ANAVEM
Languagefr
How to Disable Task Manager Using Microsoft Intune (MEM)

How to Disable Task Manager Using Microsoft Intune (MEM)

Create and deploy a device configuration policy in Microsoft Intune that prevents users from accessing Task Manager on Windows computers using the Settings Catalog.

March 30, 2026 15 min
mediumintune 10 steps 15 min

Why Disable Task Manager Through Microsoft Intune?

Task Manager provides powerful system control capabilities that can pose security risks in enterprise environments. Users with Task Manager access can terminate critical business applications, end security processes, or gather sensitive system information. By implementing centralized restrictions through Microsoft Intune, IT administrators can maintain system security while preserving user productivity.

What Makes Intune's Settings Catalog the Best Approach?

Microsoft Intune's Settings Catalog represents the modern approach to device configuration management, replacing older methods like Administrative Templates and custom OMA-URI policies. The Settings Catalog provides direct access to Windows Configuration Service Providers (CSPs) with a user-friendly interface, ensuring policies stay current with Windows updates and reducing configuration errors.

How Does Task Manager Restriction Work at the System Level?

When you deploy the "Remove Task Manager (User)" policy through Intune, it configures the Windows registry key HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr with a value of 1. This system-level restriction prevents non-administrative users from launching Task Manager through any method - right-clicking the taskbar, using Ctrl+Alt+Delete, or running taskmgr.exe directly. The restriction applies immediately after the next user login and remains active until the policy is removed or disabled.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center

Start by signing into the Microsoft Intune admin center where you'll create the configuration policy. This is the central hub for all device management tasks.

https://endpoint.microsoft.com

Sign in with your administrative credentials that have permissions to create device configuration policies. Once logged in, you'll see the main dashboard with various management options.

Pro tip: Bookmark the Intune admin center URL for quick access. The interface loads faster than navigating through the Microsoft 365 admin center.

Verification: Confirm you can see the "Devices" section in the left navigation menu. If you don't see this option, your account lacks the necessary permissions.

02

Navigate to Configuration Profiles

Navigate to the device configuration section where you'll create the new policy. This is where all device restriction and configuration policies are managed.

In the left navigation menu, click on Devices, then select Configuration profiles. You'll see a list of existing configuration policies if any have been created previously.

Click the Create profile button to start creating a new configuration policy. This will open the policy creation wizard.

Warning: Make sure you're in the correct tenant if you manage multiple organizations. Creating policies in the wrong tenant can cause confusion and security issues.

Verification: You should see the "Create a profile" page with platform and profile type selection options.

03

Configure Profile Platform and Type

Select the appropriate platform and profile type for the Task Manager restriction policy. The Settings Catalog provides the most comprehensive and up-to-date policy options.

On the "Create a profile" page:

  • Platform: Select "Windows 10 and later"
  • Profile type: Select "Settings catalog"

Click Create to proceed to the policy configuration wizard.

The Settings Catalog is Microsoft's modern approach to device configuration, replacing the older Administrative Templates method. It provides access to all available Configuration Service Provider (CSP) settings.

Verification: You should now see the "Basics" tab of the policy creation wizard with fields for name and description.

04

Configure Basic Policy Information

Set up the basic information for your Task Manager restriction policy. Clear naming and descriptions help with policy management and troubleshooting.

On the Basics tab, fill in the following information:

  • Name: Disable Task Manager - Security Policy
  • Description: Prevents non-administrative users from accessing Task Manager to enhance system security and prevent unauthorized process termination

The name should be descriptive enough that other administrators understand the policy's purpose without opening it. Include keywords that make it easy to find in searches.

Pro tip: Use a consistent naming convention for all your Intune policies. Consider prefixes like "SEC-" for security policies or "COMP-" for compliance policies.

Click Next to proceed to the configuration settings.

Verification: The "Configuration settings" tab should now be active, showing an empty settings list with an "Add settings" button.

05

Add Task Manager Restriction Setting

Configure the specific setting that will disable Task Manager access for users. This uses the Administrative Templates policy that maps to the Windows registry.

On the Configuration settings tab:

  1. Click Add settings
  2. In the search box, type Task Manager
  3. Expand Administrative TemplatesSystemCtrl+Alt+Del Options
  4. Select Remove Task Manager (User)
  5. Click Add

Once the setting is added, you'll see it in your configuration list. Click on the setting to configure it:

  • Set the toggle to Enabled

When enabled, this policy prevents users from starting Task Manager through any method - right-clicking the taskbar, using Ctrl+Alt+Delete, or running taskmgr.exe directly.

Warning: This policy only affects non-administrative users. Local administrators will still have access to Task Manager regardless of this setting.

Click Next to proceed to assignments.

Verification: The setting should show "Remove Task Manager (User): Enabled" in your configuration list.

06

Assign Policy to Target Groups

Configure which users or devices will receive this Task Manager restriction policy. Proper assignment ensures the policy applies only where needed.

On the Assignments tab:

  1. Click Add groups under "Included groups"
  2. Select the user groups or device groups that should have Task Manager disabled
  3. Click Select

Common assignment strategies:

  • User groups: Apply to specific departments like "Standard Users" or "Contractors"
  • Device groups: Apply to shared computers or kiosks
  • All users: For organization-wide security policies
Pro tip: Start with a small test group before deploying to all users. Create a "Pilot Users" group for testing new policies safely.

You can also add exclusion groups if certain users need Task Manager access despite being in the included groups.

Click Next to continue.

Verification: Your selected groups should appear in the "Included groups" section with the correct member count displayed.

07

Configure Scope Tags (Optional)

Set up scope tags if your organization uses role-based administration to limit which administrators can manage this policy.

On the Scope tags tab:

  • If you use scope tags, select the appropriate tags for this policy
  • If you don't use scope tags, leave this section with the default "Default" tag

Scope tags are useful in large organizations where different IT teams manage different departments or regions. They ensure administrators only see and manage policies relevant to their responsibilities.

Common scope tag examples:

  • Department-based: "HR", "Finance", "Engineering"
  • Location-based: "US-East", "EU-West"
  • Function-based: "Security", "Compliance"

Click Next to proceed to the final review.

Verification: The selected scope tags should be listed, or "Default" should be shown if no custom tags are used.

08

Review and Create the Policy

Review all policy settings before deployment to ensure everything is configured correctly. This is your final opportunity to make changes before the policy goes live.

On the Review + create tab, verify:

  • Name and description: Clear and accurate
  • Platform: Windows 10 and later
  • Profile type: Settings catalog
  • Configuration: Remove Task Manager (User): Enabled
  • Assignments: Correct user/device groups
  • Scope tags: Appropriate for your organization

If everything looks correct, click Create to deploy the policy.

Warning: Once created, the policy will begin deploying to assigned devices immediately. Make sure your assignments are correct before clicking Create.

The policy will appear in your Configuration profiles list with a status of "Deploying" initially, then change to show deployment statistics.

Verification: The new policy should appear in the Configuration profiles list with your specified name and show deployment progress.

09

Monitor Policy Deployment Status

Track the deployment progress and ensure the policy is successfully applied to target devices. Monitoring helps identify any deployment issues early.

To monitor deployment:

  1. Go to DevicesConfiguration profiles
  2. Click on your "Disable Task Manager" policy
  3. Review the Device status and User status tabs

The status page shows:

  • Succeeded: Policy applied successfully
  • Error: Policy failed to apply (click for details)
  • Conflict: Multiple policies affecting the same setting
  • Not applicable: Device doesn't meet requirements

Policy deployment typically takes 15-30 minutes for online devices, or up to 8 hours for devices that sync periodically.

Pro tip: Force an immediate sync on test devices by opening Company Portal app and clicking "Check for updates" or using Settings → Accounts → Access work or school → Sync.

Verification: At least one device should show "Succeeded" status within 30 minutes for online devices.

10

Test Task Manager Restriction

Verify that the policy is working correctly by testing Task Manager access on a target device. This confirms the restriction is active and functioning as expected.

On a device where the policy has been applied, test these methods:

  1. Right-click taskbar test: Right-click on the Windows taskbar - "Task Manager" option should be grayed out or missing
  2. Ctrl+Alt+Delete test: Press Ctrl+Alt+Delete - Task Manager should not appear in the options
  3. Run command test: Press Windows+R, type taskmgr, and press Enter

Expected result for the run command test:

Task Manager has been disabled by your administrator.

If you're testing as a local administrator, the restriction won't apply to your account. Test with a standard user account to see the actual restriction in effect.

Warning: Remember that local administrators bypass this restriction. The policy only affects standard users and domain users without local admin rights.

To verify policy application on the device, check the registry:

Get-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\System" -Name "DisableTaskMgr" -ErrorAction SilentlyContinue

The value should be 1 when the policy is active.

Verification: Standard users should see the "disabled by administrator" message when attempting to access Task Manager through any method.

Frequently Asked Questions

Does disabling Task Manager through Intune affect local administrators?+
No, the Task Manager restriction policy only applies to standard users and domain users without local administrative privileges. Local administrators retain full access to Task Manager regardless of the Intune policy setting. This is by design to ensure administrators can always manage system processes when needed.
How long does it take for the Task Manager restriction to apply after policy deployment?+
The policy typically applies within 15-30 minutes for devices that are online and actively syncing with Intune. For devices that sync periodically, it can take up to 8 hours. You can force an immediate sync through the Company Portal app or Windows Settings to speed up the process.
Can users bypass the Task Manager restriction using alternative methods?+
The Intune policy blocks all standard methods of accessing Task Manager including right-clicking the taskbar, Ctrl+Alt+Delete menu, and running taskmgr.exe directly. However, users with sufficient technical knowledge might use alternative process management tools or PowerShell commands, which would require additional restrictions if needed.
What happens if I need to re-enable Task Manager for specific users?+
You can re-enable Task Manager by either excluding specific user groups from the policy assignment, creating a separate policy with the setting disabled for those users, or modifying the existing policy to change the assignment scope. Changes typically take effect within the next sync cycle.
Is there a difference between blocking Task Manager entirely versus blocking only the end task function?+
Yes, there are two different approaches. The 'Remove Task Manager (User)' setting completely prevents users from opening Task Manager. Alternatively, you can use the Device Restrictions profile with 'End processes from Task Manager' set to Block, which allows users to view Task Manager but prevents them from terminating processes.

Discussion

Share your thoughts and insights

Sign in to join the discussion