Get-IntuneManagementExtensionDiagnostics.ps1
<#PSScriptInfo
.VERSION 2.3 .GUID f321e845-7139-41d7-b0dd-356ea87931e3 .AUTHOR Petri.Paavola@yodamiitti.fi .COMPANYNAME Yodamiitti Oy .COPYRIGHT Petri.Paavola@yodamiitti.fi .TAGS Intune Windows Autopilot troubleshooting log analyzer .LICENSEURI .PROJECTURI https://github.com/petripaavola/Get-IntuneManagementExtensionDiagnostics .ICONURI .EXTERNALMODULEDEPENDENCIES .REQUIREDSCRIPTS .EXTERNALSCRIPTDEPENDENCIES .RELEASENOTES Version 1.0: Original published version Version 1.1: Win32App and WinGetApp Required/Available and Install/Uninstall intent is detected right Win32App Supersedence should be recognized (first uninstall and then install) Win32App failed (un)install process is detected Win32App Download Statistics table added Added export to text files Version 2.0: Huge new feature is to create html report Html report is primary reporting and console observed timeline is secondary All future development will be done to html report Console timeline will be available for example for OOBE troubleshooting scenarios Added App detection events to timeline Html report entries support HoverOn ToolTips which include more information Version 2.3: Updated script to use Microsoft.Graph.Authentication module to download data from Graph API #> <# .Synopsis This script analyzes Microsoft Intune Management Extension (IME) log(s) and creates timeline report from found actions. .DESCRIPTION This script analyzes Microsoft Intune Management Extension (IME) log(s) and creates timeline report from found log events. Report is saved to HTML file. Events are also shown in Powershell console window. Timeline report includes information about Intune Win32App, WinGetApp, Powershell scripts, Remedation scripts and custom Compliance Policy scripts events. Windows Autopilot ESP phases are also shown on timeline. Script also includes really capable Log Viewer UI if scripts is started with parameter -ShowLogViewerUI LogViewerUI (Out-GridView) looks a lot like cmtrace.exe tool but it is better because all found log actions are added to log for easier debugging. LogViewerUI has good search and filtering capabilities. Try to filter known log entries in Timeline: Add criteria -> ProcessRunTime -> is not empty. What really differentiates this LogViewer from other tools is it's capability to convert GUIDs to known names try parameter -ConvertAllKnownGuidsToClearText and you can see for example real application names instead of GUIDs on log events. Selecting last line (RELOAD) and OK will reload log file. Script can merge multiple log files so especially in LogViewerUI you can see Powershell command outputs from AgentExecutor.log Powershell command outputs and errors can be also shown in Timeline view with parameters -ShowStdOutInReport and -ShowErrorsInReport This shows instantly what is possible problem in Powershell scripts. Possible Microsoft 365 App and MSI Line-of-Business Apps (maybe change to Win32App ;) installations are not seen by this report because they are not installed with Intune Management Agent. Author: Petri.Paavola@yodamiitti.fi Senior Modern Management Principal Microsoft MVP - Windows and Devices 2024-05-09 https://github.com/petripaavola/Get-IntuneManagementExtensionDiagnostics .PARAMETER Online Download Powershell, Remediation and custom Compliance policy scripts to get displayName to Timeline report Install Microsoft Graph module with command: Install-Module -Name Microsoft.Graph.Authentication -Scope CurrentUser .PARAMETER LogFile Specify log file fullpath .PARAMETER LogFilesFolder Specify folder where to check log files. Will show UI where you can select what logs to process .PARAMETER LogStartDateTime Specify date and time to start log entries. For example - .PARAMETER LogEndDateTime Specify date and time to stop log entries .PARAMETER ShowLogViewerUI Shows graphical LogViewerUI where all log events are easily browsed, searched and filtered in graphical UI This parameter will always show file selection UI and event selection UI. .PARAMETER LogViewerUI Shows graphical LogViewerUI where all log events are easily browsed, searched and filtered in graphical UI This parameter will always show file selection UI and event selection UI. .PARAMETER AllLogEvents Process all found log events. Selecting this parameter will disable UI which asks date/time/hour selection for logs (use for silent commands or scripts) This is default option (aka silent and no selection UI shown) .PARAMETER LogEventsSelectionUI Selecting this parameter will enable UI which asks date/time/hour selection for logs .PARAMETER AllLogFiles Process all found supported log file(s) automatically. This includes *AgentExecutor*.log and *IntuneManagementExtension*.log Selecting this parameter will disable UI which asks which log files to process (use for silent commands or scripts) This is default option (aka silent and no selection UI shown) .PARAMETER LogFilesSelectionUI Selecting this parameter will enable UI which asks which log files to process .PARAMETER Today Show log entries from today (from midnight) .PARAMETER ShowAllTimelineEvents Shows more entries in report. This option will show starting messages for events which are not shown by default .PARAMETER ShowStdOutInReport Show script StdOut in events. This shows for example what Remediation script will return back to Intune .PARAMETER ShowErrorsInReport This will show found error messages from Powershell scripts. Note that Powershell script may succeed and still have errors shown here. .PARAMETER ShowErrorsSummary Show separate all errors summary after Timeline. .PARAMETER ConvertAllKnownGuidsToClearText This parameter replaces all known GUIDs to cleartext in LogViewerUI. Known GUIDs are Win32Apps and WinGetApps by default. With -Online option also Powershell scripts, Proactive Remediation scripts and custom Compliance script will get name shown in UI. Often this parameter helps a lot debugging log entries in LogViewerUI .PARAMETER LongRunningPowershellNotifyThreshold Threshold (seconds) after Timeline report will show warning message for long running Powershell scripts. Default value is 180 seconds. .PARAMETER ExportTextFileName Export Timeline information and possible Powershell script error to text file. This expects either text filename or fullpath to textfile. .PARAMETER FindAllLongRunningPowershellScripts Poweruser option to try to find all long running Powershell scripts over threshold which default is 180 seconds This option could find long running scripts which we don't even have event in our report. .PARAMETER DoNotOpenReportAutomatically Do not open html report file automatically in browser .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -AllLogEvents -AllLogFiles .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -AllLogEvents -ShowAllTimelineEvents .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ShowLogViewerUI .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ShowLogViewerUI -ConvertAllKnownGuidsToClearText .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -Today .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -LogStartDateTime "10.3.2023 5.00:00" -LogEndDateTime "11.3.2023 23.00:00" .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 "C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log" .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -LogFile "C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log" .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -LogFilesFolder "C:\temp\MDMDiagReport" .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ShowStdOutInReport .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ShowErrorsInReport .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ShowErrorsSummary .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ExportTextFileName ExportTextFile.txt .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -Online -ExportTextFileName C:\temp\ExportTextFile.txt .EXAMPLE .\Get-IntuneManagementExtensionDiagnostics.ps1 -AllLogEntries -AllLogFiles -ExportTextFileName C:\temp\ExportTextFile.txt .EXAMPLE Get-ChildItem "C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log" | .\Get-IntuneManagementExtensionDiagnostics.ps1 -AllLogEntries -Online .INPUTS Script accepts File object as input. This would be same than specifying Parameter -LogFile .OUTPUTS None .NOTES You can download current version of this script from PowershellGallery with command Save-Script Get-IntuneManagementExtensionDiagnostics -Path ./ .LINK https://github.com/petripaavola/Get-IntuneManagementExtensionDiagnostics #> [CmdletBinding()] Param( [Parameter(Mandatory=$false, HelpMessage = 'Enter Intune IME log file fullpath', ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [String]$LogFile = $null, [Parameter(Mandatory=$false, HelpMessage = 'Enter Intune IME log files folder path', ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [String]$LogFilesFolder = $null, [Parameter(Mandatory=$false)] [Switch]$Online, [Parameter(Mandatory=$false, HelpMessage = 'Enter Start DateTime for log entries (for example "10.3.2023 5:00:00")', ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] $LogStartDateTime = $null, [Parameter(Mandatory=$false, HelpMessage = 'Enter End DateTime for log entries (for example "11.3.2023 23.00:00")', ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] $LogEndDateTime = $null, [Parameter(Mandatory=$false)] [Switch]$ShowLogViewerUI, [Parameter(Mandatory=$false)] [Switch]$LogViewerUI, [Parameter(Mandatory=$false)] [Switch]$AllLogEntries=$true, [Parameter(Mandatory=$false)] [Switch]$LogEntriesSelectionUI, [Parameter(Mandatory=$false)] [Switch]$AllLogFiles=$true, [Parameter(Mandatory=$false)] [Switch]$LogFilesSelectionUI, [Parameter(Mandatory=$false)] [Switch]$Today, [Parameter(Mandatory=$false)] [Switch]$ShowAllTimelineEvents, [Parameter(Mandatory=$false)] [Switch]$ShowStdOutInReport, [Parameter(Mandatory=$false)] [Switch]$ShowErrorsInReport, [Parameter(Mandatory=$false)] [Switch]$ShowErrorsSummary, [Parameter(Mandatory=$false)] [Switch]$ConvertAllKnownGuidsToClearText, [Parameter(Mandatory=$false, HelpMessage = 'Threshold seconds to highlight long running Powershell scripts', ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [int]$LongRunningPowershellNotifyThreshold = 180, [Parameter(Mandatory=$false, HelpMessage = 'Enter text (.txt) filename to export info to', ValueFromPipeline=$false, ValueFromPipelineByPropertyName=$false)] [String]$ExportTextFileName=$null, [Parameter(Mandatory=$false)] [String]$ExportHTMLReportPath=$null, [Parameter(Mandatory=$false)] [Switch]$FindAllLongRunningPowershellScripts, [Parameter(Mandatory=$false)] [Switch]$DoNotOpenReportAutomatically ) $ScriptVersion = "2.3" $TimeOutBetweenGraphAPIRequests = 300 Write-Host "Get-IntuneManagementExtensionDiagnostics.ps1 $ScriptVersion" -ForegroundColor Cyan Write-Host "Author: Petri.Paavola@yodamiitti.fi / Microsoft MVP - Windows and Devices" Write-Host "" $ExportHTML=$True # Make script to not show start selection UIs by default # This should be fixed in the code # but this was quicker hack to make script silent by default $AllLogEntries=$true $AllLogFiles = $true if($LogEntriesSelectionUI) { $AllLogEntries=$false } if($LogFilesSelectionUI) { $AllLogFiles = $false } # Show selection UIs with LogViewerUI because we would like to # limit as less as events possible to save memory and speed up Out-GridView # With LogViewerUI show Events selection UI always # With LogViewerUI show file selection UI always if($ShowLogViewerUI -or $LogViewerUI) { $LogEntriesSelectionUI = $true $LogFilesSelectionUI = $true $AllLogEntries=$false $AllLogFiles = $false Write-Host "Parameter -ShowLogViewerUI selected. Script will show log file and event selection UIs." } # Set variables automatically if we are in Windows Autopilot ESP (Enrollment Status Page) # Idea is that user can just run the script without checking Parameters first if($env:UserName -eq 'defaultUser0') { Write-Host "Detected running in Windows Autopilot Enrollment Status Page (ESP)" -ForegroundColor Yellow #$LOGFile='C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log' # Do not open HTML report to browser $DoNotOpenReportAutomatically = $true if((-not $LogFilesFolder) -or (-not $LOGFile)) { Write-Host "Configuring parameters automatically" Write-Host "Selected: All log files from default Intune IME logs folder" Write-Host "Selected: Do not open HTML report automatically" Write-Host $LogFilesFolder = 'C:\ProgramData\Microsoft\IntuneManagementExtension\Logs' if(-not (Test-Path $LogFilesFolder)) { Write-Host "Log folder does not exist yet: $LogFilesFolder" Write-Host "Try again in a moment..." -ForegroundColor Yellow Write-Host "" Exit 0 } } # Save Computer Name $ComputerNameForReport = $env:ComputerName # Process all found supported log files # This will not show file selection UI $AllLogFiles=$True # Process all log entries # This will not show time selection UI $AllLogEntries=$True # Show all entries in Timeline # This especially useful if some script or application hangs for a long time # so then you can see start entry for that script or application and you know what is current running Intune deployment $ShowAllTimelineEvents=$True if(-not (Test-Path 'C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log')) { Write-Host "Log file does not exist yet: C:\ProgramData\Microsoft\IntuneManagementExtension\Logs\IntuneManagementExtension.log" -ForegroundColor Yellow Write-Host "Try again in a moment..." -ForegroundColor Yellow Write-Host "" Exit 0 } } # Hashtable with ids and names $IdHashtable = @{} # Save timeline objects to this List $observedTimeline = [System.Collections.Generic.List[PSObject]]@() # Save application download statistics to this list $ApplicationDownloadStatistics = [System.Collections.Generic.List[PSObject]]@() # Save filtered oud applications to to this list $ApplicationAssignmentFilterApplied = [System.Collections.Generic.List[PSObject]]@() # TimeLine entry index # This might be used in HTML table for sorting entries $Script:observedTimeLineIndexToHTMLTable=0 ################ Functions ################ # This is aligned with Michael Niehaus's Get-AutopilotDiagnostics script just in case # region Functions Function RecordStatusToTimeline { param ( [Parameter(Mandatory=$true)] [String] $date, [Parameter(Mandatory=$true)] [String] $status, [Parameter(Mandatory=$false)] [String] $type, [Parameter(Mandatory=$false)] [String] $intent, [Parameter(Mandatory=$false)] [String] $detail, [Parameter(Mandatory=$false)] $seconds, [Parameter(Mandatory=$false)] [String] $logEntry, [Parameter(Mandatory=$false)] [String] $color, [Parameter(Mandatory=$false)] [String] $DetailToolTip ) $Script:observedTimeLineIndexToHTMLTable++ # Round seconds to full seconds if($seconds) { $seconds = [math]::Round($seconds) } $observedTimeline.add([PSCustomObject]@{ 'Index' = $Script:observedTimeLineIndexToHTMLTable 'Date' = $date 'Status' = $status 'Type' = $type 'Intent' = $intent 'Detail' = $detail 'Seconds' = $seconds 'LogEntry' = $logEntry 'Color' = $color 'DetailToolTip' = $DetailToolTip }) } Function Get-AppIntent { Param( $AppId ) $intent = 'Unknown Intent' if($AppId) { if($IdHashtable.ContainsKey($AppId)) { $AppPolicy=$IdHashtable[$AppId] if($AppPolicy.Intent) { Switch ($AppPolicy.Intent) { 0 { $intent = 'Not Targeted' } 1 { $intent = 'Available Install' } 3 { $intent = 'Required Install' } 4 { $intent = 'Required Uninstall' } default { $intent = 'Unknown Intent' } } } } } return $intent } Function Get-AppIntentNameForNumber { Param( $IntentNumber ) Switch ($IntentNumber) { 0 { $intent = 'Not Targeted' } 1 { $intent = 'Available Install' } 3 { $intent = 'Required Install' } 4 { $intent = 'Required Uninstall' } default { $intent = 'Unknown Intent' } } return $intent } Function Get-AppDetectionResultForNumber { Param( $DetectionNumber ) Switch ($DetectionNumber) { 0 { $DetectionState = 'Unknown' } 1 { $DetectionState = 'Detected' } 2 { $DetectionState = 'Not Detected' } 3 { $DetectionState = 'Unknown' } 4 { $DetectionState = 'Unknown' } 5 { $DetectionState = 'Unknown' } default { $DetectionState = 'Unknown' } } return $DetectionState } Function Get-AppName { Param( $AppId ) $AppName = $null if($AppId) { if($IdHashtable.ContainsKey($AppId)) { $AppPolicy=$IdHashtable[$AppId] if($AppPolicy.Name) { $AppName = $AppPolicy.Name } } } return $AppName } Function Get-AppType { Param( $AppId ) $AppType = 'App' if($AppId) { if($IdHashtable.ContainsKey($AppId)) { $AppPolicy=$IdHashtable[$AppId] if($AppPolicy.InstallerData) { # This should be New Store App $AppType = 'WinGetApp' } else { # This should be Win32App $AppType = 'Win32App' } } } return $AppType } Function Convert-AppDetectionValuesToHumanReadable { Param( $DetectionRulesObject ) # Object has DetectionType and DetectionText objects # Object is array of objects <# [ { "DetectionType": 2, "DetectionText": { "Path": "C:\\Program Files (x86)\\Foo", "FileOrFolderName": "bar.exe", "Check32BitOn64System": true, "DetectionType": 1, "Operator": 0, "DetectionValue": null } } ] #> foreach($DetectionRule in $DetectionRulesObject) { # Change DetectionText properties values to text # DetectionType: Registry if($DetectionRule.DetectionType -eq 0) { # Registry Detection Type values # https://learn.microsoft.com/en-us/graph/api/resources/intune-apps-win32lobappregistrydetectiontype?view=graph-rest-beta Switch ($DetectionRule.DetectionText.DetectionType) { 0 { $DetectionRule.DetectionText.DetectionType = 'Not configure' } 1 { $DetectionRule.DetectionText.DetectionType = 'Value exists' } 2 { $DetectionRule.DetectionText.DetectionType = 'Value does not exist' } 3 { $DetectionRule.DetectionText.DetectionType = 'String comparison' } 4 { $DetectionRule.DetectionText.DetectionType = 'Integer comparison' } 5 { $DetectionRule.DetectionText.DetectionType = 'Version comparison' } } # Registry Detection Operation values # https://learn.microsoft.com/en-us/graph/api/resources/intune-apps-win32lobappruleoperator?view=graph-rest-beta Switch ($DetectionRule.DetectionText.Operator) { 0 { $DetectionRule.DetectionText.Operator = 'Not configured' } 1 { $DetectionRule.DetectionText.Operator = 'Equals' } 2 { $DetectionRule.DetectionText.Operator = 'Not equal to' } 4 { $DetectionRule.DetectionText.Operator = 'Greater than' } 5 { $DetectionRule.DetectionText.Operator = 'Greater than or equal to' } 8 { $DetectionRule.DetectionText.Operator = 'Less than' } 9 { $DetectionRule.DetectionText.Operator = 'Less than or equal to' } } } # DetectionType: File if($DetectionRule.DetectionType -eq 2) { # File Detection Type values # https://learn.microsoft.com/en-us/graph/api/resources/intune-apps-win32lobappfilesystemdetectiontype?view=graph-rest-beta Switch ($DetectionRule.DetectionText.DetectionType) { 0 { $DetectionRule.DetectionText.DetectionType = 'Not configure' } 1 { $DetectionRule.DetectionText.DetectionType = 'File or folder exists' } 2 { $DetectionRule.DetectionText.DetectionType = 'Date modified' } 3 { $DetectionRule.DetectionText.DetectionType = 'Date created' } 4 { $DetectionRule.DetectionText.DetectionType = 'String (version)' } 5 { $DetectionRule.DetectionText.DetectionType = 'Size in MB' } 6 { $DetectionRule.DetectionText.DetectionType = 'File or folder does not exist' } } # File Detection Operator values # https://learn.microsoft.com/en-us/graph/api/resources/intune-apps-win32lobappdetectionoperator?view=graph-rest-beta Switch ($DetectionRule.DetectionText.Operator) { 0 { $DetectionRule.DetectionText.Operator = 'Not configured' } 1 { $DetectionRule.DetectionText.Operator = 'Equals' } 2 { $DetectionRule.DetectionText.Operator = 'Not equal to' } 4 { $DetectionRule.DetectionText.Operator = 'Greater than' } 5 { $DetectionRule.DetectionText.Operator = 'Greater than or equal to' } 8 { $DetectionRule.DetectionText.Operator = 'Less than' } 9 { $DetectionRule.DetectionText.Operator = 'Less than or equal to' } } } # DetectionType: Custom script if($DetectionRule.DetectionType -eq 3) { # Convert base64 script to clear text #$DetectionRule.DetectionText.ScriptBody # Decode Base64 content $b = [System.Convert]::FromBase64String("$($DetectionRule.DetectionText.ScriptBody)") $DetectionRule.DetectionText.ScriptBody = [System.Text.Encoding]::UTF8.GetString($b) } <# # Change DetectionType value to text Switch ($DetectionRule.DetectionType) { 0 { $DetectionRule.DetectionType = 'Registry' } 1 { $DetectionRule.DetectionType = 'MSI' } 2 { $DetectionRule.DetectionType = 'File' } 3 { $DetectionRule.DetectionType = 'Custom script' } default { $DetectionRule.DetectionType = $DetectionRule.DetectionType } } #> # Add new property with DetectionType value as text Switch ($DetectionRule.DetectionType) { 0 { $DetectionRule | Add-Member -MemberType noteProperty -Name DetectionTypeAsText -Value 'Registry' } 1 { $DetectionRule | Add-Member -MemberType noteProperty -Name DetectionTypeAsText -Value 'MSI' } 2 { $DetectionRule | Add-Member -MemberType noteProperty -Name DetectionTypeAsText -Value 'File' } 3 { $DetectionRule | Add-Member -MemberType noteProperty -Name DetectionTypeAsText -Value 'Custom script' } default { $DetectionRule | Add-Member -MemberType noteProperty -Name DetectionTypeAsText -Value $DetectionRule.DetectionType } } } return $DetectionRulesObject } function Invoke-MgGraphRequestGetAllPages { param ( [Parameter(Mandatory = $true)] [String]$uri ) $MgGraphRequest = $null $AllMSGraphRequest = $null Start-Sleep -Milliseconds $TimeOutBetweenGraphAPIRequests try { # Save results to this variable $allGraphAPIData = @() do { $MgGraphRequest = $null $MgGraphRequest = Invoke-MgGraphRequest -Uri $uri -Method 'Get' -OutputType PSObject -ContentType "application/json" if($MgGraphRequest) { # Test if object has attribute named Value (whether value is null or not) #if((Get-Member -inputobject $MgGraphRequest -name 'Value' -Membertype Properties) -and (Get-Member -inputobject $MgGraphRequest -name '@odata.context' -Membertype Properties)) { if(Get-Member -inputobject $MgGraphRequest -name 'Value' -Membertype Properties) { # Value property exists $allGraphAPIData += $MgGraphRequest.Value # Check if we have value starting https:// in attribute @odate.nextLink # and check that $Top= parameter was NOT used. With $Top= parameter we can limit search results # but that almost always results .nextLink being present if there is more data than specified with top # If we specified $Top= ourselves then we don't want to fetch nextLink values # # So get GraphAllPages if there is valid nextlink and $Top= was NOT used in url originally if (($MgGraphRequest.'@odata.nextLink' -like 'https://*') -and (-not ($uri.Contains('$top=')))) { # Save nextLink url to variable and rerun do-loop $uri = $MgGraphRequest.'@odata.nextLink' Start-Sleep -Milliseconds $TimeOutBetweenGraphAPIRequests # Continue to next round in Do-loop Continue } else { # We dont have nextLink value OR # $top= exists so we return what we got from first round #return $allGraphAPIData $uri = $null } } else { # Sometimes we get results without Value-attribute (eg. getting user details) # We will return all we got as is # because there should not be nextLink page in this case ??? return $MgGraphRequest } } else { # Invoke-MGGraphRequest failed so we return false return $null } } while ($uri) # Always run once and continue if there is nextLink value # We should not end here but just in case return $allGraphAPIData } catch { Write-Error "There was error with MGGraphRequest with url $url!" return $null } } ### HTML Report helper functions ### function Fix-HTMLSyntax { Param( $html ) $html = $html.Replace('<', '<') $html = $html.Replace('>', '>') $html = $html.Replace('"', '"') return $html } function Fix-HTMLColumns { Param( $html ) # Rename column headers $html = $html -replace '<th>@odata.type</th>','<th>App type</th>' $html = $html -replace '<th>displayname</th>','<th>App name</th>' $html = $html -replace '<th>assignmentIntent</th>','<th>Assignment Intent</th>' $html = $html -replace '<th>assignmentTargetGroupDisplayName</th>','<th>Target Group</th>' $html = $html -replace '<th>assignmentFilterDisplayName</th>','<th>Filter name</th>' $html = $html -replace '<th>FilterIncludeExclude</th>','<th>Filter Intent</th>' $html = $html -replace '<th>publisher</th>','<th>Publisher</th>' $html = $html -replace '<th>productVersion</th>','<th>Version</th>' $html = $html -replace '<th>filename</th>','<th>Filename</th>' $html = $html -replace '<th>createdDateTime</th>','<th>Created</th>' $html = $html -replace '<th>lastModifiedDateTime</th>','<th>Modified</th>' return $html } function return-ObjectPropertiesAsAlignedString { Param( $object ) # Calculate the maximum length of property names for alignment $maxWidth = ($object.PSObject.Properties.Name | Measure-Object -Maximum -Property Length).Maximum # Build the formatted string $result = $object.PSObject.Properties | ForEach-Object { "{0,-$maxWidth} : {1}" -f $_.Name, $_.Value } # Convert array to single string $output = $result -join "`n" return $output } # endregion Functions ################ Functions ################ Write-Host "Starting Get-IntuneManagementExtensionDiagnostics`n" # If LogFilePath is not specified then show log files in Out-GridView # from folder C:\ProgramData\Microsoft\intunemanagementextension\Logs if($LOGFile) { if(-not (Test-Path $LOGFile)) { Write-Host "Log file does not exist: $LOGFile" -ForegroundColor Yellow Write-Host "Script will exit" -ForegroundColor Yellow Write-Host "" Exit 0 } $SelectedLogFiles = Get-ChildItem -Path $LOGFile } else { if($LogFilesFolder) { if(-not (Test-Path $LogFilesFolder)) { Write-Host "LogFilesFolder: $LogFilesFolder does not exist" -ForegroundColor Yellow Write-Host "Script will exit" -ForegroundColor Yellow exit 0 } # Sort files: new files first and IntuneManagementExtension before AgentExecutor $LogFiles = Get-ChildItem -Path $LogFilesFolder -Filter *.log | Where-Object { ($_.Name -like '*IntuneManagementExtension*.log') -or ($_.Name -like '*AgentExecutor*.log') } | Sort-Object -Property Name -Descending | Sort-Object -Property LastWriteTime -Descending } else { # Running report using local computer's Intune log files # Save Computer Name $ComputerNameForReport = $env:ComputerName # Sort files: new files first and IntuneManagementExtension before AgentExecutor $LogFiles = Get-ChildItem -Path 'C:\ProgramData\Microsoft\intunemanagementextension\Logs' -Filter *.log | Where-Object { ($_.Name -like '*IntuneManagementExtension*.log') -or ($_.Name -like '*AgentExecutor*.log') } | Sort-Object -Property Name -Descending | Sort-Object -Property LastWriteTime -Descending } # Show log files in Out-GridView # This variable is automatically configured in ESP if(-not $SelectedLogFiles) { if($AllLogFiles) { $SelectedLogFiles = $LogFiles } else { $SelectedLogFiles = $LogFiles | Out-GridView -Title 'Select log file to show in Out-GridView from path C:\ProgramData\Microsoft\intunemanagementextension\Logs' -OutputMode Multiple } } if(-not $SelectedLogFiles) { Write-Host "No log file(s) selected. Script will exit!`n" -ForegroundColor Yellow Exit 0 } } # Check whether we show time selection on Out-GridView or not if(((-not $LogStartDateTime) -and (-not $LogEndDateTime)) -and (-not $AllLogEntries) -and (-not $Today)) { $LogStartEndTimeOutGridviewEntries = [System.Collections.Generic.List[PSObject]]@() $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'All log entries'; 'LogStartDateTimeObject' = Get-Date 1/1/1900; 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Current day from midnight'; 'LogStartDateTimeObject' = Get-Date -Hour 0 -Minute 0 -Second 0; 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 5 minutes'; 'LogStartDateTimeObject' = (Get-Date).AddMinutes(-5); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 15 minutes'; 'LogStartDateTimeObject' = (Get-Date).AddMinutes(-15); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 30 minutes'; 'LogStartDateTimeObject' = (Get-Date).AddMinutes(-30); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 1 hour'; 'LogStartDateTimeObject' = (Get-Date).AddHours(-1); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 2 hours'; 'LogStartDateTimeObject' = (Get-Date).AddHours(-2); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 6 hours'; 'LogStartDateTimeObject' = (Get-Date).AddHours(-6); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 24 hours'; 'LogStartDateTimeObject' = (Get-Date).AddHours(-24); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'Last 7 days'; 'LogStartDateTimeObject' = (Get-Date).AddDays(-7); 'LogEndDateTimeObject' = (Get-Date).AddYears(1000); }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'First 30 minutes'; 'LogStartDateTimeObject' = Get-Date 1/1/1900; 'LogEndDateTimeObject' = 'Analyzing DateTime later'; }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'First 1 hour'; 'LogStartDateTimeObject' = Get-Date 1/1/1900; 'LogEndDateTimeObject' = 'Analyzing DateTime later'; }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'First 2 hours'; 'LogStartDateTimeObject' = Get-Date 1/1/1900; 'LogEndDateTimeObject' = 'Analyzing DateTime later'; }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'First 6 hours'; 'LogStartDateTimeObject' = Get-Date 1/1/1900; 'LogEndDateTimeObject' = 'Analyzing DateTime later'; }) $LogStartEndTimeOutGridviewEntries.add([PSCustomObject]@{ 'Log Start and End time' = 'First 24 hours'; 'LogStartDateTimeObject' = Get-Date 1/1/1900; 'LogEndDateTimeObject' = 'Analyzing DateTime later'; }) # Show predefined values in Out-GridView $SelectedTimeFrameObject = $LogStartEndTimeOutGridviewEntries | Out-GridView -Title 'Select timeframe to show log entries' -OutputMode Multiple if($SelectedTimeFrameObject) { $LogStartDateTimeObject = $SelectedTimeFrameObject.LogStartDateTimeObject $LogEndDateTimeObject = $SelectedTimeFrameObject.LogEndDateTimeObject } else { Write-Host "No timeframe selected." -ForegroundColor Red Write-Host "Script will exit" Exit 0 } } else { # Set default time which can be changed depenging on -Parameters # Use StartTime from year 1900 $LogStartDateTimeObject = Get-Date 1/1/1900 # Use EndTime +1000 years from today $LogEndDateTimeObject = (Get-Date).AddYears(1000) if($Today) { $LogStartDateTimeObject = Get-Date -Hour 0 -Minute 0 -Second 0 $LogEndDateTimeObject = (Get-Date).AddYears(1000) } if($AllLogEntries) { # Use StartTime from year 1900 $LogStartDateTimeObject = Get-Date 1/1/1900 # Use EndTime +1000 years from today $LogEndDateTimeObject = (Get-Date).AddYears(1000) } # Check $LogStartDateTime can be converted to Powershell DateTime object if($LogStartDateTime) { # Try converting given parameter to Powershell DateTime object Try { $LogStartDateTimeObject = Get-Date $LogStartDateTime } catch { Write-Host "Given parameter LogStartDateTime is not in valid DateTime format." -ForegroundColor Red Write-Host "Script will exit" Exit 0 } } # Check $LogEndDateTime can be converted to Powershell DateTime object if($LogEndDateTime) { # Try converting given parameter to Powershell DateTime object Try { $LogEndDateTimeObject = Get-Date $LogEndDateTime } catch { Write-Host "Given parameter LogEndDateTime is not in valid DateTime format." -ForegroundColor Red Write-Host "Script will exit" Exit 0 } } } # Download Powershell scripts, Proactive Remediation scripts and custom Compliance Policy scripts if ($Online) { $GraphAuthenticationModule = $null $MgContext = $null # Test if we are in Enrollment Status Page (ESP) phase # Detect defaultuser0 loggedon if($env:UserName -eq 'defaultUser0') { # Make sure we can connect $GraphAuthenticationModule = Import-Module Microsoft.Graph.Authentication -PassThru -ErrorAction Ignore if (-not $GraphAuthenticationModule) { Write-Host "Installing module Microsoft.Graph.Authentication" Install-Module Microsoft.Graph.Authentication -Force $Success = $? if($Success) { Write-Host "Success`n" -ForegroundColor Green Write-Host "Import module Microsoft.Graph.Authentication" $GraphAuthenticationModule = Import-Module Microsoft.Graph.Authentication -PassThru -ErrorAction Ignore if($GraphAuthenticationModule) { # Module imported successfully Write-Host "Success`n" -ForegroundColor Green } else { # Failed to import module Write-Host "Failed to import module! Skip downloading script names...`n" -ForegroundColor Red } } else { Write-Host "Failed to install module! Skip downloading script names...`n" -ForegroundColor Red } } if($GraphAuthenticationModule) { Write-Host "Connect to Microsoft Graph API" $scopes = "DeviceManagementConfiguration.Read.All" $MgGraph = Connect-MgGraph -scopes $scopes $Success = $? if ($Success -and $MgGraph) { Write-Host "Success`n" -ForegroundColor Green # Get MgGraph session details $MgContext = Get-MgContext if($MgContext) { $TenantId = $MgContext.TenantId $AdminUserUPN = $MgContext.Account Write-Host "Connected to Intune tenant:`n$TenantId`n$AdminUserUPN`n" } else { Write-Host "Error getting MgContext information! Skip downloading script names..." -ForegroundColor Red } } else { Write-Host "Could not connect to Graph API! Skip downloading script names..." -ForegroundColor Red } } else { Write-Host "Could not connect to Graph API! Skip downloading script names..." -ForegroundColor Red } } else { Write-Host "Connecting to Intune using module Microsoft.Graph.Authentication" Write-Host "Import module Microsoft.Graph.Authentication" Import-Module Microsoft.Graph.Authentication $Success = $? if($Success) { # Module imported successfully Write-Host "Success`n" -ForegroundColor Green } else { Write-Host "Failed" -ForegroundColor Red Write-Host "Make sure you have installed module Microsoft.Graph.Authentication" Write-Host "You can install module without admin rights to your user account with command:`n`nInstall-Module -Name Microsoft.Graph.Authentication -Scope CurrentUser" -ForegroundColor Yellow Write-Host "`nor you can install machine-wide module with with admin rights using command:`nInstall-Module -Name Microsoft.Graph.Authentication" Write-Host "" Exit 1 } Write-Host "Connect to Microsoft Graph API" $scopes = "DeviceManagementConfiguration.Read.All" $MgGraph = Connect-MgGraph -scopes $scopes $Success = $? if ($Success -and $MgGraph) { Write-Host "Success`n" -ForegroundColor Green # Get MgGraph session details $MgContext = Get-MgContext if($MgContext) { $TenantId = $MgContext.TenantId $AdminUserUPN = $MgContext.Account Write-Host "Connected to Intune tenant:`n$TenantId`n$AdminUserUPN`n" } else { Write-Host "Error getting MgContext information!`nScript will exit!" -ForegroundColor Red Exit 1 } } else { Write-Host "Could not connect to Graph API!" -ForegroundColor Red Exit 1 } } # Download Intune scripts information if we have connection to Microsoft Graph API if($MgContext) { Write-Host "Download Intune Powershell scripts" # Get PowerShell Scripts $uri = 'https://graph.microsoft.com/beta/deviceManagement/deviceManagementScripts' $AllIntunePowershellScripts = Invoke-MgGraphRequestGetAllPages -Uri $uri if($AllIntunePowershellScripts) { Write-Host "Done" -ForegroundColor Green # Add Name Property to object $AllIntunePowershellScripts | Foreach-Object { $_ | Add-Member -MemberType noteProperty -Name name -Value $_.displayName } # Add all PowershellScripts to Hashtable $AllIntunePowershellScripts | Foreach-Object { $id = $_.id; $value=$_; $IdHashtable["$id"] = $value } } else { Write-Error "Did not find Intune Powershell scripts" } Start-Sleep -MilliSeconds 500 Write-Host "Download Intune Remediations Scripts" # Get Proactive Remediations Scripts $uri = 'https://graph.microsoft.com/beta/deviceManagement/deviceHealthScripts' $AllIntuneProactiveRemediationsScripts = Invoke-MgGraphRequestGetAllPages -Uri $uri if($AllIntuneProactiveRemediationsScripts) { Write-Host "Done" -ForegroundColor Green # Add Name Property to object $AllIntuneProactiveRemediationsScripts | Foreach-Object { $_ | Add-Member -MemberType noteProperty -Name name -Value $_.displayName } # Add all PowershellScripts to Hashtable $AllIntuneProactiveRemediationsScripts | Foreach-Object { $id = $_.id; $value=$_; $IdHashtable["$id"] = $value } } else { Write-Error "Did not find Intune Remediation scripts" } Start-Sleep -MilliSeconds 500 Write-Host "Download Intune Windows Device Compliance custom Scripts" # Get Windows Device Compliance custom Scripts $uri = 'https://graph.microsoft.com/beta/deviceManagement/deviceComplianceScripts' $AllIntuneCustomComplianceScripts = Invoke-MgGraphRequestGetAllPages -Uri $uri if($AllIntuneCustomComplianceScripts) { Write-Host "Done" -ForegroundColor Green # Add Name Property to object $AllIntuneCustomComplianceScripts | Foreach-Object { $_ | Add-Member -MemberType noteProperty -Name name -Value $_.displayName } # Add all PowershellScripts to Hashtable $AllIntuneCustomComplianceScripts | Foreach-Object { $id = $_.id; $value=$_; $IdHashtable["$id"] = $value } } else { Write-Error "Did not find Intune Windows custom Compliance scripts" } Start-Sleep -MilliSeconds 500 Write-Host "Download Intune Filters" $uri = 'https://graph.microsoft.com/beta/deviceManagement/assignmentFilters?$select=*' $AllIntuneFilters = Invoke-MgGraphRequestGetAllPages -Uri $uri if($AllIntuneFilters) { Write-Host "Done" -ForegroundColor Green # Add all Filters to Hashtable $AllIntuneFilters | Foreach-Object { $id = $_.id; $value=$_; $IdHashtable["$id"] = $value } } else { Write-Error "Did not find Intune filters" } } else { Write-Host "Not connected to Microsoft Intune, skip downloading script names...." -ForegroundColor Yellow } } Write-Host "" # Run Report and/or Out-GridView in loop as long as user selects last line which will reload log file # Otherwise Out-GridView will exit if something else is selected than last line (reload line) do { # Create Generic list where log entry custom objects are added $LogEntryList = [System.Collections.Generic.List[PSObject]]@() # Go through all selected log file(s) Foreach ($SelectedLogFile in $SelectedLogFiles) { $LogFilePath = $SelectedLogFile.FullName $LogFileName = $SelectedLogFile.Name Write-Host "Processing file $LogFileName" # Initialize variables $LineNumber=1 $MultilineLogEntryStartsArrayIndex=0 $MultilineLogEntryStartFound=$False $Log = Get-Content -Path $LogFilePath # This matches for cmtrace type logs # Test with https://regex101.com # String: <![LOG[ExecutorLog AgentExecutor gets invoked]LOG]!><time="21:38:06.3814532" date="2-14-2023" component="AgentExecutor" context="" type="1" thread="1" file=""> # This matches single line full log entry $SingleLineRegex = '^\<\!\[LOG\[(.*)]LOG\].*\<time="([0-9]{1,2}):([0-9]{1,2}):([0-9]{1,2}).([0-9]{1,})".*date="([0-9]{1,2})-([0-9]{1,2})-([0-9]{4})" component="(.*?)" context="(.*?)" type="(.*?)" thread="(.*?)" file="(.*?)">$' # Start of multiline log entry $FirstLineOfMultiLineLogRegex = '^\<\!\[LOG\[(.*)$' # End of multiline log entry $LastLineOfMultiLineLogRegex = '^(.*)\]LOG\]\!>\<time="([0-9]{1,2}):([0-9]{1,2}):([0-9]{1,2}).([0-9]{1,})".*date="([0-9]{1,2})-([0-9]{1,2})-([0-9]{4})" component="(.*?)" context="(.*?)" type="(.*?)" thread="(.*?)" file="(.*?)">$' # Process each log file line one by one Foreach ($CurrentLogEntry in $Log) { # Get data from CurrentLogEntry if($CurrentLogEntry -Match $SingleLineRegex) { # This matches single line log entry # Regex found match $LogMessage = $Matches[1].Trim() $Hour = $Matches[2] $Minute = $Matches[3] $Second = $Matches[4] $MilliSecondFull = $Matches[5] # Cut milliseconds to 0-999 # Time unit is so small that we don't even bother to round the value $MilliSecond = $MilliSecondFull.Substring(0,3) $Month = $Matches[6] $Day = $Matches[7] $Year = $Matches[8] $Component = $Matches[9] $Context = $Matches[10] $Type = $Matches[11] $Thread = $Matches[12] $File = $Matches[13] $Param = @{ Hour=$Hour Minute=$Minute Second=$Second MilliSecond=$MilliSecond Year=$Year Month=$Month Day=$Day } $LogEntryDateTime = Get-Date @Param #Write-Host "DEBUG `$LogEntryDateTime: $LogEntryDateTime" -ForegroundColor Yellow # This works for humans but does not sort #$DateTimeToLogFile = "$($Hour):$($Minute):$($Second).$MilliSecondFull $Day/$Month/$Year" # Add leading 0 so sorting works right if($Month -like "?") { $Month = "0$Month" } # Add leading 0 so sorting works right if($Day -like "?") { $Day = "0$Day" } # This does sorting right way $DateTimeToLogFile = "$Year-$Month-$Day $($Hour):$($Minute):$($Second).$MilliSecondFull" # Create Powershell custom object and add it to list $LogEntryList.add([PSCustomObject]@{ 'Index' = $null; 'LogEntryDateTime' = $LogEntryDateTime; 'FileName' = $LogFileName; 'Line' = $LineNumber; 'DateTime' = $DateTimeToLogFile; 'Multiline' = ''; 'ProcessRunTime' = $ProcessRunTime; 'Message' = $LogMessage; 'Component' = $Component; 'Context' = $Context; 'Type' = $Type; 'Thread' = $Thread; 'File' = $File }) } elseif ($CurrentLogEntry -Match $FirstLineOfMultiLineLogRegex) { # This is start of multiline log entry # Single line regex did not get results so we are dealing multiline case separately here #Write-Host "DEBUG Start of multiline regex: $CurrentLogEntry" -ForegroundColor Yellow $MultilineLogEntryStartFound=$True # Regex found match $LogMessage = $Matches[1].Trim() $LogEntryDateTime = '' $DateTimeToLogFile = '' $Component = '' $Context = '' $Type = '' $Thread = '' $File = '' # Create Powershell custom object and add it to list $LogEntryList.add([PSCustomObject]@{ 'Index' = $null; 'LogEntryDateTime' = $LogEntryDateTime; 'FileName' = $LogFileName; 'Line' = $LineNumber; 'DateTime' = $DateTimeToLogFile; 'Multiline' = ''; 'ProcessRunTime' = ''; 'Message' = $LogMessage; 'Component' = $Component; 'Context' = $Context; 'Type' = $Type; 'Thread' = $Thread; 'File' = $File }) $MultilineLogEntryStartsArrayIndex = $LogEntryList.Count - 1 } elseif ($CurrentLogEntry -Match $LastLineOfMultiLineLogRegex) { # This is end of multiline log entry # Single line regex did not get results so we are dealing multiline case separately here # Regex found match $LogMessage = $Matches[1].Trim() $Hour = $Matches[2] $Minute = $Matches[3] $Second = $Matches[4] $MilliSecondFull = $Matches[5] # Cut milliseconds to 0-999 # Time unit is so small that we don't even bother to round the value $MilliSecond = $MilliSecondFull.Substring(0,3) $Month = $Matches[6] $Day = $Matches[7] $Year = $Matches[8] $Component = $Matches[9] $Context = $Matches[10] $Type = $Matches[11] $Thread = $Matches[12] $File = $Matches[13] $Param = @{ Hour=$Hour Minute=$Minute Second=$Second MilliSecond=$MilliSecond Year=$Year Month=$Month Day=$Day } $LogEntryDateTime = Get-Date @Param #Write-Host "DEBUG `$LogEntryDateTime: $LogEntryDateTime" -ForegroundColor Yellow # This works for humans but does not sort #$DateTimeToLogFile = "$($Hour):$($Minute):$($Second).$MilliSecondFull $Day/$Month/$Year" # Add leading 0 so sorting works right if($Month -like "?") { $Month = "0$Month" } # Add leading 0 so sorting works right if($Day -like "?") { $Day = "0$Day" } # This does sorting right way $DateTimeToLogFile = "$Year-$Month-$Day $($Hour):$($Minute):$($Second).$MilliSecondFull" if($MultilineLogEntryStartFound) { $Multiline = '---->' } else { $Multiline = '' } # Create Powershell custom object and add it to list $LogEntryList.add([PSCustomObject]@{ 'Index' = $null; 'LogEntryDateTime' = $LogEntryDateTime; 'FileName' = $LogFileName; 'Line' = $LineNumber; 'DateTime' = $DateTimeToLogFile; 'Multiline' = $Multiline; 'ProcessRunTime' = ''; 'Message' = $LogMessage; 'Component' = $Component; 'Context' = $Context; 'Type' = $Type; 'Thread' = $Thread; 'File' = $File }) # Process previous lines and add DateTime, Multiline, Component, Context, Type, Thread and File # There can be corrupted log entries so there can be multiline entries without proper multiline start log entry # So we will add information until we find log entry which has DateTime value $MultilineLogEntryEndsArrayIndex = $LogEntryList.Count - 1 # Add data to starting multiline log entry object # DateTime, Component, Context, Type, Thread, File information $LogEntryList[$MultilineLogEntryStartsArrayIndex].LogEntryDateTime = $LogEntryDateTime $LogEntryList[$MultilineLogEntryStartsArrayIndex].DateTime = $DateTimeToLogFile $LogEntryList[$MultilineLogEntryStartsArrayIndex].Multiline = '<----' $LogEntryList[$MultilineLogEntryStartsArrayIndex].Component = $Component $LogEntryList[$MultilineLogEntryStartsArrayIndex].Context = $Context $LogEntryList[$MultilineLogEntryStartsArrayIndex].Type = $Type $LogEntryList[$MultilineLogEntryStartsArrayIndex].Thread = $Thread $LogEntryList[$MultilineLogEntryStartsArrayIndex].File = $File # Add data to multiline entries which are not end or start entries #if($MultilineLogEntryEndsArrayIndex - $MultilineLogEntryStartsArrayIndex -gt 1) { # Multiline entry is more than 2 lines # Add DateTime, Component, Context, Type, Thread, File information # to Multiline log entry from last to first #for($i=$MultilineLogEntryEndsArrayIndex - 1; $i -gt $MultilineLogEntryStartsArrayIndex ; $i--) { # Add information to previous log entries if they don't have DateTime-value # Stop when we find DateTime-value $i = $MultilineLogEntryEndsArrayIndex -1 While($LogEntryList[$i].DateTime -eq $null) { #Write-Host "DEBUG: Multiline add data: `$MultilineLogEntryStartsArrayIndex=$MultilineLogEntryStartsArrayIndex `$MultilineLogEntryEndsArrayIndex=$MultilineLogEntryEndsArrayIndex `$i=$i `$Message=$($LogEntryList[$i].Message)" $LogEntryList[$i].LogEntryDateTime = $LogEntryDateTime $LogEntryList[$i].DateTime = $DateTimeToLogFile $LogEntryList[$i].Multiline = ' --- ' $LogEntryList[$i].Component = $Component $LogEntryList[$i].Context = $Context $LogEntryList[$i].Type = $Type $LogEntryList[$i].Thread = $Thread $LogEntryList[$i].File = $File $i-- } } else { # We didn't catch log entry with our regex # This should be multiline log entry but not first or last line in that log entry # This can also be some line that should be matched with (other) regex #Write-Host "DEBUG: $CurrentLogEntry" -ForegroundColor Yellow # Create Powershell custom object and add it to list $LogEntryList.add([PSCustomObject]@{ 'Index' = $null; 'LogEntryDateTime' = $null; 'FileName' = $LogFileName; 'Line' = $LineNumber; 'DateTime' = $null; 'Multiline' = ''; 'ProcessRunTime' = $null; 'Message' = $CurrentLogEntry; 'Component' = ''; 'Context' = ''; 'Type' = ''; 'Thread' = ''; 'File' = '' }) } $LineNumber++ } # Foreach end single log file line by line foreach } # Foreach end all log files Write-Host "" # Check if there was log entries/lines which were not detected $DroppedLines = $LogEntryList | Where-Object DateTime -eq $null if($DroppedLines) { Write-Host "These lines were detected not to have right syntax so they were dropped" -ForegroundColor Yellow Foreach($Line in $DroppedLines) { Write-Host "$($Line.FileName) Line $($Line.Line) $($Line.Message)" # FIXME Copy timestamp from previous log entry } Write-Host "" } # Take last $LogEntryDateTime and add 1 seconds to it $ReloadDate = (Get-Date).AddHours(1) $ReloadDateTime = "$($ReloadDate.Year)-$($ReloadDate.Month)-$($ReloadDate.Day) $($ReloadDate.TimeOfDay)" # Add last entry which will reload log file if selected $LogEntryList.add([PSCustomObject]@{ 'Index' = $null; 'LogEntryDateTime' = $ReloadDate; 'FileName' = ''; 'Line' = ''; 'DateTime' = $ReloadDateTime; 'Multiline' = ''; 'ProcessRunTime' = ''; 'Message' = 'RELOAD LOG FILE(S). Select this line and OK button from right botton corner'; 'Component' = ''; 'Context' = ''; 'Type' = ''; 'Thread' = ''; 'File' = '' }) # Check if First x minutes/hours was selected if($LogEndDateTimeObject -eq 'Analyzing DateTime later') { # Sort log entries by DateTime and secondary by Line number # because with multiple files we are not organized by default # Find first log entry with LogEntryDateTime value # There is some rare case there could be log entry with empty value Foreach ($LogEntryObject in $LogEntryList | Sort-Object -Property DateTime, Line) { Try { $FirstLogEntryTimeDate = Get-Date $LogEntryObject.LogEntryDateTime Break } catch { } } # And figure out LogEndDateTime based on first log entry timestamp if($SelectedTimeFrameObject.'Log Start and End time' -eq 'First 30 minutes') { $LogEndDateTimeObject = ($FirstLogEntryTimeDate).AddMinutes(30) } if($SelectedTimeFrameObject.'Log Start and End time' -eq 'First 1 hour') { $LogEndDateTimeObject = ($FirstLogEntryTimeDate).AddHours(1) } if($SelectedTimeFrameObject.'Log Start and End time' -eq 'First 2 hours') { $LogEndDateTimeObject = ($FirstLogEntryTimeDate).AddHours(2) } if($SelectedTimeFrameObject.'Log Start and End time' -eq 'First 6 hours') { $LogEndDateTimeObject = ($FirstLogEntryTimeDate).AddHours(6) } if($SelectedTimeFrameObject.'Log Start and End time' -eq 'First 24 hours') { $LogEndDateTimeObject = ($FirstLogEntryTimeDate).AddHours(24) } Write-Host "Log entries End time: $LogEndDateTimeObject`n" } Write-Host "Creating report" Write-Host " Start time: $LogStartDateTimeObject" Write-Host " End time: $LogEndDateTimeObject`n" # Filter and Sort objects # We need to sort with DateTime AND Line # because there can are multiple log entries with same timestamp #$LogEntryList = $LogEntryList | Sort-Object -Property DateTime, Line $LogEntryList = $LogEntryList | Where-Object { ($_.LogEntryDateTime -gt $LogStartDateTimeObject) -and ($_.LogEntryDateTime -lt $LogEndDateTimeObject) } | Sort-Object -Property DateTime, Line # Add Index property value # This is used for sorting when doing analyzing in Out-GridView $index = 1 Foreach($LogEntry in $LogEntryList) { # Use this to find out if we did catch all lines # Look for the first object index and line numbers that if they match #Write-host "$index $($LogEntry.Line) $($LogEntry.Message)" # DateTime is empty if there was corrupted log entries # We should set last known timestamp to those but this is just in case we still missed something if($LogEntry.DateTime) { $LogEntry.Index = $index $index++ } } # region analyze log entries ########################## # Analyze log entries # # Try to find end and start log entries for Powershell, Win32App and WinGetApp installations # We go backwards because if there is process end log entry # then there has to be start log entry (going upwards) for the same process (same thread in this case) # # Start process could be "orphan" if process is stopped without end log entry # so it is hard to detect these cases (going from up to down) $DetectedInEspPhase=$False $skipDeviceStatusPage='NotFoundYet' $skipUserStatusPage='NotFoundYet' $skipDeviceStatusPageIndex=$null $skipUserStatusPageIndex=$null $NotInEspInSessionFound=$false $UserESPFinished=$false $UserESPFinishedNotFoundWarningMessageShown=$false $PreviousLoggedOnUser='NotInitializedYet' $LoggedOnUserDefaultUser0Shown=$false $PowershellScriptStartLogEntryFound=$false $PowershellScriptStartLogEntryIndex=$null # Array $PowershellScriptErrorLogs = @() $IntuneAppPolicies = $null # This is index of colon character in timeline # This uses -f formatting syntax $ColonIndentInTimeLine = -22 # Info message about Windows 365 Apps and LOB MSI -apps not showing $Detail = 'Possible Microsoft 365 Apps and Intune LOB MSI Apps are not shown in this report' $DetailToolTip = "Microsoft 365 Apps and `"legacy`" Line-of-business apps (MSI) are installed by Windows MDM channel`nand not installed by Intune Management Extension agent.`n`nCurrent report version does not track those installation.`n`nFuture version might track mentioned app types in Windows Autopilot Enrollment Status Page (ESP) phase.`n`nThis could be a good idea so you would see all Windows Autopilot enrollment process app installations in one report." RecordStatusToTimeline -date "1900-01-01 23:59:59.0000000" -status 'Info' -detail $Detail -DetailToolTip $DetailToolTip -logEntry "0" $i = 0 While ($i -lt $LogEntryList.Count) { # Clear variables in every loop round $LoggedOnUser=$false #Write-Host "`$i=$i" #Write-Host "$($LogEntryList[$i].Message)" # region Find Username and UserSID if($LogEntryList[$i].Message -Like '`[Win32App`] Expected usersid for session *') { $Matches=$null if($LogEntryList[$i].Message -Match '^\[Win32App\] Expected usersid for session (.*) with name (.*) is (.*)$') { $UserSession = $Matches[1] $UserName = $Matches[2] $UserSID = $Matches[3] #Write-Host "DEBUG: $($LogEntryList[$i].Message)" # Check if we have UserSID object in Hashtable UserId object if($IdHashtable.ContainsKey($UserSId)) { $IdHashtable[$UserSId].userSID = $UserSID $IdHashtable[$UserSId].name = $UserName $IdHashtable[$UserSId].displayName = $UserName $IdHashtable[$UserSId].session = $UserSession $userId = $IdHashtable[$UserSId].userId if($userId) { # Check if we have UserID object in Hashtable if($IdHashtable.ContainsKey($UserId)) { # Add Name-value. We don't even check existing value # because we are already here. $IdHashtable[$UserId].userSID = $UserSID $IdHashtable[$UserId].name = $UserName $IdHashtable[$UserId].displayName = $UserName $IdHashtable[$UserId].session = $UserSession } } } else { # UserSID object does not exist in Hashtable # Create object which we will add to Hashtable $UserSIDCustomObjectProperties = @{ id = $null userId = $null userSID = $UserSID name = $UserName displayName = $UserName session = $UserSession } $UserSIDCustomObject = New-Object -TypeName PSObject -Prop $UserSIDCustomObjectProperties # Create new UserId hashtable entry $IdHashtable.Add($UserSId , $UserSIDCustomObject) } #Write-Host "DEBUG: We should have name Property now`n$($IdHashtable | ConvertTo-Json)" } # Cleanup variables $UserSession = $null $UserName = $null $UserSID= $null $UserSIDCustomObject = $null } # endregion Find UserName and UserSID <# # This code works, but there was log entries with mismatched UserID and UserSID (from different users) # so took another approach to map UserID, UserSID and UserName # region Find UserId and UserSID if($LogEntryList[$i].Message -Like '`[Win32App`] EspPreparation starts for userId: *') { $Matches=$null if($LogEntryList[$i].Message -Match '^\[Win32App\] EspPreparation starts for userId: (.*) userSID: (.*)$') { $UserId = $Matches[1] $UserSID = $Matches[2] Write-Host "DEBUG: $($LogEntryList[$i].Message)" # Add information to $IdHashtable UserId key if($IdHashtable.ContainsKey($UserId)) { # Add UserID and UserSID -values. We don't even check existing value # because we are already here. $IdHashtable[$UserId].Id = $UserId $IdHashtable[$UserId].userId = $UserId $IdHashtable[$UserId].userSID = $UserSID } else { # Hashtable does NOT have UserId object if($IdHashtable.ContainsKey($UserSId)) { $UserName = $IdHashtable[$UserSId].name $Session = $IdHashtable[$UserSId].session } else { $UserName = $UserId $Session = $null } # Create object which we will add to Hashtable $UserIdCustomObjectProperties = @{ id = $UserId userId = $UserId userSID = $UserSID name = $UserName session = $Session } $UserIdCustomObject = New-Object -TypeName PSObject -Prop $UserIdCustomObjectProperties # Create new UserId hashtable entry $IdHashtable.Add($UserId , $UserIdCustomObject) } # Add information to $IdHashtable UserSID key if($IdHashtable.ContainsKey($UserSID)) { if($IdHashtable.ContainsKey($UserId)) { $UserName = $IdHashtable[$UserId].name $Session = $IdHashtable[$UserId].session } else { $UserName = $UserId $Session = $null } # Add UserId-value. We don't even check existing value # because we are already here. $IdHashtable[$UserSId].id = $UserId $IdHashtable[$UserSId].userId = $UserId $IdHashtable[$UserSId].userSId = $UserSId $IdHashtable[$UserSId].name = $UserName $IdHashtable[$UserSId].session = $Session } else { # UserSID object does not exist in Hashtable # Create object which we will add to Hashtable $UserSIDCustomObjectProperties = @{ id = $UserId userId = $UserId userSID = $UserSID name = $UserName session = $Session } $UserSIDCustomObject = New-Object -TypeName PSObject -Prop $UserSIDCustomObjectProperties # Create new UserId hashtable entry $IdHashtable.Add($UserSId , $UserSIDCustomObject) } } #Write-Host "DEBUG: We should have UserID and UserSID`n$($IdHashtable | ConvertTo-Json)" # Cleanup variables $UserIdCustomObject = $null $UserSIDCustomObject = $null $UserId = $null $UserSID = $null } # endregion Find UserId and UserSID #> # region EMS Agent Started/Stopped/received shutdown signal # Excluded -or ($LogEntryList[$i].Message -eq 'EMS Agent received shutdown signal') if(($LogEntryList[$i].Message -eq 'EMS Agent Started') -or ($LogEntryList[$i].Message -eq 'EMS Agent Stopped')) { $LogEntryList[$i].ProcessRunTime = "$($LogEntryList[$i].Message)" RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status 'Info' -detail $LogEntryList[$i].Message -logEntry "Line $($LogEntryList[$i].Line)" # Continue to next line in Do-while -loop $i++ Continue } # endregion EMS Agent Started/Stopped/received shutdown signal # region Find ESP SkipESPStatusPage(s) if($skipDeviceStatusPage -eq 'NotFoundYet') { $Matches=$null if($LogEntryList[$i].Message -Match '^\[Win32App\] CheckDeviceOnlyFromFirstSyncReg set skipDeviceStatusPage: (.*)$') { $skipDeviceStatusPage = $Matches[1] $LogEntryList[$i].ProcessRunTime = "Skip Device ESP: $skipDeviceStatusPage" $skipDeviceStatusPageIndex=$i # Continue to next line in Do-while -loop $i++ Continue } } # region Find ESP SkipESPStatusPage(s) if($skipUserStatusPage -eq 'NotFoundYet') { $Matches=$null if($LogEntryList[$i].Message -Match '^\[Win32App\] CheckDeviceOnlyFromFirstSyncReg set skipUserStatusPage: (.*)$') { $skipUserStatusPage = $Matches[1] $LogEntryList[$i].ProcessRunTime = "Skip User ESP : $skipUserStatusPage" $skipUserStatusPageIndex=$i # Continue to next line in Do-while -loop $i++ Continue } } # endregion Find ESP SkipESPStatusPage(s) # region Find ESP (Enrollment Status Page) phases if(-not $DetectedInEspPhase) { if($LogEntryList[$i].Message -eq '[Win32App] In EspPhase: DeviceSetup') { $DetectedInEspPhase = $True # This is here because these lines exists later after ESP # So only showing this information if we are in ESP if($skipDeviceStatusPage -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$skipDeviceStatusPageIndex].DateTime -status "Info" -detail "Skip Device ESP: $skipDeviceStatusPage" -logEntry "Line $($LogEntryList[$skipDeviceStatusPageIndex].Line)" -color 'Yellow' } else { RecordStatusToTimeline -date $LogEntryList[$skipDeviceStatusPageIndex].DateTime -status "Info" -detail "Skip Device ESP: $skipDeviceStatusPage" -logEntry "Line $($LogEntryList[$skipDeviceStatusPageIndex].Line)" } # This is here because these lines exists later after ESP # So only showing this information if we are in ESP if($skipUserStatusPage -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$skipUserStatusPageIndex].DateTime -status "Info" -detail "Skip User ESP: $skipUserStatusPage" -logEntry "Line $($LogEntryList[$skipUserStatusPageIndex].Line)" -color 'Yellow' } else { RecordStatusToTimeline -date $LogEntryList[$skipUserStatusPageIndex].DateTime -status "Info" -detail "Skip User ESP: $skipUserStatusPage" -logEntry "Line $($LogEntryList[$skipUserStatusPageIndex].Line)" } $LogEntryList[$i].ProcessRunTime = "[Win32App] In Device ESP phase detected" RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -detail "######################## Device ESP phase ########################" -logEntry "Line $($LogEntryList[$i].Line)" # Continue to next line in Do-while -loop $i++ Continue } } # endregion Find ESP (Enrollment Status Page) phases # region User ESP finished if(-not $UserESPFinished) { if($LogEntryList[$i].Message -like '`[Win32App`] In EspPhase: AccountSetup. All Win32App has been added. Set SidecarReady: True*') { $UserESPFinished = $True $LogEntryList[$i].ProcessRunTime = "User ESP finished successfully" RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -detail "######################## User ESP finished ########################" -logEntry "Line $($LogEntryList[$i].Line)" # Continue to next line in Do-while -loop $i++ Continue } } # endregion User ESP finished # region NotInEsp in session if(-not $NotInEspInSessionFound) { if($LogEntryList[$i].Message -eq '[Win32App] The EspPhase: NotInEsp in session') { $NotInEspInSessionFound = $True $LogEntryList[$i].ProcessRunTime = "[Win32App] The EspPhase: NotInEsp in session" RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -detail "######################## Not in ESP detected ########################" -logEntry "Line $($LogEntryList[$i].Line)" # Continue to next line in Do-while -loop $i++ Continue } } # endregion NotInEsp in session # region NotInESP found but did not find User ESP Finished # Show warning on this case. Did User ESP fail ??? if((-not $UserESPFinishedNotFoundWarningMessageShown) -and ($DetectedInEspPhase) -and ((-not $UserESPFinished) -and ($NotInEspInSessionFound))) { $UserESPFinishedNotFoundWarningMessageShown=$True RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Warning" -detail "Did not detect User ESP finished. This is usually falsepositive warning." -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Yellow' } # endregion NotInESP found but did not find User ESP Finished # region Find Logged on user if($LogEntryList[$i].Message -Like 'After impersonation: *') { $Matches=$null if($LogEntryList[$i].Message -Match '^After impersonation: (.*)$') { $LoggedOnUser = $Matches[1] #Write-Host "DEBUG: `$FirstLoggedOnUser`=$FirstLoggedOnUser" # Skip if defaultuser0 found (we are in device ESP phase still) if(-not $LoggedOnUserDefaultUser0Shown) { if($LoggedOnUser -like '*\defaultuser0') { $LoggedOnUserDefaultUser0Shown = $True RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -type "User" -Intent "Logon" -detail "$LoggedOnUser" -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Yellow' # Set LoggedOnUser information to ProcessRuntime property $LogEntryList[$i].ProcessRunTime = "Logged on user: $LoggedOnUser" # Extract computer name $ComputerNameForReport = $LoggedOnUser.Split('\')[0] $i++ Continue } } elseif (($LoggedOnUser -notlike '*\defaultuser0') -and ($LoggedOnUser -ne $PreviousLoggedOnUser)) { $PreviousLoggedOnUser=$LoggedOnUser RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -type "User" -Intent "Logon" -detail "$LoggedOnUser" -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Yellow' $LogEntryList[$i].ProcessRunTime = "Logged on user: $LoggedOnUser" } # Not sure if we want to run this everytime or not # Now running it every time we find this log entry if($True) { # Try to find user session from previous log entry if($LogEntryList[$i-1].Message -Match '^Starting impersonation, session id = (.*)$') { $ImpersonationSessionId = $Matches[1] #Write-Host "Found ImpersonationSessionId $ImpersonationSessionId" # Try to find UserId from either of following lines # [PowerShell] Processing user session 3, user id = cdc3177c-df70-45e3-a469-4ef1be2b8345 # [PowerShell] Get 3 policies for user cdc3177c-df70-45e3-a469-4ef1be2b8345 in session 3 $b = $i + 1 While(($LogEntryList[$b].Message -notlike 'After impersonation: *') -and ($b -lt $LogEntryList.Count)) { #Write-Host "DEBUG: Processing line: $($LogEntryList[$b].Message)" if(($LogEntryList[$i].Thread -eq $LogEntryList[$b].Thread) -and (($LogEntryList[$b].Message -Match '^\[PowerShell\] Processing user session (.*), user id = (.*)$') -or ($LogEntryList[$b].Message -Match '^\[PowerShell\] Get (.*) policies for user (.*) in session (.*)$') -or ($LogEntryList[$b].Message -Match '^\[Win32App\] Got (.*) Win32App(s) for user (.*) in session (.*)$'))) { #Write-Host "DEBUG: Found matching line: $($LogEntryList[$b].Message)" # Save to temporary variables because next -Match will overwrite existing $Matches -variable $Matches1 = $Matches[1] $Matches2 = $Matches[2] # Either one is GUID so we need to test which $Matches variable is valid GUID and which is sessionId if($Matches1 -Match '[[0-9a-fA-F]{8}-([0-9a-fA-F]{4}-){3}[0-9a-fA-F]{12}') { $UserId = $Matches1 $UserSession = $Matches2 } elseif ($Matches2 -Match '[[0-9a-fA-F]{8}-([0-9a-fA-F]{4}-){3}[0-9a-fA-F]{12}') { $UserSession = $Matches1 $UserId = $Matches2 } else { # Something strange happened and we did not get GUID # We should not be here $UserSession = $null $UserId = $null } #Write-Host "`$UserId=$UserId" #Write-Host "`$UserSession=$UserSession" #Write-Host "`$ImpersonationSessionId=$ImpersonationSessionId" if($ImpersonationSessionId -eq $UserSession) { # We are quite sure we have right id for UserName # UserSID object does not exist in Hashtable # Create object which we will add to Hashtable if($IdHashtable.ContainsKey($UserId)) { $IdHashtable[$UserId].id = $UserId $IdHashtable[$UserId].userId = $UserId $IdHashtable[$UserId].name = $LoggedOnUser $IdHashtable[$UserId].displayName = $LoggedOnUser $IdHashtable[$UserId].session = $UserSession } else { $UserIdCustomObjectProperties = @{ id = $UserId userId = $UserId userSID = $null name = $LoggedOnUser displayName = $LoggedOnUser session = $UserSession } $UserIdCustomObject = New-Object -TypeName PSObject -Prop $UserIdCustomObjectProperties # Create new UserId hashtable entry $IdHashtable.Add($UserId , $UserIdCustomObject) } #Write-Host "DEBUG: We should have UserID and Username`n$($IdHashtable | ConvertTo-Json)" } # Break out from While-loop Break } $b++ } } } # Continue to next line in Do-while -loop $i++ Continue } } # endregion Find Logged on user # region Find Powershell Script Start log entry if($LogEntryList[$i].Message -like '`[PowerShell`] Processing policy with id = *') { if($LogEntryList[$i].Message -Match '^\[PowerShell\] Processing policy with id = (.*) for user (.*)$') { $PowershellScriptPolicyIdStart = $Matches[1] $PowershellScriptForUserIdStart = $Matches[2] $PowershellScriptStartLogEntryIndex=$i # This variables is probably not needed because # we can detect end and start log entries separately $PowershellScriptStartLogEntryFound=$True if($PowershellScriptForUserIdStart -eq '00000000-0000-0000-0000-000000000000') { $PowershellScriptForUserNameStart = 'System' } else { # Get real name if found from Hashtable if($IdHashtable.ContainsKey($PowershellScriptForUserIdStart)) { $Name = $IdHashtable[$PowershellScriptForUserIdStart].name if($Name) { $PowershellScriptForUserNameStart = $IdHashtable[$PowershellScriptForUserIdStart].name } else { $PowershellScriptForUserNameStart = $PowershellScriptForUserIdStart } } else { $PowershellScriptForUserNameStart = $PowershellScriptForUserIdStart } } # Get Powershell script name if parameter -Online was specified if($IdHashtable.ContainsKey($PowershellScriptPolicyIdStart)) { $PowershellScriptPolicyNameStart = $IdHashtable[$PowershellScriptPolicyIdStart].name } else { $PowershellScriptPolicyNameStart = $PowershellScriptPolicyIdStart } if($ShowAllTimelineEvents) { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Start" -Type "Powershell script" -Intent "Execute" -detail "`t$PowershellScriptPolicyNameStart for user $PowershellScriptForUserNameStart" -logEntry "Line $($LogEntryList[$i].Line)" } # Set Powershell Script Start information to ProcessRuntime property $LogEntryList[$i].ProcessRunTime = "Start Powershell script ($PowershellScriptPolicyNameStart) for user $PowershellScriptForUserNameStart" # Continue to next line in Do-while -loop $i++ Continue } } # endregion Find Powershell Script Start log entry # region Find Powershell Script End log entry if($LogEntryList[$i].Message -like '`[PowerShell`] User Id = *') { if($LogEntryList[$i].Message -Match '^\[PowerShell\] User Id = (.*), Policy id = (.*), policy result = (.*)$') { $PowershellScriptForUserIdEndProcess = $Matches[1] $PowershellScriptPolicyIdEndProcess = $Matches[2] $PowershellScriptPolicyResultEndProcess = $Matches[3] # This variables is probably not needed because # we can detect end and start log entries separately $PowershellScriptEndLogEntryFound=$True if($PowershellScriptForUserIdEndProcess -eq '00000000-0000-0000-0000-000000000000') { $PowershellScriptForUserNameEndProcess = 'System' } else { $PowershellScriptForUserNameEndProcess = $PowershellScriptForUserIdEndProcess # Get real name if found from Hashtable if($IdHashtable.ContainsKey($PowershellScriptForUserIdEndProcess)) { $Name = $IdHashtable[$PowershellScriptForUserIdEndProcess].name if($Name) { $PowershellScriptForUserNameEndProcess = $IdHashtable[$PowershellScriptForUserIdEndProcess].name } } } # Get Powershell script name if parameter -Online was specified if($IdHashtable.ContainsKey($PowershellScriptPolicyIdEndProcess)) { $PowershellScriptPolicyNameEnd = $IdHashtable[$PowershellScriptPolicyIdEndProcess].name } else { $PowershellScriptPolicyNameEnd = $PowershellScriptPolicyIdEndProcess } # Get Process runtime if($PowershellScriptStartLogEntryIndex) { $PowershellScriptStartTime = $LogEntryList[$PowershellScriptStartLogEntryIndex].LogEntryDateTime $PowershellScriptEndTime = $LogEntryList[$i].LogEntryDateTime $PowershellScriptRunTime = New-Timespan $PowershellScriptStartTime $PowershellScriptEndTime $PowershellScriptRunTimeTotalSeconds = $PowershellScriptRunTime.TotalSeconds } else { $PowershellScriptRunTimeTotalSeconds = 'N/A' } if($PowershellScriptPolicyResultEndProcess -eq 'Success') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Success" -Type "Powershell script" -Intent "Execute" -detail "$PowershellScriptPolicyNameEnd for user $PowershellScriptForUserNameEndProcess" -Seconds $PowershellScriptRunTimeTotalSeconds -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Green' # Check if Powershell script runtime is longer than configured (default 180 seconds) if($PowershellScriptRunTimeTotalSeconds -gt $LongRunningPowershellNotifyThreshold) { $PowershellScriptRunTimeTotalSecondsRounded = [math]::Round($PowershellScriptRunTimeTotalSeconds, 0) RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Warning" -Type "Powershell script" -Intent "Execute" -detail " Long Powershell script runtime found ($PowershellScriptRunTimeTotalSecondsRounded seconds)" -detailToolTip "Script runtime was $PowershellScriptRunTimeTotalSecondsRounded seconds" -Seconds $PowershellScriptRunTimeTotalSeconds -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Red' } # Set Powershell Script End information to ProcessRuntime property $LogEntryList[$i].ProcessRunTime = "Succeeded Powershell script ($PowershellScriptPolicyNameEnd) for user $PowershellScriptForUserNameEndProcess (Runtime: $PowershellScriptRunTimeTotalSeconds seconds)" } elseif ($PowershellScriptPolicyResultEndProcess -eq 'Failed') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Failed" -Type "Powershell script" -Intent "Execute" -detail "$PowershellScriptPolicyNameEnd for user $PowershellScriptForUserNameEndProcess" -Seconds $PowershellScriptRunTimeTotalSeconds -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Red' # Set Powershell Script End information to ProcessRuntime property $LogEntryList[$i].ProcessRunTime = "Failed Powershell script ($PowershellScriptPolicyNameEnd) for user $PowershellScriptForUserNameEndProcess (Runtime: $PowershellScriptRunTimeTotalSeconds seconds)" # Check if there is error message for failed Powershell script # Check if next log entry exists if($i + 1 -le $LogEntryList.Count - 1) { if($LogEntryList[$i+1].Message -Match '^\[PowerShell\] Fail, the details are (.*)$') { $PowershellFailJsonString = $Matches[1] # Try to convert JsonString Try { $PowershellFailFromJson=$null $PowershellFailFromJson = $PowershellFailJsonString | ConvertFrom-Json if($ExecutionMsg=$PowershellFailFromJson.ExecutionMsg) { if($ExecutionMsg) { # This makes time line harder to read so moved Error message after timeline $PowershellScriptErrorLogs += "$($LogEntryList[$i].DateTime) End Powershell script ($PowershellScriptPolicyNameEnd) for user $PowershellScriptForUserNameEndProcess Success: $PowershellScriptPolicyResultEndProcess (Runtime: $PowershellScriptRunTimeTotalSeconds seconds) ($($LogEntryList[$i].FileName) line $($LogEntryList[$i].Line))" $PowershellScriptErrorLogs += "$($LogEntryList[$i+1].DateTime) Powershell script error message ($($LogEntryList[$i].FileName) line $($LogEntryList[$i+1].Line))" if($ShowErrorsInReport) { # Show Powershell error message lines as new entries # This was not that good idea??? <# # Split Error Message by newline and enter error message line by line $ExecutionMsg.Split("`n") | Foreach-Object { $ErrorMessageLine = $_ #$PowershellScriptErrorLogs += "`t`t`t $ErrorMessageLine" $PowershellScriptErrorLogs += "$ErrorMessageLine" } $ExecutionMsg.Split("`n") | Foreach-Object { $ErrorMessageLine = $_ RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "ErrorLog" -Type "Powershell script" -Intent "Run" -detail "$ErrorMessageLine" -logEntry "$($LogEntryList[$i].FileName) line $($LogEntryList[$i].Line)" -Color 'Red' } #> # Show Powershell error message as one log entry (one string) $ExecutionMsgAsString = $ExecutionMsg #| Out-String RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "ErrorLog" -Type "Powershell script" -Intent "Execute" -detail "$ExecutionMsgAsString" -logEntry "$($LogEntryList[$i].FileName) line $($LogEntryList[$i].Line)" -Color 'Red' } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Failed" -Type "Powershell script" -Intent "Execute" -detail "See Powershell error message. Hover on with mouse to see details." -detailToolTip $ExecutionMsg -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Red' } } } } catch { # Did not find Powershell error message } } } } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Script end" -Type "Powershell script" -Intent "Execute" -detail "Powershell script $PowershellScriptPolicyNameEnd for user $PowershellScriptForUserNameEndProcess ($PowershellScriptRunTimeTotalSeconds seconds)" -logEntry "Line $($LogEntryList[$i].Line)" -Color 'Yellow' } $PowershellScriptStartLogEntryIndex=$null # Continue to next line in Do-while -loop $i++ Continue } } # endregion Find Powershell Script End log entry if($FindAllLongRunningPowershellScripts) { # Remove me from Production # Left here for possible future purposes # This catches most Powershell script processes and we could for example check Process runtime # and alert for long running processes # region Find Powershell processess # Try to find Powershell process End log entry if($LogEntryList[$i].Message -like '*execution is done*') { $ProcessStartTime = $null $ProcessEndTime = $LogEntryList[$i].LogEntryDateTime $Thread = $LogEntryList[$i].Thread Write-Verbose "Found Powershell process Ending message (Line $($LogEntryList[$i].Line) Thread $Thread): $($LogEntryList[$i].Message)" # Try to find Powershell process Start log entry (upwards) $b = $i - 1 for($b = $i - 1; $b -ge 0; $b-- ) { if(($LogEntryList[$b].Message -like '*process id =*') -and ($LogEntryList[$b].Thread -eq $Thread)) { Write-Verbose "Found Powershell process Starting message (Line $($LogEntryList[$b].Line) Thread $($LogEntryList[$b].Thread)): $($LogEntryList[$b].Message)" $ProcessStartTime = $LogEntryList[$b].LogEntryDateTime $ProcessRunTime = New-Timespan $ProcessStartTime $ProcessEndTime $ProcessRunTimeTotalSeconds = $ProcessRunTime.TotalSeconds $ProcessRunTimeText = "{0,-16} {1,8:n1}" -f "End Powershell", $ProcessRunTimeTotalSeconds # Set RunTime to Powershell script Install Start log entry $LogEntryList[$b].ProcessRunTime = "{0,-16} {1,8:n1}" -f "Start Powershell", $ProcessRunTimeTotalSeconds # Set RunTime to Powershell script Install End log entry $LogEntryList[$i].ProcessRunTime = "{0,-16} {1,8:n1}" -f "End Powershell", $ProcessRunTimeTotalSeconds # Show warning for long running Powershell script if($ProcessRunTimeTotalSeconds -ge $LongRunningPowershellNotifyThreshold) { Write-Host "$($LogEntryList[$b].DateTime) Long running ($ProcessRunTimeTotalSeconds seconds) Powershell script ($LogFileName line $($LogEntryList[$b].Line)): $($LogEntryList[$b].Message)" -ForegroundColor Yellow RecordStatusToTimeline -date $LogEntryList[$b].DateTime -status 'Warning' -Type "Powershell script" -Intent 'Execute' -detail "Long running ($ProcessRunTimeTotalSeconds seconds) Powershell script" -detailToolTip "" -Seconds $ProcessRunTimeTotalSeconds -Color 'Red' -logEntry "Line $($LogEntryList[$b].Line)" } # Break out from for-loop Break } } # For-loop end Write-Verbose "" # Cleanup variables $ProcessStartTime = $null $ProcessEndTime = $null $Thread = $null $ProcessRunTimeTotalSeconds = $null $ProcessRunTimeText = $null } # endregion Find Powershell processess # Remove me from Production } ############################################### # region Find Remediation script type - Proactive Remediation or custom Compliance # 20230920 Update. Log entries had changed so this is new approach to find all remediations # Find Remediation Detect and Remediate tasks if($LogEntryList[$i].Message -like '"C:\Program Files (x86)\Microsoft Intune Management Extension\agentexecutor.exe" -remediationScript ""C:\Windows\IMECache\HealthScripts\*\*.ps1""*') { # Proactive Remediation script = policyType 6 # custom Compliance script = policyType 8 #Write-Host "Remediation Detect script found" -ForegroundColor Red $Matches=$null #if($LogEntryList[$i].Message -Match '^\"C:\\Program Files \(x86\)\\Microsoft Intune Management Extension\\agentexecutor.exe\" -remediationScript \"\"C:\\Windows\\IMECache\\HealthScripts\\(.*)_?\\detect.ps1\"\".*$') { if($LogEntryList[$i].Message -Match '^"C:\\Program Files \(x86\)\\Microsoft Intune Management Extension\\agentexecutor.exe" -remediationScript ""C:\\Windows\\IMECache\\HealthScripts\\(.*)_[0-9]+\\(.*)\.ps1"".*$') { $PolicyId = $Matches[1] # detect # remediate $RemediationAction = $Matches[2] if($RemediationAction -eq 'detect') { $intent = 'Detect' } elseif($RemediationAction -eq 'remediate') { $intent = 'Remediate' } else { $intent = 'unknown' } $Thread = $LogEntryList[$i].Thread $RemediationScriptStartedDateTime = $LogEntryList[$i].DateTime $RemediationScriptEndDateTime = $null $RemediationDurationDateTimeObject = $null $ProcessRunTimeTotalSeconds = 'N/A' $RemediationExitCode = $null $RemediationScriptName = $null $RemediationScriptPowershellScript = $null # Try to find displayName if($IdHashtable.ContainsKey($PolicyId)) { if($IdHashtable[$PolicyId].displayName) { $RemediationScriptName = $IdHashtable[$PolicyId].displayName } else { $RemediationScriptName = $PolicyId } } else { $RemediationScriptName = $PolicyId } # Try to find policyType if($IdHashtable.ContainsKey($PolicyId)) { $RemediationScriptPolicyType = $IdHashtable[$PolicyId].policyType } if($RemediationScriptPolicyType -eq 6) { $RemediationScriptPolicyTypeName = 'Remediation' } elseif ($RemediationScriptPolicyType -eq 8) { $RemediationScriptPolicyTypeName = 'Custom Compliance' } else { # We should never get here because we have seen polityType log entry before this log entry # Proactive Remediation script type is unknown #$RemediationScriptPolicyTypeName = 'Remediation script (unknown type)' $RemediationScriptPolicyTypeName = 'Remediation' } $LogEntryList[$i].ProcessRunTime = "Start Remediation $RemediationScriptName $intent script" #Write-Host "Found Remediation or CompliancePolicy policyId $PolicyId" -ForegroundColor Red # Find stdOut, error and end message # Find next Remediations log entries # These are used to detect if some lines where found # If same is found again then something went wrong $PowershellCmdLineFound = $False $AgentExecutorPowershellExitCode = $null $AgentExecutorPowershellExitCodeFound = $False $AgentExecutorPowershellSuccessMessage = $null $AgentExecutorPowershellSuccessMessageFound = $False $scriptOutputStringArray = $null # Now we go down (to end) for($b = $i + 1; $b -lt $LogEntryList.Count; $b++ ) { # Use this to debug Remediations log entries #Write-Host "DEBUG: $b - $($LogEntryList[$b].Message)" # Try to find stdOut, errorOut and other information # before remediation process end log entry # This is somewhat tricky as we need to find information from AgentExecutor log # And in that log threads are always 1 # and sometimes for example remediation script and Win32App detection script run can overlap # so we can NOT rely that information in AgentExecutor is always for our specific process # This is more like best guess and we provide additional information for example in ToolTips if(($LogEntryList[$b].Message -Like "cmd line for running powershell is -NoProfile -executionPolicy bypass -file `"C:\Windows\IMECache\HealthScripts\$($PolicyId)*\*.ps1`"") -and ($LogEntryList[$b].Component -eq 'AgentExecutor')) { #Write-Host "Found Remediation powershell command AgentExecutor. Line: $($LogEntryList[$b].Line)" -ForegroundColor Red $PowershellCmdLineFound = $True # Continue to next For-loop round Continue } # We are looking for these next lines <# Powershell exit code is 1 AgentExecutor lenth of out=24 AgentExecutor lenth of error=2 AgentExecutor <---- error from script = AgentExecutor ----> AgentExecutor Powershell script is failed to execute or Powershell script is successfully executed. <---- write output done. output = We need to remediate AgentExecutor --- AgentExecutor --- , error = AgentExecutor ----> AgentExecutor #> if(($LogEntryList[$b].Message -Match '^Powershell exit code is (.*)$') -and ($LogEntryList[$b].Component -eq 'AgentExecutor') -and ($PowershellCmdLineFound)) { $AgentExecutorPowershellExitCode = $Matches[1] $AgentExecutorPowershellExitCodeFound = $True #Write-Host "Found Remediation powershell command AgentExecutor exit code: $($AgentExecutorPowershellExitCode). Line: $($LogEntryList[$b].Line)" -ForegroundColor Red # Continue to next For-loop round Continue } # Powershell script is failed to execute # Powershell script is successfully executed if(($LogEntryList[$b].Message -Match '^Powershell script is (.*)$') -and ($LogEntryList[$b].Component -eq 'AgentExecutor') -and ($AgentExecutorPowershellExitCodeFound)) { $AgentExecutorPowershellSuccessMessage = $Matches[1] $AgentExecutorPowershellSuccessMessageFound = $True #Write-Host "Found Remediation powershell command AgentExecutor success message: $($AgentExecutorPowershellSuccessMessage). Line: $($LogEntryList[$b].Line)" -ForegroundColor Red # Next multiline log entry should be possible output and error # "goto" next log line $b++ $scriptOutputStringArray = @() if(($LogEntryList[$b].Message -Match '^write output done. (output =.*)$') -and ($LogEntryList[$b].Component -eq 'AgentExecutor') -and ($AgentExecutorPowershellSuccessMessageFound)) { $FirstOutputLine = $Matches[1] $scriptOutputStringArray += $FirstOutputLine $b++ # Loop through next lines until we find multiline log entry ----> end character from Multiline property While(($LogEntryList[$b].Multiline -ne '---->') -and ($LogEntryList[$b].Component -eq 'AgentExecutor')) { $scriptOutputStringArray += $LogEntryList[$b].Message $b++ } } } # Remediation script script is done # This is our end message we are looking for if(($LogEntryList[$b].Message -Match '^Powershell execution is done, exitCode = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $RemediationExitCode = $Matches[1] $RemediationScriptEndDateTime = $LogEntryList[$b].DateTime # Calculate runtime if($RemediationScriptStartedDateTime -and $RemediationScriptEndDateTime) { $RemediationDurationDateTimeObject = New-Timespan (Get-Date $RemediationScriptStartedDateTime) (Get-Date $RemediationScriptEndDateTime) $ProcessRunTimeTotalSeconds = $RemediationDurationDateTimeObject.TotalSeconds $ProcessRunTimeTotalSeconds = [math]::Round($ProcessRunTimeTotalSeconds,0) } #Write-Host "DEBUG: Found Remediation end with exitCode $RemediationExitCode" $detail = "$RemediationScriptName" if($scriptOutputStringArray) { $detailToolTip = $scriptOutputStringArray | Out-String } else { $detailToolTip = "Runtime information not available" } if($RemediationExitCode -eq 0) { # Remediation Detect Successful RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Success" -Type "$RemediationScriptPolicyTypeName" -Intent $intent -detail $detail -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$b].ProcessRunTime = "Remediation Detected with exitCode 0 $($RemediationDurationDateTimeObject.Seconds) seconds" } else { # Remediation Detect was NOT successful if($RemediationScriptPolicyTypeName -eq 'remediate') { $status = 'Failed' $color = 'Red' } else { # Thist should be Detection with Not Detected status $status = 'Not Detected' $color = 'Yellow' } RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status $status -Type "$RemediationScriptPolicyTypeName" -Intent $intent -detail $detail -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color $color -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$b].ProcessRunTime = "Remediation Not Detected with exitCode $RemediationExitCode $($RemediationDurationDateTimeObject.Seconds) seconds" } # Break for loop Break } # We didn't catch Remediation task end log entry previously # because this will catch next remediation script start # # We should never get here if($LogEntryList[$b].Message -like '"C:\Program Files (x86)\Microsoft Intune Management Extension\agentexecutor.exe" -remediationScript ""C:\Windows\IMECache\HealthScripts\*\*.ps1""*') { $status = 'Start' $detail = "$RemediationScriptName" $detailToolTip = $null # Print Remediation started but not ended RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status $status -Type "$RemediationScriptPolicyTypeName" -Intent $intent -detail $detail -detailToolTip $detailToolTip -Seconds 0 -Color 'Red' -logEntry "Line $($LogEntryList[$i].Line)" $status = 'Warning' $detail = "`tRemediation started but we did not detect process end" RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status $status -Type "$RemediationScriptPolicyTypeName" -Intent $intent -detail $detail -detailToolTip $detailToolTip -Seconds 0 -Color 'Red' -logEntry "Line $($LogEntryList[$i].Line)" # Break for loop Break } } # For-loop end } # Continue to next log entry in main While-loop $i++ Continue } <# # endregion Find Remediation script type - Proactive Remediation or custom Compliance ############################################### # region Find Proactive Remediation Detect script type - Proactive Remediation or custom Compliance # # Note! These log entries have moved to HealthScripts.log so commented out for now # if($LogEntryList[$i].Message -like '`[HS`] ProcessScript PolicyId:*') { # Proactive Remediation script = policyType 6 # custom Compliance script = policyType 8 #Write-Host "Proactive Remediation Detect script type found" -ForegroundColor Yellow $Matches=$null if($LogEntryList[$i].Message -Match '^\[HS\] ProcessScript PolicyId: (.*) PolicyType: (.*)$') { $PolicyId = $Matches[1] $PolicyType = $Matches[2] # Check if PolicyId is in Hashtable if($IdHashtable.ContainsKey($PolicyId)) { # This can exist if -Online parameter was used if($IdHashtable[$PolicyId] | Get-Member policyType){ # policyType Property exists in Hashtable object $IdHashtable[$PolicyId].policyType = $PolicyType } else { # policyType Property does NOT exist in Hashtable object # Add new Property $IdHashtable[$PolicyId] | Add-Member -MemberType noteProperty -Name policyType -Value $PolicyType } } else { # Add new Hashtable id entry $PolicyObjectProperties = @{ id = $PolicyId policyType = $PolicyType } $PolicyCustomObject = New-Object -TypeName PSObject -Prop $PolicyObjectProperties # Create new UserId hashtable entry $IdHashtable.Add($PolicyId , $PolicyCustomObject) } } } # endregion Find Proactive Remediation Detect script type - Proactive Remediation or custom Compliance # region Try to find Proactive Detection script run if($LogEntryList[$i].Message -like '`[HS`] the pre-rem*diation detection script compliance result for*') { #Write-Host "Proactive Remediation or custom Compliance Script Detect found" -ForegroundColor Yellow $Matches=$null if($LogEntryList[$i].Message -Match '^\[HS\] the pre-remdiation detection script compliance result for (.*) is (.*)$') { $PolicyIdEnd = $Matches[1] $PreRemediationDetectResult = $Matches[2] # Use this PolicyId on next phase -> Remediate # Because there we don't have 2 log entries with PolicyId $ProactiveRemediationPolicyId = $PolicyIdStart $ProcessStartTime = $null $DetectionLogEntryEndTime = $LogEntryList[$i].LogEntryDateTime $Thread = $LogEntryList[$i].Thread # Try to find displayName if($IdHashtable.ContainsKey($PolicyIdEnd)) { if($IdHashtable[$PolicyIdEnd].displayName) { $ProactiveRemediationScriptName = $IdHashtable[$PolicyIdEnd].displayName } else { $ProactiveRemediationScriptName = $PolicyIdEnd } } # Try to find policyType if($IdHashtable.ContainsKey($PolicyIdEnd)) { $ProactiveRemediationScriptPolicyType = $IdHashtable[$PolicyIdEnd].policyType } if($ProactiveRemediationScriptPolicyType -eq 6) { $ProactiveRemediationScriptPolicyTypeName = 'Remediation' } elseif ($ProactiveRemediationScriptPolicyType -eq 8) { $ProactiveRemediationScriptPolicyTypeName = 'Custom Compliance' } else { # We should never get here because we have seen polityType log entry before this log entry # Proactive Remediation script type is unknown $ProactiveRemediationScriptPolicyTypeName = 'Remediation script (unknown type)' } # Check if next log entry is either # [HS] remediation is not optional, kick off remediation script # [HS] no remediation script, skip remediation script if(($i+1 -lt $LogEntryList.Count) -and (($LogEntryList[$i+1].Message -like '`[HS`] remediation is not optional, kick off remediation script') -or ($LogEntryList[$i+1].Message -like '`[HS`] no remediation script, skip remediation script'))) { $RemediationDetectPostActionMessageIndex = $i + 1 } else { $RemediationDetectPostActionMessageIndex = $null } Write-Verbose "Found $ProactiveRemediationScriptPolicyTypeName ($ProactiveRemediationScriptName) Detect Ending message ($($LogEntryList[$i].FileName) Line $($LogEntryList[$i].Line) Thread $Thread): $($LogEntryList[$i].Message)" $ProactiveRemediationDetectStdOutput = $null $ProactiveRemediationDetectStdOutIndex = $null $ProactiveRemediationDetectErrorOutput = $null $ProactiveRemediationDetectErrorOutputIndex = $null $PowershellScriptStartTime = $null $PowershellScriptEndTime = $null $PowershellScriptStartIndex = $null $PowershellScriptEndIndex = $null $ProactiveRemediationDetectProcessId = $null $ProcessRunTimeTotalSeconds = $null $ProactiveRemediationDetectRunAs = 'N/A' # Try to find Proactive Remediation Detect Start log entry (going upwards) $b = $i - 1 for($b = $i - 1; $b -ge 0; $b-- ) { if(($LogEntryList[$b].Message -Match '^\[HS\] std output =(.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationDetectStdOutput = ($Matches[1]).Trim() $ProactiveRemediationDetectStdOutIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] err output =(.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationDetectErrorOutput = ($Matches[1]).Trim() $ProactiveRemediationDetectErrorOutputIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^Powershell execution is done, exitCode = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationDetectExitCode = $Matches[1] # Set RunTime to Powershell script Install End log entry $LogEntryList[$b].ProcessRunTime = "End Proactive Detect Powershell (ExitCode=$ProactiveRemediationDetectExitCode)" $PowershellScriptEndTime = $LogEntryList[$b].LogEntryDateTime $PowershellScriptEndIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^process id = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationDetectProcessId = $Matches[1] # Set RunTime to Powershell script Install End log entry $LogEntryList[$b].ProcessRunTime = "Start Proactive Detect Powershell" $PowershellScriptStartTime = $LogEntryList[$b].LogEntryDateTime # Calculate Powershell script runtime if($PowershellScriptStartTime -and $PowershellScriptEndTime) { $PowershellScriptRuntime = New-Timespan $PowershellScriptStartTime $PowershellScriptEndTime $ProcessRunTimeTotalSeconds = $PowershellScriptRuntime.TotalSeconds } else { $ProcessRunTimeTotalSeconds = 'N/A' } $PowershellScriptStartIndex = $b # This if seems not to work # Left here if it would be fixed at some time if($ProactiveRemediationScriptPolicyType -eq 8) { # Custom Compliance Script # Set RunTime to Powershell script Start log entry $LogEntryList[$b].ProcessRunTime = "{0,-16} {1,8:n1}" -f " Start Custom Compliance Powershell", $ProcessRunTimeTotalSeconds # Add RunTime to Powershell script End log entry $LogEntryList[$PowershellScriptEndIndex].ProcessRunTime = "{0,-16} {1,8:n1}" -f " End Custom Compliance Powershell", $ProcessRunTimeTotalSeconds } else { # Proactive Remediation script # Set RunTime to Powershell script Start log entry $LogEntryList[$b].ProcessRunTime = "{0,-16} {1,8:n1}" -f " Start Proactive Detect Powershell", $ProcessRunTimeTotalSeconds # Add RunTime to Powershell script End log entry $LogEntryList[$PowershellScriptEndIndex].ProcessRunTime = "{0,-16} {1,8:n1}" -f " End Proactive Detect Powershell", $ProcessRunTimeTotalSeconds } # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] The policy needs be run as (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationDetectRunAs = $Matches[1] # Continue to previous log entry Continue } # Custom Compliance policy name is shorter than Proactive Remediations # Add padding so we can align texts # And Yes, I should use -f formatting on these but maybe next time :) if($ProactiveRemediationScriptPolicyType -eq 8) { $Padding = ' ' } else { $Padding = '' } if(($LogEntryList[$b].Message -Match '^\[HS\] Processing policy with id = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $PolicyIdStart = $Matches[1] # $b is startIndex if($PolicyIdStart -eq $PolicyIdEnd) { # We found matching starting log entry $DetectionLogEntryStartTime = $LogEntryList[$b].LogEntryDateTime if($DetectionLogEntryStartTime -and $DetectionLogEntryEndTime) { $ProactiveDetectionRuntime = New-Timespan $DetectionLogEntryStartTime $DetectionLogEntryEndTime $ProcessRunTimeTotalSeconds = $ProactiveDetectionRuntime.TotalSeconds } else { $ProcessRunTimeTotalSeconds = 'N/A' } # Start message to timeline if($ShowAllTimelineEvents) { RecordStatusToTimeline -date $LogEntryList[$b].DateTime -status "Start" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Detect" -detail "`t$ProactiveRemediationScriptName" -Seconds $ProcessRunTimeTotalSeconds -logEntry "Line $($LogEntryList[$b].Line)" } # Set RunTime log entry $LogEntryList[$b].ProcessRunTime = "Start $ProactiveRemediationScriptPolicyTypeName Detect script ($ProactiveRemediationScriptName) (run as $ProactiveRemediationDetectRunAs)" $detailToolTip = $null if($ProactiveRemediationDetectStdOutput) { $detailToolTip = "Remediation Detect stdOutput:`n$ProactiveRemediationDetectStdOutput" } if($ProactiveRemediationDetectErrorOutput) { $detailToolTip = "$detailToolTip`nRemediation Detect errorOutput:`n`n$ProactiveRemediationDetectErrorOutput" } # End message to Timeline if($PreRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Detect" -detail "$ProactiveRemediationScriptName" -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName Detect script ($ProactiveRemediationScriptName) (Runtime: $ProcessRunTimeTotalSeconds sec)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Detect" -detail "$ProactiveRemediationScriptName" -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Yellow' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName Detect script ($ProactiveRemediationScriptName) (Runtime: $ProcessRunTimeTotalSeconds sec)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $ProactiveRemediationDetectStdOutIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationDetectStdOutIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "StdOut" -detail "$ProactiveRemediationDetectStdOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationDetectStdOutIndex].Line)" -Color 'Yellow' $LogEntryList[$ProactiveRemediationDetectStdOutIndex].ProcessRunTime = " Powershell Detect StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $ProactiveRemediationDetectErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationDetectErrorOutputIndex].DateTime -status "Error" -Intent "ErrorLog" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$ProactiveRemediationDetectErrorOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationDetectStdOutIndex].Line)" -Color 'Red' $LogEntryList[$ProactiveRemediationDetectErrorOutputIndex].ProcessRunTime = " Powershell Detect ErrorLog" } # Post-End message to Timeline if exists if($RemediationDetectPostActionMessageIndex) { $RemediationDetectPostActionMessage = $LogEntryList[$RemediationDetectPostActionMessageIndex].Message if($RemediationDetectPostActionMessage -eq '[HS] no remediation script, skip remediation script') { $RemediationDetectPostActionMessage = "`tremediation script does not exist" } if($RemediationDetectPostActionMessage -eq '[HS] remediation is not optional, kick off remediation script') { $RemediationDetectPostActionMessage = "`tkick off remediation script" } RecordStatusToTimeline -date $LogEntryList[$RemediationDetectPostActionMessageIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$RemediationDetectPostActionMessage" -logEntry "Line $($LogEntryList[$RemediationDetectPostActionMessageIndex].Line)" -Color 'Yellow' } } else { # We missed Proactive Remediation Detect start log entry # We should never get here if($PreRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Detect" -detail "$ProactiveRemediationScriptName" -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName Detect script ($ProactiveRemediationScriptName)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Detect" -detail "$ProactiveRemediationScriptName" -Color 'Yellow' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName Detect script ($ProactiveRemediationScriptName)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $ProactiveRemediationDetectStdOutIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationDetectStdOutIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "StdOut" -detail "$ProactiveRemediationDetectStdOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationDetectStdOutIndex].Line)" -Color 'Yellow' $LogEntryList[$ProactiveRemediationDetectStdOutIndex].ProcessRunTime = " Powershell Detect StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $ProactiveRemediationDetectErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationDetectErrorOutputIndex].DateTime -status "Error" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "ErrorLog" -detail "$ProactiveRemediationDetectErrorOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationDetectStdOutIndex].Line)" -Color 'Red' $LogEntryList[$ProactiveRemediationDetectErrorOutputIndex].ProcessRunTime = " Powershell Detect ErrorLog" } # Post-End message to Timeline if exists if($RemediationDetectPostActionMessageIndex) { RecordStatusToTimeline -date $LogEntryList[$RemediationDetectPostActionMessageIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail " $($LogEntryList[$RemediationDetectPostActionMessageIndex].Message)" -logEntry "Line $($LogEntryList[$RemediationDetectPostActionMessageIndex].Line)" -Color 'Yellow' } Break } # We are done # Break out from For-loop Break } if($LogEntryList[$b - 1].Message -like '`[HS`] the pre-remdiation detection script compliance result for*') { # We missed Proactive Remediation Detect start log entry #Write-Host "Missed Proactive Remedation Detect script start log entry" -ForegroundColor Red if($PreRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Detect" -detail "$ProactiveRemediationScriptName" -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName Detection script ($ProactiveRemediationScriptName)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$ProactiveRemediationScriptName" -Color 'Yellow' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName Detection script ($ProactiveRemediationScriptName)" } Break } } } # For-loop end Write-Verbose "" } # endregion Try to find Proactive Detection script run # region Try to find Proactive Remediate script run if($LogEntryList[$i].Message -like '`[HS`] remediation script exit code is*') { #Write-Host "DEBUG: Proactive Remediation Remediate Script found" -ForegroundColor Yellow $Matches=$null if($LogEntryList[$i].Message -Match '\[HS\] remediation script exit code is (.*)$') { $RemediationScriptExitCode = $Matches[1] #Write-Host "DEBUG: $($LogEntryList[$i].Message)" $ProcessStartTime = $null $RemediationScriptLogEntryEndTime = $LogEntryList[$i].LogEntryDateTime $Thread = $LogEntryList[$i].Thread $RemediationScriptStdOutput = $null $RemediationScriptStdOutputIndex = $null $RemediationScriptErrorOutput = $null $RemediationScriptErrorOutputIndex = $null $PowershellScriptStartTime = $null $PowershellScriptEndTime = $null $PowershellScriptStartIndex = $null $PowershellScriptEndIndex = $null $RemediationPowershellScriptExitCode = $null $RemediationPowershellScriptProcessId = $null $ProcessRunTimeTotalSeconds = $null $RemediationScriptRunAs = 'N/A' # Try to find Proactive Remediation Remediate Start log entry (going upwards) $b = $i - 1 for($b = $i - 1; $b -ge 0; $b-- ) { #Write-Host "DEBUG: $($LogEntryList[$b].Message)" if(($LogEntryList[$b].Message -Match '^\[HS\] std output =(.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $RemediationScriptStdOutput = ($Matches[1]).Trim() $RemediationScriptStdOutputIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] err output =(.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $RemediationScriptErrorOutput = ($Matches[1]).Trim() $RemediationScriptErrorOutputIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^Powershell execution is done, exitCode = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $RemediationPowershellScriptExitCode = $Matches[1] # Set RunTime to Powershell script Install End log entry $LogEntryList[$b].ProcessRunTime = "End Proactive Remediate Powershell (ExitCode=$RemediationPowershellScriptExitCode)" $PowershellScriptEndTime = $LogEntryList[$b].LogEntryDateTime $PowershellScriptEndIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^process id = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $RemediationPowershellScriptProcessId = $Matches[1] $PowershellScriptStartTime = $LogEntryList[$b].LogEntryDateTime # Calculate Powershell script runtime if($PowershellScriptStartTime -and $PowershellScriptEndTime) { $PowershellScriptRuntime = New-Timespan $PowershellScriptStartTime $PowershellScriptEndTime $ProcessRunTimeTotalSeconds = $PowershellScriptRuntime.TotalSeconds } else { $ProcessRunTimeTotalSeconds = 'N/A' } $PowershellScriptStartIndex = $b # Set RunTime to Powershell script Start log entry $LogEntryList[$b].ProcessRunTime = "{0,-16} {1,8:n1}" -f " Start Proactive Remediate Powershell", $ProcessRunTimeTotalSeconds # Add RunTime to Powershell script End log entry $LogEntryList[$PowershellScriptEndIndex].ProcessRunTime = "{0,-16} {1,8:n1}" -f " End Proactive Remediate Powershell", $ProcessRunTimeTotalSeconds # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] The policy needs be run as (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $RemediationScriptRunAs = $Matches[1] # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] Processing policy with id = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $PolicyIdStart = $Matches[1] # $b is startIndex # Try to find displayName if($IdHashtable.ContainsKey($PolicyIdStart)) { if($IdHashtable[$PolicyIdStart].displayName) { $ProactiveRemediationScriptName = $IdHashtable[$PolicyIdStart].displayName } else { $ProactiveRemediationScriptName = $PolicyIdStart } } $RemediationScriptStartTime = $LogEntryList[$b].LogEntryDateTime if($RemediationScriptStartTime -and $RemediationScriptLogEntryEndTime) { $ProactiveRemediateRuntime = New-Timespan $RemediationScriptStartTime $RemediationScriptLogEntryEndTime $ProcessRunTimeTotalSeconds = $ProactiveDetectionRuntime.TotalSeconds } else { $ProcessRunTimeTotalSeconds = 'N/A' } #Write-Host "DEBUG: `$ProcessRunTimeTotalSeconds=$ProcessRunTimeTotalSeconds" $Padding = '' # Start message to Timeline if($ShowAllTimelineEvents) { RecordStatusToTimeline -date $LogEntryList[$b].DateTime -status "Start" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Remediate" -detail "`t$ProactiveRemediationScriptName (run as $RemediationScriptRunAs)" -logEntry "Line $($LogEntryList[$b].Line)" } # Set RunTime log entry $LogEntryList[$b].ProcessRunTime = "Processing $ProactiveRemediationScriptPolicyTypeName Remediate script ($ProactiveRemediationScriptName) (run as $RemediationScriptRunAs)" $detailToolTip = $null if($RemediationScriptStdOutput) { $detailToolTip = "Remediation Script stdOutput:`n$RemediationScriptStdOutput" } if($RemediationScriptErrorOutput) { $detailToolTip = "$detailToolTip`nRemediation Script errorOutput:`n`n$RemediationScriptErrorOutput" } # End message to Timeline if($RemediationScriptExitCode -eq 0) { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Success" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Remediate" -detail "$ProactiveRemediationScriptName" -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Succeeded $ProactiveRemediationScriptPolicyTypeName Detection script ($ProactiveRemediationScriptName) (Runtime: $ProcessRunTimeTotalSeconds sec)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Failed" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "Remediate" -detail "$ProactiveRemediationScriptName" -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Red' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Failed $ProactiveRemediationScriptPolicyTypeName Remediate script ($ProactiveRemediationScriptName) (Runtime: $ProcessRunTimeTotalSeconds sec)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $RemediationScriptStdOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$RemediationScriptStdOutputIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "StdOut" -detail "$RemediationScriptStdOutput" -logEntry "Line $($LogEntryList[$RemediationScriptStdOutputIndex].Line)" -Color 'Yellow' $LogEntryList[$RemediationScriptStdOutputIndex].ProcessRunTime = " Powershell Remediate StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $RemediationScriptErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$RemediationScriptErrorOutputIndex].DateTime -status "Error" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "ErrorLog" -detail "$RemediationScriptErrorOutput" -logEntry "Line $($LogEntryList[$RemediationScriptErrorOutputIndex].Line)" -Color 'Red' $LogEntryList[$RemediationScriptErrorOutput].ProcessRunTime = " Powershell Remediate ErrorLog" } # Break out from For-loop Break } } # For-loop end if($LogEntryList[$b - 1].Message -like '`[HS`] the pre-remdiation detection script compliance result for*') { # We missed Proactive Remediation Detect start log entry #Write-Host "Missed Proactive Remedation Detect script start log entry" -ForegroundColor Red if($PreRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$ProactiveRemediationScriptName" -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName Detection script ($ProactiveRemediationScriptName)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$ProactiveRemediationScriptName" -Color 'Yellow' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName Detection script ($ProactiveRemediationScriptName)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $RemediationScriptStdOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$RemediationScriptStdOutputIndex].DateTime -status "Info" -Intent "StdOut" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$RemediationScriptStdOutput" -logEntry "Line $($LogEntryList[$RemediationScriptStdOutputIndex].Line)" -Color 'Yellow' $LogEntryList[$RemediationScriptStdOutputIndex].ProcessRunTime = " Powershell Remediate StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $RemediationScriptErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$RemediationScriptErrorOutputIndex].DateTime -status "Error" -Intent "ErrorLog" -Type "$ProactiveRemediationScriptPolicyTypeName" -detail "$RemediationScriptErrorOutput" -logEntry "Line $($LogEntryList[$RemediationScriptErrorOutputIndex].Line)" -Color 'Red' $LogEntryList[$RemediationScriptErrorOutput].ProcessRunTime = " Powershell Remediate ErrorLog" } Break } } } # endregion Try to find Proactive Remediate script run # region Try to find Proactive PostDetection script run if($LogEntryList[$i].Message -like '`[HS`] the post detection script result for *') { #Write-Host "Proactive Remediation PostDetect found" -ForegroundColor Yellow $Matches=$null if($LogEntryList[$i].Message -Match '^\[HS\] the post detection script result for (.*) is (.*)$') { $PolicyIdEnd = $Matches[1] $PostRemediationDetectResult = $Matches[2] $ProcessStartTime = $null $DetectionLogEntryEndTime = $LogEntryList[$i].LogEntryDateTime $Thread = $LogEntryList[$i].Thread # Try to find displayName if($IdHashtable.ContainsKey($PolicyIdEnd)) { if($IdHashtable[$PolicyIdEnd].displayName) { $ProactiveRemediationScriptName = $IdHashtable[$PolicyIdEnd].displayName } else { $ProactiveRemediationScriptName = $PolicyIdEnd } } # Try to find policyType if($IdHashtable.ContainsKey($PolicyIdEnd)) { $ProactiveRemediationScriptPolicyType = $IdHashtable[$PolicyIdEnd].policyType } if($ProactiveRemediationScriptPolicyType -eq 6) { $ProactiveRemediationScriptPolicyTypeName = 'Remediation' } elseif ($ProactiveRemediationScriptPolicyType -eq 8) { $ProactiveRemediationScriptPolicyTypeName = 'Custom Compliance' } else { # We should never get here because we have seen polityType log entry before this log entry # Proactive Remediation script type is unknown $ProactiveRemediationScriptPolicyTypeName = 'Remediation script (unknown type)' } Write-Verbose "Found $ProactiveRemediationScriptPolicyTypeName ($ProactiveRemediationScriptName) Detect Ending message ($($LogEntryList[$i].FileName) Line $($LogEntryList[$i].Line) Thread $Thread): $($LogEntryList[$i].Message)" $ProactiveRemediationPostDetectStdOutput = $null $ProactiveRemediationPostDetectStdOutIndex = $null $ProactiveRemediationPostDetectErrorOutput = $null $ProactiveRemediationPostDetectErrorOutputIndex = $null $PowershellScriptStartTime = $null $PowershellScriptEndTime = $null $PowershellScriptStartIndex = $null $PowershellScriptEndIndex = $null $ProactiveRemediationPostDetectProcessId = $null $ProcessRunTimeTotalSeconds = $null $ProactiveRemediationPostDetectRunAs = 'N/A' # Try to find Proactive Remediation Detect Start log entry (going upwards) $b = $i - 1 for($b = $i - 1; $b -ge 0; $b-- ) { if(($LogEntryList[$b].Message -Match '^\[HS\] std output =(.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationPostDetectStdOutput = ($Matches[1]).Trim() $ProactiveRemediationPostDetectStdOutIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] err output =(.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationPostDetectErrorOutput = ($Matches[1]).Trim() $ProactiveRemediationPostDetectErrorOutputIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^Powershell execution is done, exitCode = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationDetectExitCode = $Matches[1] # Set RunTime to Powershell script Install End log entry $LogEntryList[$b].ProcessRunTime = "End Proactive PostDetect Powershell (ExitCode=$ProactiveRemediationDetectExitCode)" $PowershellScriptEndTime = $LogEntryList[$b].LogEntryDateTime $PowershellScriptEndIndex = $b # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^process id = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationPostDetectProcessId = $Matches[1] # Set RunTime to Powershell script Install End log entry $LogEntryList[$b].ProcessRunTime = "Start Proactive PostDetect Powershell" $PowershellScriptStartTime = $LogEntryList[$b].LogEntryDateTime # Calculate Powershell script runtime if($PowershellScriptStartTime -and $PowershellScriptEndTime) { $PowershellScriptRuntime = New-Timespan $PowershellScriptStartTime $PowershellScriptEndTime $ProcessRunTimeTotalSeconds = $PowershellScriptRuntime.TotalSeconds } else { $ProcessRunTimeTotalSeconds = 'N/A' } $PowershellScriptStartIndex = $b # Set RunTime to Powershell script Start log entry $LogEntryList[$b].ProcessRunTime = "{0,-16} {1,8:n1}" -f " Start Proactive PostDetect Powershell", $ProcessRunTimeTotalSeconds # Add RunTime to Powershell script End log entry $LogEntryList[$PowershellScriptEndIndex].ProcessRunTime = "{0,-16} {1,8:n1}" -f " End Proactive PostDetect Powershell", $ProcessRunTimeTotalSeconds # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] The policy needs be run as (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $ProactiveRemediationPostDetectRunAs = $Matches[1] # Continue to previous log entry Continue } if(($LogEntryList[$b].Message -Match '^\[HS\] Processing policy with id = (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $PolicyIdStart = $Matches[1] # $b is startIndex if($PolicyIdStart -eq $PolicyIdEnd) { # We found matching starting log entry $DetectionLogEntryStartTime = $LogEntryList[$b].LogEntryDateTime if($DetectionLogEntryStartTime -and $DetectionLogEntryEndTime) { $ProactiveDetectionRuntime = New-Timespan $DetectionLogEntryStartTime $DetectionLogEntryEndTime $ProcessRunTimeTotalSeconds = $ProactiveDetectionRuntime.TotalSeconds } else { $ProcessRunTimeTotalSeconds = 'N/A' } $Padding = '' # Start message to Timeline if($ShowAllTimelineEvents) { RecordStatusToTimeline -date $LogEntryList[$b].DateTime -status "Start" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "`t$ProactiveRemediationScriptName (run as $ProactiveRemediationPostDetectRunAs)" -logEntry "Line $($LogEntryList[$b].Line)" } # Set RunTime log entry $LogEntryList[$b].ProcessRunTime = "Start $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName) (run as $ProactiveRemediationPostDetectRunAs)" $detailToolTip = $null if($ProactiveRemediationPostDetectStdOutput) { $detailToolTip = "Remediation PostDetect stdOutput:`n$ProactiveRemediationPostDetectStdOutput" } if($ProactiveRemediationDetectErrorOutput) { $detailToolTip = "$detailToolTip`nRemediation PostDetect errorOutput:`n`n$ProactiveRemediationPostDetectErrorOutput" } # End message to Timeline if($PostRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationScriptName" -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName) (Runtime: $ProcessRunTimeTotalSeconds sec)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationScriptName" -detailToolTip $detailToolTip -Seconds $ProcessRunTimeTotalSeconds -Color 'Red' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName) (Runtime: $ProcessRunTimeTotalSeconds sec)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $ProactiveRemediationPostDetectStdOutIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "StdOut" -detail "$ProactiveRemediationPostDetectStdOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].Line)" -Color 'Yellow' $LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].ProcessRunTime = " Powershell PostDetect StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $ProactiveRemediationPostDetectErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationPostDetectErrorOutputIndex].DateTime -status "Error" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "ErrorLog" -detail "$ProactiveRemediationPostDetectErrorOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].Line)" -Color 'Red' $LogEntryList[$ProactiveRemediationPostDetectErrorOutputIndex].ProcessRunTime = " Powershell PostDetect ErrorLog" } } else { # We missed Proactive Remediation Detect start log entry # We should never get here $Padding = '' if($PostRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationScriptName" -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationScriptName" -Color 'Red' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $ProactiveRemediationPostDetectStdOutIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].DateTime -status "Info" -Intent "StdOut" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationPostDetectStdOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].Line)" -Color 'Yellow' $LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].ProcessRunTime = " Powershell PostDetect StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $ProactiveRemediationPostDetectErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationPostDetectErrorOutputIndex].DateTime -status "Error" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "ErrorLog" -detail "$ProactiveRemediationPostDetectErrorOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].Line)" -Color 'Red' $LogEntryList[$ProactiveRemediationPostDetectErrorOutputIndex].ProcessRunTime = " Powershell PostDetect ErrorLog" } Break } # We are done # Break out from For-loop Break } $Padding = '' if($LogEntryList[$b - 1].Message -like '`[HS`] the pre-remdiation detection script compliance result for*') { # We missed Proactive Remediation Detect start log entry #Write-Host "Missed Proactive Remedation Detect script start log entry" -ForegroundColor Red if($PostRemediationDetectResult -eq 'True') { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationScriptName" -Color 'Green' -logEntry "Line $($LogEntryList[$i].Line)" # Set RunTime log entry $LogEntryList[$i].ProcessRunTime = "Compliant $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName)" } else { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Not Compliant" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "PostDetect" -detail "$ProactiveRemediationScriptName" -Color 'Red' -logEntry "Line $($LogEntryList[$i].Line)" $LogEntryList[$i].ProcessRunTime = "Not Compliant $ProactiveRemediationScriptPolicyTypeName PostDetect script ($ProactiveRemediationScriptName)" } # Script StdOut to Timeline if configured and if exists if($ShowStdOutInReport -and $ProactiveRemediationPostDetectStdOutIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].DateTime -status "Info" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "StdOut" -detail "$ProactiveRemediationPostDetectStdOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].Line)" -Color 'Yellow' $LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].ProcessRunTime = " Powershell PostDetect StdOut" } # Script Error to Timeline if configured and if exists if($ShowErrorsInReport -and $ProactiveRemediationPostDetectErrorOutputIndex) { RecordStatusToTimeline -date $LogEntryList[$ProactiveRemediationPostDetectErrorOutputIndex].DateTime -status "Error" -Type "$ProactiveRemediationScriptPolicyTypeName" -Intent "ErrorLog" -detail "$ProactiveRemediationPostDetectErrorOutput" -logEntry "Line $($LogEntryList[$ProactiveRemediationPostDetectStdOutIndex].Line)" -Color 'Red' $LogEntryList[$ProactiveRemediationPostDetectErrorOutputIndex].ProcessRunTime = " Powershell PostDetect ErrorLog" } Break } } } # For-loop end } # endregion Try to find Proactive PostDetection script run #> ############################################### # Applications # Win32App # WinGetApp # Check for application policies if($LogEntryList[$i].Message -like 'Get policies = *') { if($LogEntryList[$i].Message -Match '^Get policies = \[(.*)\]$') { $IntuneAppPolicies = "[$($Matches[1])]" | ConvertFrom-Json # Add policies to hash. Remove existing hash object if exist already Foreach($AppPolicy in $IntuneAppPolicies) { # Check if App exists in Hashtable if($IdHashtable.ContainsKey($AppPolicy.Id)) { # Remove existing object $IdHashtable.Remove($AppPolicy.Id) } # Add object to Hashtable $IdHashtable.Add($AppPolicy.Id , $AppPolicy) ##################################### # Save App Assignments with filters applied # We will show this in own table in report # # "AppApplicabilityStateDueToAssginmentFilters": null # no filters # # "AppApplicabilityStateDueToAssginmentFilters": 0 # filters are applied but not preventing app installation # # "AppApplicabilityStateDueToAssginmentFilters": 1010 # filters are applied and preventing app installation # # "AppApplicabilityStateDueToAssginmentFilters": 1010, # "AssignmentFilterIds": [ # "149021e6-c4cf-4f1b-ba76-b98d792a4a4a" # ], if($AppPolicy.AssignmentFilterIds) { if(-not ($ApplicationAssignmentFilterApplied | Where-Object AppId -eq $AppPolicy.Id)) { # App was not in list before if($AppPolicy.InstallerData) { # This should be New Store App $AppType = 'WinGetApp' } else { # This should be Win32App $AppType = 'Win32App' } if($AppPolicy.AppApplicabilityStateDueToAssginmentFilters -eq 1010) { # This should be notApplicable $Applicable = 'Not Applicable' } else { # This should be Applicable $Applicable = 'Applicable' } # Get AssignmentFilterNames $AssignmentFilterNames = $null Foreach($FilterId in $AppPolicy.AssignmentFilterIds) { if($IdHashtable.ContainsKey($FilterId)) { $FilterName = $IdHashtable[$FilterId].displayName } else { $FilterName = "$FilterId" } if($AssignmentFilterNames) { # There was existing FilterName so we have multiple Filters applied $AssignmentFilterNames = "$AssignmentFilterNames, $FilterName" } else { # There was no previous FilterName $AssignmentFilterNames = "$FilterName" } } # Add Assignment Filter information to list $ApplicationAssignmentFilterApplied.add([PSCustomObject]@{ 'AppType' = $AppType 'Applicable' = $Applicable 'AppName' = $AppPolicy.Name 'AssignmentFilterNames' = $AssignmentFilterNames 'AssignmentFilterIds' = $AppPolicy.AssignmentFilterIds 'AppPolicy' = $AppPolicy 'AppId' = $AppPolicy.Id }) } } } } } # Get App Name from AppDownload log entry if($LogEntryList[$i].Message -Like '`[StatusService`] Downloading app (id = (.*), name (.*)\).*$') { if($LogEntryList[$i].Message -Match '^\[StatusService\] Downloading app \(id = (.*), name (.*)\).*') { # Message matches Win32App Name message $Win32AppId = $Matches[1] $Win32AppName = $Matches[2] Write-Verbose "Found Win32App Name $Win32AppName ($Win32AppId)" # Add AppId and name to Hashtable if($IdHashtable.ContainsKey($Win32AppId)) { #$IdHashtable[$Win32AppId].id = $Win32AppId if($IdHashtable[$Win32AppId].name -ne $Win32AppName) { Write-Host "Win32App name mismatch found. We should never get this warning" -ForegroundColor Yellow Write-Host "($($IdHashtable[$Win32AppId].name)) ($Win32AppName) ($Win32AppId)" -ForegroundColor Yellow } #$IdHashtable[$Win32AppId].displayName = $Win32AppName } else { $AppIdCustomObjectProperties = @{ id = $Win32AppId name = $Win32AppName displayName = $Win32AppName intent = $null } $AppIdCustomObject = New-Object -TypeName PSObject -Prop $AppIdCustomObjectProperties # Create new UserId hashtable entry $IdHashtable.Add($Win32AppId, $AppIdCustomObject) } } } # Check for Applications to be installed in ESP phase (Device ESP and User ESP has it's own log entries) if($LogEntryList[$i].Message -like '`[Win32App`]`[ESPAppLockInProcessor`] Found * apps which need to be installed for current phase of ESP. AppIds: *') { if($LogEntryList[$i].Message -Match '^\[Win32App\]\[ESPAppLockInProcessor\] Found (.*) apps which need to be installed for current phase of ESP. AppIds: (.*)$') { $AppCountToInstallInESPPhase = $Matches[1] $AppIdsToInstallInESPPhase = $Matches[2] if($AppIdsToInstallInESPPhase) { RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -Type "Apps" -Intent "Required in ESP" -detail "$AppCountToInstallInESPPhase Apps to install at ESP phase" -logEntry "Line $($LogEntryList[$i].Line)" # Several apps are separated by , $AppIdsToInstallInESPPhaseArray = $AppIdsToInstallInESPPhase.Split(',').Trim() Foreach($AppId in $AppIdsToInstallInESPPhaseArray) { # Get name for App if($IdHashtable.ContainsKey($AppId)) { $AppName = $IdHashtable[$AppId].name $AppType = Get-AppType $AppId #$DetailToolTip = $IdHashtable[$AppId] | ConvertFrom-Json | ConvertTo-Json -Depth 4 $DetailToolTip = $null #$DetailToolTip = $IdHashtable[$AppId] | Select-Object -Property * -ExcludeProperty AppApplicabilityStateDueToAssginmentFilters, ToastState, FlatDepedencies, MetadataVersion, RelationVersion, RebootEx, StartDeadlineEx, RemoveUserData, DOPriority, newFlatDependencies, FlatDependencies, ContentCacheDuration, ReevaluationInterval, SupportState, AssignmentFilterIdToEvalStateMap | Out-String $DetailToolTip = $IdHashtable[$AppId] | Select-Object -Property Name, InstallCommandLine, UninstallCommandLine, id | Format-List -Property * | Out-String # DEBUG App Data #$IdHashtable[$AppId] | ConvertTo-Json -Depth 5 | Set-Clipboard RecordStatusToTimeline -date $LogEntryList[$i].DateTime -status "Info" -Type "$AppType" -Intent "Required in ESP" -detail "`t$AppName" -DetailToolTip $DetailToolTip -logEntry "Line $($LogEntryList[$i].Line)" $DetailToolTip = $null } } } #$LogEntryList[$i].ProcessRunTime = "User ESP finished successfully" # Continue to next line in Do-while -loop $i++ Continue } } # Case where different version of App of detected after Uninstall than expected # Usually in this case either Uninstall failed or there is wrong detection check in older app (eg. version -gt used) if($LogEntryList[$i].Message -like '`[Win32App`]`[ActionProcessor`] Encountered unexpected state for app with id:*') { # Set RunTime message $LogEntryList[$i].ProcessRunTime = "Warning: Encountered unexpected state for app with id" } # region Find Win32App installations # Check if this is ending message for Win32 application installation if(($LogEntryList[$i].Message -like '`[Win32App`] Installation is done, collecting result') -or ($LogEntryList[$i].Message -like '`[Win32App`] Failed to create installer process. Error code = *')) { $FailedToCreateInstallerProcess = $False # We will follow this Thread $Thread = $LogEntryList[$i].Thread if($LogEntryList[$i].Message -Match '^\[Win32App\] Failed to create installer process. Error code = (.*)$') { $ErrorMessage = $Matches[0] $ErrorCode = $Matches[1] $FailedToCreateInstallerProcess = $True $Win32AppInstallStartFailedIndex = $i # Set RunTime to Win32App Install Start Failed log entry $LogEntryList[$Win32AppInstallStartFailedIndex].ProcessRunTime = "$ErrorMessage" #Write-Host "DEBUG: Found Win32 App error: $ErrorMessage" Write-Verbose "Found Win32 App error: $ErrorMessage" # Set index so our search continues in next steps # Because we skip Loop below $b = $i - 1 } else { $Win32AppInstallStartIndex = $null $Win32AppInstallEndIndex = $i $ProcessStartTime = $null $ProcessEndTime = $LogEntryList[$i].LogEntryDateTime Write-Verbose "Found Win32 App install end process message (Line $($LogEntryList[$i].Line) Thread $Thread): $($LogEntryList[$i].Message)" $Win32AppExitCode='N/A' $Win32AppInstallSuccess='N/A' # We don't know App Name or Intent yet $LogEntryList[$Win32AppInstallEndIndex].ProcessRunTime = "End Win32App" # Check if we can find exitCode and Success/failed information in next 20 lines for($b = $Win32AppInstallEndIndex + 1; $b -lt $Win32AppInstallEndIndex + 20; $b++ ) { $Matches=$null # Run this if first because it is much faster than run -Match for every line if($Win32AppExitCode -eq 'N/A') { if(($LogEntryList[$b].Message -Match '^\[Win32App\] lpExitCode (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $Win32AppExitCode = $Matches[1] Write-Verbose "Found Win32App install exitCode: $Win32AppExitCode" # We don't know App Name or Intent yet $LogEntryList[$i].ProcessRunTime = "(ExitCode $Win32AppExitCode" # Continue For-loop to next log entry Continue } } # Run this if-clause first because it is much faster than run -Match for every line if($Win32AppInstallSuccess -eq 'N/A') { if(($LogEntryList[$b].Message -Match '^\[Win32App\] lpExitCode is defined as (.*)$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $Win32AppInstallSuccess = $Matches[1] Write-Verbose "Found Win32App install success: $Win32AppInstallSuccess" # We don't know App Name or Intent yet $LogEntryList[$i].ProcessRunTime = "$($LogEntryList[$i].ProcessRunTime) $Win32AppInstallSuccess)" # Break out from For-loop Break } } } # For-loop end # Check if we can find previous LogEntry that matches same process thread start message $b = $Win32AppInstallEndIndex - 1 While ($b -ge 0) { if(($LogEntryList[$b].Message -like '`[Win32App`] process id =*') -and ($LogEntryList[$b].Thread -eq $Thread)) { $Win32AppInstallStartIndex = $b # Message matches Win32App install start message $ProcessStartTime = $LogEntryList[$b].LogEntryDateTime $ProcessRunTime = New-Timespan $ProcessStartTime $ProcessEndTime $ProcessRunTimeTotalSeconds = $ProcessRunTime.TotalSeconds #$ProcessRunTime = "{0,-16} {1,8:n1}" -f "End Win32App", $ProcessRunTimeTotalSeconds Write-Verbose "Found Win32 App install Start process message (Line $($LogEntryList[$b].Line)): $($LogEntryList[$b].Message)" # FIXME # Set Win32App Name to Win32App Install Start entry #$LogEntryList[$Win32AppInstallStartIndex].ProcessRunTime = "$($LogEntryList[$Win32AppInstallStartIndex].ProcessRunTime) $Win32AppName" # Set RunTime to Win32App Install Start log entry $LogEntryList[$Win32AppInstallStartIndex].ProcessRunTime = "{0,-16} {1,8:n1}" -f "Start Win32App", $ProcessRunTimeTotalSeconds # Set RunTime to Powershell script Install End log entry #$LogEntryList[$i].ProcessRunTime = "{0,-16} {1,8:n1}" -f "End Win32App", $ProcessRunTimeTotalSeconds $LogEntryList[$Win32AppInstallEndIndex].ProcessRunTime = "$($LogEntryList[$i].ProcessRunTime) $($ProcessRunTimeTotalSeconds)sec" Write-Verbose "Runtime: $ProcessRunTimeTotalSeconds" Break } else { # Message does not match Win32App install start message } $b-- } } # Try to find Win32App name if we have start and end time $Win32AppId = $null $Win32AppName = $null $Intent = 'Unknown Intent' $TempAppId = $null $BackupIntent = $null $intentDoubleCheck = $null $AppIntentNumberClosestToProcess = $null $AppSupersededUninstall = $null $AppDeliveryOptimization = $null $DetailToolTip = $null if($ProcessStartTime -or $ProcessEndTime -or $FailedToCreateInstallerProcess) { # Remove this line #$Win32AppInstallStartIndex = $b # We are going upwards now While ($b -ge 0) { #Write-Host "$b $($LogEntryList[$b].Message)" # Find Win32App Id if(-not $Win32AppId) { if(($LogEntryList[$b].Message -Match '^\[Win32App\] SetCurrentDirectory: C:\\Windows\\IMECache\\(.*)_.*$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $Win32AppId = $Matches[1] #Write-Host "DEBUG: Found Win32AppId: $Win32AppId" # Find name from Hashtable if($IdHashtable.ContainsKey($Win32AppId)) { if($IdHashtable[$Win32AppId].name) { $Win32AppName = $IdHashtable[$Win32AppId].name #Write-Host "DEBUG: Found existing Win32AppName: $Win32AppName`n" } $DetailToolTip = $IdHashtable[$Win32AppId] | Select-Object -Property Name, InstallCommandLine, UninstallCommandLine, id | Format-List -Property * | Out-String } $b-- Continue } } # Double check intent # If old application is Superceded then in policy intent is not targeted # But if old app version is detected then uninstall is triggered and intent # Need to be checked from this log entry if(-not $AppIntentNumberClosestToProcess) { if(($LogEntryList[$b].Message -Match '^\[Win32App\] ===Step=== InstallBehavior RegularWin32App, Intent (.*), UninstallCommandLine .*$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $AppIntentNumberClosestToProcess = $Matches[1] #Write-Host "DEBUG: Found InstallBehavior: $AppIntentNumberClosestToProcess" $b-- Continue } } # Get Delivery Optimization information if(-not $AppDeliveryOptimization -and $Win32AppId) { # ? is any character because escape `[ and `] didn't seem to work with doublequotes " ??? if(($LogEntryList[$b].Message -Like "?DO TEL? = {*$($Win32AppId)*}") -and ($LogEntryList[$b].Thread -eq $Thread)) { if(($LogEntryList[$b].Message -Match '^\[DO TEL\] = \{(.*)\}$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $AppDeliveryOptimization = "{$($Matches[1])}" | ConvertFrom-Json # Disabled now because we don't have Win32App Processsing Start and End entries #$LogEntryList[$b].ProcessRunTime = " Download and Delivery Optimization summary" #Write-Host "DEBUG: Found Delivery Optimization information:`n$($AppDeliveryOptimization | ConvertTo-Json)" $b-- Continue } } } <# # Get intent: RequiredInstall, RequiredUninstall, AvailableInstall, AvailableUninstall? # We will catch AvailableInstall here which are apps installed from Intune Company Portal # # We will also catch NotTargeted which is superceded application # If we find NotTargeted then we should try to find actual app install after previous version uninstall if(($LogEntryList[$b].Message -Match '^\[Win32App\]\[ActionProcessor\] App with id: (.*), targeted intent: (.*),.*$') -and ($LogEntryList[$b].Thread -eq $Thread)) { $TempAppId = $Matches[1] if($TempAppId -eq $Win32AppId) { $BackupIntent = $Matches[2] #Write-Host "Found backupIntent: $Win32AppName $BackupIntent ($TempAppId) ($Win32AppId)" } else { #Write-Host "Found backupIntent for wrong id: $Win32AppName $BackupIntent ($TempAppId) ($Win32AppId)" } # End loop Break } #> # Check if we reached start of this round if($LogEntryList[$b].Message -Like '^`[Win32App`]`[V3Processor`] Processing * subgraphs.$') { #Write-Host "We reached start Win32App processing phase" #Write-Verbose "We reached start Win32App processing phase" #Write-Host "$($LogEntryList[$b].Message)" # End loop Break } # Check if we reached start of this round # In some rare cases this does not catch Win32App installs in ESP phase # Look for ExecMaanger below if($LogEntryList[$b].Message -Match '^\[Win32App\]\[V3Processor\] Processing subgraph with app ids: (.*)$') { $TempAppId = $Matches[1] #Write-Host "We reached start Win32App processing phase: $TempAppId" #Write-Verbose "We reached start Win32App processing phase: $TempAppId" #Write-Host "$($LogEntryList[$b].Message)" # End loop Break } # This is start entry for Win32App processing # Only shown in ESP phase for rare cases or not shown at all? if($LogEntryList[$b].Message -Like '`[Win32App`] ExecManager: processing targeted app*') { #Write-Host "We reached start Win32App processing phase" #Write-Verbose "We reached start Win32App processing phase" #Write-Host "$($LogEntryList[$b].Message)" # End loop Break } # This is start entry for Win32App processing during ESP insome cases # We should never get here if($LogEntryList[$b].Message -Like '`[Win32App`]ExeManager: start processing app policies with count = *') { #Write-Host "We reached start Win32App processing phase" #Write-Verbose "We reached start Win32App processing phase" #Write-Host "$($LogEntryList[$b].Message)" # End loop Break } # This is one possible end of subgraph if($LogEntryList[$b].Message -Match '^\[Win32App\]\[V3Processor\] Done processing subgraph.$') { #Write-Host "We reached start Win32App processing phase: $TempAppId" #Write-Verbose "We reached start Win32App processing phase: $TempAppId" #Write-Host "$($LogEntryList[$b].Message)" # End loop Break } # This is one possible end of subgraph if($LogEntryList[$b].Message -Match '^\[Win32App\]\[V3Processor\] All apps in the subgraph are not applicable due to assignment filters. Processing will be skipped.$') { #Write-Host "We reached start Win32App processing phase: $TempAppId" #Write-Verbose "We reached start Win32App processing phase: $TempAppId" #Write-Host "$($LogEntryList[$b].Message)" # End loop Break } $b-- } <# # DEBUG Intents if($FailedToCreateInstallerProcess) { Write-Host "DEBUG: $Win32AppName (Line: $($LogEntryList[$Win32AppInstallStartFailedIndex].Line)) AppIntentNameClosestToProcess : $(Get-AppIntentNameForNumber $AppIntentNumberClosestToProcess)" Write-Host "DEBUG: $Win32AppName (Line: $($LogEntryList[$Win32AppInstallStartFailedIndex].Line)) Last known Intent from App policy: $(Get-AppIntentNameForNumber $IdHashtable[$Win32AppId].Intent)`n" } else { Write-Host "DEBUG: $Win32AppName (Line: $($LogEntryList[$Win32AppInstallEndIndex].Line)) AppIntentNameClosestToProcess : $(Get-AppIntentNameForNumber $AppIntentNumberClosestToProcess)" Write-Host "DEBUG: $Win32AppName (Line: $($LogEntryList[$Win32AppInstallEndIndex].Line)) Last known Intent from App policy: $(Get-AppIntentNameForNumber $IdHashtable[$Win32AppId].Intent)`n" } #> # Set Intent placeholder value which is closest Intent found from process start (going upwards) if($AppIntentNumberClosestToProcess) { $intent = Get-AppIntentNameForNumber $AppIntentNumberClosestToProcess } else { # Set fallback Inten value from App Policy $intent = Get-AppIntent $Win32AppId } # Get App Intent Name from policy $AppIntentNameFromPolicy = Get-AppIntent $Win32AppId # Get App Intent Name from closest Intent found from process start (going upwards) if($AppIntentNumberClosestToProcess) { $AppIntentNameClosestToProcess = Get-AppIntentNameForNumber $AppIntentNumberClosestToProcess } # In case of Available Install we have different values # but we will use value from policy if action is RequiredInstall if(($AppIntentNameFromPolicy -eq 'Available Install') -and ($AppIntentNameClosestToProcess -eq 'Required Install')) { $intent = 'Available Install' } # In case of supercedence in policy we usually have NotTargeted but action is RequiredUninstall # but can have previous value of Available Install if we have installed old App version just previously (maybe not normal case) #if(($AppIntentNameFromPolicy -eq 'Not Targeted') -and ($AppIntentNameClosestToProcess -eq 'Required Uninstall')) { if(($AppIntentNameFromPolicy -ne 'Required Uninstall') -and ($AppIntentNameClosestToProcess -eq 'Required Uninstall')) { $intent = 'Required Uninstall' $AppSupersededUninstall = $True } if($AppDeliveryOptimization) { & |