You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.
Home > 515: Application Manager > Knowledge Base > 06: Troubleshooting > 15: How to use Scripts Manager to workaround the “PPAppLockdr64.dll is either not designed to run on Windows or it contains an error” message when running Microsoft Remote Assistance (MSRA.exe) and the PolicyPak CSE is installed on Windows 10 1903
15: How to use Scripts Manager to workaround the “PPAppLockdr64.dll is either not designed to run on Windows or it contains an error” message when running Microsoft Remote Assistance (MSRA.exe) and the PolicyPak CSE is installed on Windows 10 1903
print icon

 

  1.  

 

  1. Create the Scripts Manager policy in PolicyPak.
  2. Run the Microsoft Group Policy Management Console (GPMC) as a user with the necessary rights (to create and link GPOs at that level) and then create a new GPO and link the GPO at the OU (User Level) or Domain level depending on who needs to receive these settings.

 

For example:

 

    1. Next Edit the newly created GPO and expand the User Configuration > PolicyPak > Scripts Manager section.
    2. Then click “ADD NEW COLLECTION” to add a new collection, give it any descriptive name you like, then click “OK”.

 

    1. Next, double click on the collection you just created to open the collection.
    2. Then right-click anywhere in the right pane and choose “Add > New Policy”, (or alternatively click on the “ADD NEW POLICY” button) to create a new policy item within the collection.

 

    1. The “PolicyPak Scripts Manager Wizard” will then open.
    2. At the “On apply action” screen choose “PowerShell script” from the drop down.
    3. Then paste the commands below into the scripts body window.

Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force

Set-ProcessMitigation -Name msra.exe -Enable DisableExtensionPoints

 

    1. Then check both the “Run script as user” and “With elevated rights” boxes at the bottom left hand of the window and click “Next”.
    1. Click “Next” to skip the “On revert action” screen.
    2. At the “Specify process mode” screen choose “Once or when forced” then click “Save”

 

  1. Lastly, test the policy.
    1. Log in as a domain user within the OU or Domain where the policy is applied and verify under Windows Settings that the custom Exploit Protection settings are present.

 

 

 

More Info: How to configure custom Exploit Protection settings under Windows 10 GUI  to resolve this issue.

 

  1. Use the Windows Search to find "Exploit protection" and open exploit protection settings
  2. Then click "Program settings"
  3. Then click "Add a program to customize", and choose "Add by program name"
  4. Enter "msra.exe" and click "Add"
  5. Scroll down the list of options until you find "Disable extension points"
  6. Check the "Override system settings" and set the slider to "On" as in the image below.
  7. Lastly, click "Apply" to save your changes

  1.  

 

Feedback
0 out of 3 found this helpful

scroll to top icon