the result of the remediation.

Deploying the Remediation
#

We’ve seen remediations a handful of times now in this blog, so go ahead and create a new Remediation Script in Microsoft Intune mirroring the below settings. Be aware that we definitely do not want to be running this as the user, we need that glorious system context.

Remediation Script
Screenshot of the Microsoft Intune Remediation Script

I’ve assigned this to All Devices with my beloved Device Filters on a daily schedule, but if you’re more cautious than I am, assign this to a smaller proof-of-concept group.

After a while, you should start seeing the results of the Remediation, and hopefully positive ones to boot.

Remediation Results
Screenshot of the Microsoft Intune Remediation Results

If all goes well, your devices will start actually updating the ‘Built In’ apps you haven’t ripped out with a PowerShell script, and Microsoft Intune UWP store apps you’ve deployed, though your users may start complaining about the apps looking like they’re loading in the Start Menu 😂.

Summary
#

All in all a quick and dirty solution to a very simple problem with new Windows Autopilot devices and existing Microsoft Intune managed Windows devices, at least this way they’ll do what they should have done in the first place and just keep themselves updated.

If only all the issues I encounter during my days could be solved with a simple Remediation script.

The detection and remediation scripts are available, as always in my Github Repo.

Related

Automatically Resizing the WinRE Partition for Windows Update KB5034441
· loading
Intune Windows 10 and later Updates PowerShell Remediation
If you’ve been under a rock, or like me, don’t have to manage updates on a Windows device estate any more, chances are you might not have seen the issues with the size of the Windows Recovery Environment or WinRE, partition when applying Windows Updates like KB5034441, luckily Microsoft released a ‘fix’ for this in KB5028997 to resize the partition to allow for updates to install.
Co-Managing Windows Autopilot Hybrid Join Devices
· loading
Intune Configuration Manager Windows Autopilot Remediation Windows 10 and later PowerShell
As both Microsoft Intune and Configuration Manager are a match made in heaven, there are many reasons to still utilise both, either using Co-Management or just plain old Tenant Attach, so imagine my joy when Microsoft released Co-Management Authority in Intune, and I thought the days of packaging the Configuration Manager Client were over.
Proactively Renaming Hybrid Azure AD Joined Devices
· loading
Intune Windows 10 and later Windows Autopilot Remediation Hybrid Azure AD PowerShell
Nothing has really changed in the Hybrid Join Autopilot space when it comes to device names, and we’re still stuck with useless naming conventions for these devices; sometimes a prefix and random characters just isn’t a good enough identification method for Windows devices.