Forum Discussion

lfk73's avatar
lfk73
Brass Contributor
Jun 19, 2025
Solved

Azure AD Join (Entra Join) vs Hybrid Azure AD Join vs Azure AD Registration (Workplace Join)

I still find it hard to understand the differences between Azure AD Join (Entra Join) vs Hybrid Azure AD Join vs Azure AD Registration (Workplace Join).

 

I know Azure AD Registration (Workplace Join) is supposed to be nest for Personal devices (BYOD) but if you have security as an important part of your business why would you want to allow this?  You could end up with a billion random machines in your Entra.  What's the benefit of this?

 

Also, if I have a Hybrid environment and I have booth cloud and on prem apps that do auth via both on prem (for on prem apps linked to AD) and Entra for cloud do I need to be Hybrid Azure AD Joined to support on prem an cloud?  Or will a person working from a Azure AD Joined machine still be able to access on prem resources like file servers and any app that uses AD groups for auth, access provisioning etc? 

 

  •  

    There are three common ways to migrate Windows devices to Microsoft Entra ID Join:

    1. Traditional Method: Reset Device and Re-Provision using Windows Autopilot (data protected with OneDrive)
      This approach wipes and resets the device, then re-provisions it as a cloud-only Entra ID–joined device using Windows Autopilot. To avoid data loss, user files are synced to OneDrive first.

    Simple flow

    • Sync user folders (Desktop, Documents, Pictures) to OneDrive
    • Add devices to Autopilot and trigger a device reset
    • Device boots into Windows Autopilot
    • User signs in using Entra ID credentials
    • Device auto-configures security policies, applications, and compliance settings
    • OneDrive restores user files after sign-in

    What users experience

    • New Windows setup experience
    • Applications reinstall
    • Settings and preferences reset
    • Files are restored, but desktop look-and-feel is new

    Pros

    • Clean and secure approach, Microsoft-recommended
    • Ideal for device refresh or security rebuild
    • Fully automated provisioning

    Limitations

    • Requires device reset
    • Limited end-to-end logging/monitoring of the full migration activity (depends on how you implement it)
    • User downtime typically 1–3 hours
    • User profile/settings are not preserved
    • Requires strong OneDrive adoption

    2. Manual Method: Leave Domain and Join Entra ID (no reset, but profile migration required)

    IT manually unjoins the device from Active Directory and joins it to Entra ID without resetting Windows.

    Simple flow

    • Unjoin device from on-prem AD
    • Join device to Entra ID
    • Back up LAPS and BitLocker recovery keys
    • User signs in with Entra ID (new Windows profile is created)
    • Manually copy user data and limited settings (browser data, some app settings)
    • Update device ownership (if DEM is used)
    • Remove local admin rights if needed (depending on join method and policy)

    What users experience

    • New Windows profile
    • Files may be copied manually (often requires permission mapping to access the old profile)
    • Applications might need reconfiguration
    • Some settings are lost

    Pros

    • No full device reset
    • Often faster than Autopilot reset
    • Does not depend on OneDrive

    Limitations

    • Manual and error-prone
    • Requires old profile permission/SID mapping to move data correctly
    • Risk of data/settings loss
    • Limited logging/monitoring and harder troubleshooting
    • Not scalable for large environments

    3. Modern Method: Migrate using Opsole Migrate (no reset, minimal downtime)
    Opsole Migrate enables an in-place migration from AD/Hybrid join to Entra ID Join without resetting the device, while preserving the existing user profile and minimizing downtime.

    Simple flow

    • Deploy Opsole Migrate remotely (Intune or GPO)
    • Run migration under IT scheduling or user self-service
    • Device is disjoined from AD and joined to Entra ID
    • User profile is preserved, including BitLocker and LAPS continuity
    • User signs in and continues working with minimal interruption

    What users experience

    • No reset
    • Same desktop, files, apps, and settings
    • Minimal interruption (typically 10–15 minutes, device-dependent)

    Pros

    • No device reset and no new user profile
    • Minimal downtime
    • Detailed logging and monitoring by phase
    • Scalable for large enterprises
    • Well-suited for business-critical users and large fleets

    Why customers prefer this approach

    • Minimal disruption to daily work
    • No retraining or confusion
    • Faster completion for larger device fleets (100+ devices)
    • Lower support ticket volume

     

3 Replies

  • JoseJ's avatar
    JoseJ
    Brass Contributor

     

    There are three common ways to migrate Windows devices to Microsoft Entra ID Join:

    1. Traditional Method: Reset Device and Re-Provision using Windows Autopilot (data protected with OneDrive)
      This approach wipes and resets the device, then re-provisions it as a cloud-only Entra ID–joined device using Windows Autopilot. To avoid data loss, user files are synced to OneDrive first.

    Simple flow

    • Sync user folders (Desktop, Documents, Pictures) to OneDrive
    • Add devices to Autopilot and trigger a device reset
    • Device boots into Windows Autopilot
    • User signs in using Entra ID credentials
    • Device auto-configures security policies, applications, and compliance settings
    • OneDrive restores user files after sign-in

    What users experience

    • New Windows setup experience
    • Applications reinstall
    • Settings and preferences reset
    • Files are restored, but desktop look-and-feel is new

    Pros

    • Clean and secure approach, Microsoft-recommended
    • Ideal for device refresh or security rebuild
    • Fully automated provisioning

    Limitations

    • Requires device reset
    • Limited end-to-end logging/monitoring of the full migration activity (depends on how you implement it)
    • User downtime typically 1–3 hours
    • User profile/settings are not preserved
    • Requires strong OneDrive adoption

    2. Manual Method: Leave Domain and Join Entra ID (no reset, but profile migration required)

    IT manually unjoins the device from Active Directory and joins it to Entra ID without resetting Windows.

    Simple flow

    • Unjoin device from on-prem AD
    • Join device to Entra ID
    • Back up LAPS and BitLocker recovery keys
    • User signs in with Entra ID (new Windows profile is created)
    • Manually copy user data and limited settings (browser data, some app settings)
    • Update device ownership (if DEM is used)
    • Remove local admin rights if needed (depending on join method and policy)

    What users experience

    • New Windows profile
    • Files may be copied manually (often requires permission mapping to access the old profile)
    • Applications might need reconfiguration
    • Some settings are lost

    Pros

    • No full device reset
    • Often faster than Autopilot reset
    • Does not depend on OneDrive

    Limitations

    • Manual and error-prone
    • Requires old profile permission/SID mapping to move data correctly
    • Risk of data/settings loss
    • Limited logging/monitoring and harder troubleshooting
    • Not scalable for large environments

    3. Modern Method: Migrate using Opsole Migrate (no reset, minimal downtime)
    Opsole Migrate enables an in-place migration from AD/Hybrid join to Entra ID Join without resetting the device, while preserving the existing user profile and minimizing downtime.

    Simple flow

    • Deploy Opsole Migrate remotely (Intune or GPO)
    • Run migration under IT scheduling or user self-service
    • Device is disjoined from AD and joined to Entra ID
    • User profile is preserved, including BitLocker and LAPS continuity
    • User signs in and continues working with minimal interruption

    What users experience

    • No reset
    • Same desktop, files, apps, and settings
    • Minimal interruption (typically 10–15 minutes, device-dependent)

    Pros

    • No device reset and no new user profile
    • Minimal downtime
    • Detailed logging and monitoring by phase
    • Scalable for large enterprises
    • Well-suited for business-critical users and large fleets

    Why customers prefer this approach

    • Minimal disruption to daily work
    • No retraining or confusion
    • Faster completion for larger device fleets (100+ devices)
    • Lower support ticket volume

     

    • rrash's avatar
      rrash
      Occasional Reader

      Quick question – for remote users, what is the easiest way to migrate from AD to Entra ID Join without wipe and reimage?

  • Hi lfk73​ , check this

     

    Azure AD Registration (Workplace Join) — for BYOD

    Security Concerns: Why allow this?

    You're right — letting users register their personal laptops or phones can open the door to unmanaged, potentially insecure endpoints.

    Why organizations might still use it:

    1. Access from anywhere: Users might need access to web-based resources (like Outlook or SharePoint) from their personal devices.
    2. Conditional Access: You can enforce MFA, device compliance, limited access (e.g., no downloads) even on these registered devices.
    3. Self-service password reset, SSO, and device-based Conditional Access become available.

    How to manage security:

    • Use Conditional Access to restrict what registered devices can access (e.g., block access to sensitive apps).
    • Use Microsoft Defender for Endpoint to detect risky behavior.
    • Use compliance policies (e.g., block jailbroken phones, require PINs).

    If you're strict on device control, you can disable self-registration and require only joined (not just registered) devices.

     

    Hybrid Azure AD Join — for hybrid environments

    Used when:

    • Devices are joined to on-prem AD for legacy apps/file shares.
    • You also want them visible and manageable in Entra ID for cloud apps.

    Use Case:

    • Authenticate to on-prem resources with Kerberos/NTLM.
    • Use cloud features (SSO to M365, Conditional Access, etc.)

    It’s the default for enterprises with existing AD environments.

     

    Azure AD Join (Entra Join) — Cloud-native devices

    Used when:

    • You have cloud-first devices (e.g., autopilot-deployed Windows 11 laptops).
    • Users sign in using Entra credentials only — no on-prem domain join.

    What about access to on-prem resources?

    • By default, Azure AD Joined devices can't directly access:
      • File shares
      • Print servers
      • Apps using Kerberos/NTLM or AD-integrated security

    Unless you:

    • Have line-of-sight to a domain controller (via VPN).
    • Use Azure AD Kerberos (newish feature) for things like Windows Hello or file shares.
    • Implement Hybrid Identity tools like Azure AD App Proxy for legacy app publishing.

    So if your users need access to both on-prem and cloud resources, and your infra is not fully cloud-migrated yet:

    Hybrid Azure AD Join is usually required.

     

    TL;DR – Which to use when?

    Scenario

    Recommended Join Type

    Corporate devices, cloud-first

    Azure AD Join

    Corporate devices, on-prem + cloud

    Hybrid Azure AD Join

    BYOD (phones/laptops), limited access

    Azure AD Registration

    Want strict device control

    Disable Azure AD Registration

     

    Final Guidance

    • Don’t allow Azure AD Registration freely unless you layer in strong Conditional Access policies.
    • If you need both on-prem and cloud app access, Hybrid Azure AD Join is your best bet.
    • If moving toward full cloud-native infra, Entra Join (Azure AD Join) is the future — but legacy app support must be addressed.

     

Resources