Skip to content
March 1, 2026 Mid-Level (3-5 years) How-To

Endpoint Privilege Manager Part 3: Management & Troubleshooting

Monitor EPM activity, generate reports, and fix common issues.

Endpoint Privilege Manager Part 3: Management & Troubleshooting

You’ve enabled EPM and created policies. Now comes the ongoing work: monitoring what’s happening, generating reports for auditors, and fixing issues when things go wrong.

Let’s cover it all.

Monitoring Activity

EPM provides several ways to see what’s happening in your environment.

Activity Logs

The first place to check when something goes wrong—or just to verify operations are working.

Screenshot:

To access:

  1. Go to Microsoft Endpoint Manager
  2. Navigate to DevicesEndpoint Privilege ManagementActivity logs

What you’ll see:

ColumnDescription
UserWho requested elevation
DeviceWhich device
ApplicationWhat was being run
Request timeWhen request was made
StatusApproved, Rejected, Expired
DurationHow long access lasted

Filtering Logs

Use filters to find specific events:

  • Date range – Last 24h, 7 days, 30 days, custom
  • User – Specific user or group
  • Device – Specific device
  • Status – Approved, Rejected, Expired
  • Application – Specific app or script

Example filter for troubleshooting:

Status: Rejected
Date: Last 7 days
User: john.doe@contoso.com

Generating Reports

Usage Summary

Get an overview of EPM usage:

  1. Go to Endpoint Privilege ManagementOverview
  2. View key metrics:
    • Total elevation requests
    • Approval rate (% approved)
    • Most used applications
    • Most active users

Export Reports

For deeper analysis or audit purposes:

  1. ReportsExport
  2. Choose format: CSV or PDF
  3. Select date range
  4. Include details:
    • User information
    • Device information
    • Application details
    • Timestamps
    • Approval details

Screenshot:

Custom Reports

Need something specific? Use Microsoft Graph API:

# Get EPM activity via Graph API
# Requires: Microsoft Graph API permissions

# Install Graph module if needed
Install-Module Microsoft.Graph -Scope CurrentUser

# Connect to Graph
Connect-MgGraph -Scopes "DeviceManagementConfiguration.Read.All"

# Get EPM activity
Get-MgDeviceManagementDeviceManagementIntentAssignment `
    -DeviceManagementIntentId "EPM-POLICY-ID"

Troubleshooting Common Issues

Issue 1: Policy Not Applying to Devices

Symptoms:

  • Devices show in Endpoint Manager but no EPM policy
  • Users don’t see elevation requests

Troubleshooting steps:

  1. Check device enrollment status

    Go to Devices → All devices
    Verify: Last check-in < 24 hours
    Verify: Enrollment state = Enrolled
  2. Verify policy assignment

    Go to Policies → [Your Policy] → Properties
    Check: Assignments are configured
    Check: Devices/users are in included groups
  3. Check EPM compatibility

    Devices must be:
    - Azure AD joined OR
    - Hybrid Azure AD joined
    
    Run on device:
    dsregcmd /status
  4. Sync device

    On device: Start → Settings → Accounts → Access work or school
    Click: Sync

Issue 2: Users Can’t Request Elevation

Symptoms:

  • User tries to elevate but gets no prompt
  • No request appears in Activity logs

Troubleshooting steps:

  1. Verify user is in correct group

    Check: User is in policy's Included groups
    Check: User is NOT in Excluded groups
  2. Check policy status

    Go to Devices → Endpoint Privilege Management → Policies
    Verify: Policy shows "Deployed"
    Check: Last modified date is recent
  3. Verify user has required license

    Users need:
    - Intune Plan 1 or 2 license, OR
    - Microsoft 365 Business Premium
  4. Check device compliance

    Devices must be:
    - Compliant (or marked as compliant if no compliance policy)
    
    Check: Devices → Compliance

Issue 3: Approval Not Working

Symptoms:

  • Requests show “Pending” indefinitely
  • Approvers not receiving notifications

Troubleshooting steps:

  1. Verify approver configuration

    Go to Policy → Settings → Approval
    Check: Approvers are specified
    Check: Approvers have correct permissions
  2. Check email notifications

    Verify: Approver email is correct
    Check: Email not in spam
    Verify: SendGrid/notification service active
  3. Manual approval test

    As admin, go to:
    Devices → Endpoint Privilege Management → Approvals
    Manually approve a pending request
  4. Check approver permissions

    Approvers need Intune role with:
    - Endpoint Privilege Management: Approve requests

Issue 4: Elevation Failures

Symptoms:

  • Request approved but elevation fails
  • User gets error when running elevated app

Troubleshooting steps:

  1. Check application compatibility

    Not all apps support elevation:
    - UWP apps generally don't need elevation
    - Some apps block elevation for security
    - Check app documentation
  2. Review error details

    In Activity logs:
    - Expand the failed request
    - Read the error message
    - Note the error code
  3. Check for conflicts

    Possible conflicts:
    - Application Control policies
    - Windows Defender Application Control
    - Third-party security software
    
    Test: Temporarily disable other policies
  4. Verify local admin status

    After successful elevation, verify:
    - User should now have admin context
    - Check: whoami /groups

Issue 5: Password Rotation Not Working

Symptoms:

  • Scheduled policies not rotating passwords
  • Old password still works

Troubleshooting steps:

  1. Verify scheduled policy is active

    Go to Policies → [Scheduled Policy]
    Check: Status = Deployed
    Check: Next rotation time
  2. Check rotation logs

    Activity logs → Filter by:
    - Event type: Password rotation
    - Date: Expected rotation date
  3. Verify device connectivity

    Devices must connect at least weekly
    Check: Last check-in time
  4. Review password policy

    Verify complexity requirements match:
    - Minimum length
    - Character requirements

Best Practices for Ongoing Management

1. Regular Monitoring

  • Daily: Check Activity logs for errors
  • Weekly: Review usage summary
  • Monthly: Generate compliance report for leadership

2. Policy Tuning

Based on monitoring data:

  • Adjust elevation duration if users constantly need more time
  • Add frequently used apps to approved list
  • Refine approval workflows based on request volume

3. User Communication

Keep users informed:

  • Explain when and how to request elevation
  • Provide instructions for Company Portal access
  • Set expectations for approval times

4. Documentation

Maintain internal docs:

  • Current policy configurations
  • Approval workflows
  • Troubleshooting procedures
  • Contact info for EPM admins

5. Audit Preparation

For compliance audits:

  • Export reports regularly (monthly minimum)
  • Document any policy exceptions
  • Keep approval records for at least 1 year
  • Review and update access reviews quarterly

Advanced Tips

Enable Self-Service Approval

Reduce IT burden by allowing managers to approve their team’s requests:

  1. Create approver group of department managers
  2. Configure policy to use group as approvers
  3. Managers get email notifications
  4. Approve directly from email or Endpoint Manager

Use Conditional Access

Add extra security:

Configure Conditional Access policy:
- Require compliant device for elevation requests
- Block elevation from non-compliant devices
- Require MFA for high-risk requests

Integrate with Microsoft Defender

Enhanced threat protection:

  • Elevation requests trigger Defender analysis
  • Block elevation for high-risk applications
  • Alert on suspicious elevation patterns

Wrapping Up

Endpoint Privilege Manager is a powerful tool—but only if you monitor it actively. The key takeaways:

  1. Monitor Activity Logs – Don’t wait for users to report problems
  2. Start Small – Pilot before broad deployment
  3. Document Everything – Future you will thank present you
  4. Iterate – Adjust policies based on real usage
  5. Communicate – Users need to know how to get help

With these practices, you’ll have a secure, compliant, and manageable EPM deployment.


Series: Endpoint Privilege Manager

Was this helpful?