Solved! Go to Solution.
Hi @Karln83 ,
SolidCore solidifies any .dll file. In this case AppCore.Windows.dll is protected, so it denies access to Services.exe which is a generic launcher process.
I think adding a Write-Protect exclusion should be the way forward. However, you can log a SR with technical support to explore other alternatives.
Thanks
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
Hi @Karln83 ,
We would need to review the logs to understand the cause of write denied.
S3diag.log would possibly have the reason why the App was blocked.
Thanks
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
Hi @Pravas ,
So this is what we are seeing on one of the clients (extract of a few lines from S3diag.log).
(WRITE_DENIED file_name= "C:\Program Files\Windows Apps\Microsoft.Windows.Photos_2019.19071.12548.0_x64_8wekyb3d8bbwe\AppCore.Windows.dll" pid="4504" process_name="c:\windows\system32\svchost.exe" ppid="1080" parent_process_name="c:\windows\system32\services.exe" event_time="1684779111889" event_time_system="May 22 2023:18:11:51" is_system_file="false" deny_reason="File-solidified" user_name="NT Authority System")
There are more but they are all similar, just different windows apps/dll's. I will add that these issues seem to arise after the monthly patching cycle, and once the process is given the ability to write to the file, for example using skiplist -d against \Program Files\Windows Apps, (as has been the case during my tests), it seems that there are no issues once I remove the rule. But the problem re-appears at the next patching cycle which is causing issues for our end users.
Hi @Pravas have you managed to have a look at my previous response at all?
Hi @Karln83 ,
SolidCore solidifies any .dll file. In this case AppCore.Windows.dll is protected, so it denies access to Services.exe which is a generic launcher process.
I think adding a Write-Protect exclusion should be the way forward. However, you can log a SR with technical support to explore other alternatives.
Thanks
Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: