Hello,
Yes. The supported way is to use the MMC snap-in restrictions at user scope, not SRP or file ACLs.
Try this.
In a classic GPO, create a user-scoped GPO that targets your non-admin users or a security group.
In User Configuration > Administrative Templates > Windows Components > Microsoft Management Console, first enable the policy named Restrict users to the explicitly permitted list of snap-ins. Then, in the Restricted/Permitted snap-ins folder, set the entry for Task Scheduler to Disabled. When a snap-in is prohibited, it will not appear in Add/Remove Snap-in and any .msc that already contains it opens but the Task Scheduler node is omitted with a policy message.
If you want this via Intune instead of on-prem GPO, deploy the same settings using the ADMX-backed Policy CSP at user scope.
In Intune, create a Custom profile (Windows 10 and later), add an OMA-URI setting for ADMX_MMC Restrict users to the explicitly permitted list of snap-ins with the path ./User/Vendor/MSFT/Policy/Config/ADMX_MMC/MMC_Restrict_To_Permitted_Snapins and set the value to the ADMX boolean payload <enabled/>. Then add the per-snap-in OMA-URI from the ADMX_MMCSnapins area for the Task Scheduler snap-in and set it to <disabled/>. If the Settings Catalog does not surface that entry in your tenant, use Group Policy analytics to export a tiny GPO with just those two settings and let Intune show you the CSP mapping and OMA-URIs to paste into your custom profile.