Based on my knowledge and on your information, this seems like a serious and persistent case of profile or system corruption triggered by a specific Windows Update or a conflict between that update and Intune/Endpoint Manager policies. So I have some recommend ways to try it out and let me know the result
- Test on a Clean Local Profile (Post-Update)
- After the issue manifests, create a new local admin account (e.g.
.\TestAdmin
) via Safe Mode with Command Prompt:
net user TestAdmin P@ssw0rd123 /add
net localgroup administrators TestAdmin /add
- Log in and check if:
- Start button works
- Settings and Windows Security work
- AAD sign-in to Teams/Outlook succeeds
=> If this new profile works fine, it confirms a user profile-level corruption caused by update + existing user data.
- Block Specific Updates Temporarily
Use Intune or local Group Policy to pause feature updates, especially:
- 24H2 (Check
winver
and compare to 22631.xxxxx or 26100.xxxxx) - Windows + R then type gpedit.msc and follow this directory :
-
Computer Configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business
-
- Then set:
-
Select the target Feature Update version
: 23H2 -
Defer feature updates
: 90–180 days
=> This can help lock your device on a known-good build and prevent forced jumps to 24H2 while MS works out bugs.
- Check AppX/AppInstaller corruption
The crashing of built-in apps and security tools may point to a corruption in AppX packages or AppX provisioning.
- Run these commands as SYSTEM, or from an elevated PowerShell ( run as Admin ):
Get-AppxPackage -AllUsers | foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)\AppXManifest.xml"}
- And then:
Get-AppXPackage -AllUsers Microsoft.Windows.ShellExperienceHost | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register "$($_.InstallLocation)\AppXManifest.xml"}
- Temporarily Remove Intune Enrollment Post-Setup
If you're able to stage the device:
- Set it up without MDM enrollment (local account or Hybrid Azure AD Join)
- Manually patch it to the latest stable 23H2, test system stability
- Only then, enroll in Intune manually via Company Portal
=> This isolates whether the issue comes from MDM policy or from native Windows behavior.
*But there is also a Known Bug: 24H2 Feature Preview (June/July 2024)
You’re might likely hitting a known issue in 24H2 builds (especially 26100.712 and earlier) that break:
-
ShellExperienceHost
- MDM token renewal
- UWP-based security apps
But don't worry cause the fix has reportedly landed in later insider builds and will ship in August 2025 Patch Tuesday.