Tech Community Live: Endpoint Manager edition
Jul 21 2022, 08:00 AM - 12:00 PM (PDT)

Problems enrolling devices into Intune

%3CLINGO-SUB%20id%3D%22lingo-sub-3284852%22%20slang%3D%22en-US%22%3EProblems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3284852%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe're%20deploying%20our%20machines%20to%20Intune%2C%20using%20a%20GPO.%20Most%20of%20the%20times%20everything%20works%20fine%2C%20but%20I%20still%20have%20about%20300%20machines%20which%20didn't%20get%20into%20Intune%2C%20and%20now%20we're%20analyzing%20why.%3C%2FP%3E%3CP%3EAfter%20reading%20a%20bit%2C%20I've%20found%20that%20most%20of%20the%20devices%20which%20are%20not%20getting%20into%20Intune%20is%20because%20they%20are%20not%20enrolling%20with%20the%20user%20in%20Azure%20AD.%3C%2FP%3E%3CP%3ESo%20after%20the%20machine%20gets%20into%20the%20domain%2C%20it%20will%20go%20to%20Azure%20AD%20Devices%20as%20well%2C%20as%20Hybrid%20Azure%20AD%20Joined%2C%20which%20is%20fine.%20But%20when%20Owner%20field%20is%20not%20populated%20with%20the%20user%2C%20the%20device%20will%20not%20join%20Intune.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ELooking%20at%20those%20machines%2C%20and%20running%20the%20command%20%22dsregcmd%20%2Fstatus%22%2C%20the%20ones%20which%20are%20not%20ok%2C%20in%20the%20%22SSO%20State%22%20area%2C%20have%20the%20following%20error%3A%3C%2FP%3E%3CP%3EServer%20Error%20Code%20%3A%20interaction_required%3CBR%20%2F%3EServer%20Error%20Description%20%3A%20AADSTS50076%3A%20Due%20to%20a%20configuration%20change%20made%20by%20your%20administrator%2C%20or%20because%20you%20moved%20to%20a%20new%20location%2C%20you%20must%20use%20multi-factor%20authentication%20to%20access%20'00000002-0000-0000-c000-000000000000'.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20users%20can%20logon%20to%20Azure%20AD%20with%20their%20MFA%20working%20fine.%20So%20any%20clue%20on%20how%20can%20I%20correct%20this%20issue%3F%3CBR%20%2F%3EI've%20read%20about%20disabling%20security%20defaults%20in%20Azure%20AD%2C%20but%20in%20our%20case%2C%20it's%20already%20disabled.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3284852%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3288038%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3288038%22%20slang%3D%22en-US%22%3EHi%2C%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%20for%20the%20notes%20and%20tips.%20Some%20of%20those%20we%20are%20already%20implementing%2C%20but%20some%20of%20those%20mess%20with%20the%20users%2C%20so%20they%20need%20to%20be%20done%20carefully.%20And%20some%20might%20impact%20legacy%20stuff%2C%20which%20needs%20to%20be%20considered%20carefully.%3CBR%20%2F%3EOn%20the%20meanwhile%20of%20course%20I%20would%20like%20to%20debug%20this%20cases%20so%20I%20can%20understand%20what%20is%20going%20on%20and%20try%20to%20fix%20it.%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3287313%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3287313%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1095589%22%20target%3D%22_blank%22%3E%40dmarquesgn%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E-%20Ensure%20Modern%20Auth%20is%20enabled%20in%20the%20Org%20settings%20under%20admin.microsoft.com%3C%2FP%3E%3CP%3E-%20Disable%20sec%20defaults%3C%2FP%3E%3CP%3E-%20Disable%20the%20classic%20per%20user%20MFA%20and%20use%20CA%20policies%20to%20enforce%20MFA%20instead%3C%2FP%3E%3CP%3E-%20Target%20all%20users%20all%20cloud%20apps%20all%20devices%20all%20locations%20with%20Grant%20and%20Require%20MFA%20via%20CA%20policy%3C%2FP%3E%3CP%3E-%20Exclude%20Break%20the%20Glass%20accounts%20(max%202%20Break%20the%20glass%20accounts%20are%20fine)%20from%20the%20CA%20policy%3C%2FP%3E%3CP%3E-%20Exclude%20SMTP%20accounts%20from%20the%20CA%20policy%20or%20move%20SMTP%20traffic%20to%20a%20third%20party%20like%20SMTP2GO%20and%20then%20create%20a%20CA%20policy%20to%20block%20legacy%20auth%20all%20together%20in%20the%20tenant%3C%2FP%3E%3CP%3E-%20Disable%20all%20forms%20of%20legacy%20auth%2Fbasic%20auth%26nbsp%3Bthe%20Org%20settings%20under%20admin.microsoft.com%3C%2FP%3E%3CP%3E-%20see%20again%20if%20Devices%20are%20now%20auto%20enrolling%20into%20Intune%20~300%20are%20quite%20high%20number%20and%20there%20has%20to%20be%20a%20good%20reason%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3285940%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3285940%22%20slang%3D%22en-US%22%3EHi%2C%3CBR%20%2F%3E%3CBR%20%2F%3EI've%20got%20already%20the%20logs%20from%20some%20of%20the%20devices.%3CBR%20%2F%3EOn%20the%20Operational%20Log%20there%20are%20no%20errors.%3CBR%20%2F%3EOn%20the%20Admin%20Log%20I've%20got%203%20events%20repeated%20from%205%20to%205%20minutes%2C%20events%2080%2C%2090%20and%2076.%3CBR%20%2F%3EEvent%2080%20-%20Warning%20-%20Auto%20MDM%20Enroll%20DmRaiseToastNotificationAndWait%20Failure%20(Unknown%20Win32%20Error%20code%3A%200x8018002a)%3CBR%20%2F%3EEvent%2090%20-%20Information%20-%20Auto%20MDM%20Enroll%20Get%20AAD%20Token%3A%20Device%20Credential%20(0x0)%2C%20Resource%20Url%20(%3CA%20href%3D%22https%3A%2F%2Fenrollment.manage.microsoft.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fenrollment.manage.microsoft.com%2F%3C%2FA%3E)%2C%20Resource%20Url%202%20(NULL)%2C%20Status%20(Unknown%20Win32%20Error%20code%3A%200x8018002a)%3CBR%20%2F%3EEvent%2076%20-%20Error%20-%20Auto%20MDM%20Enroll%3A%20Device%20Credential%20(0x0)%2C%20Failed%20(Unknown%20Win32%20Error%20code%3A%200x8018002a).%3CBR%20%2F%3E%3CBR%20%2F%3ESo%20seems%20the%20device%20is%20not%20authenticating%20correctly%20in%20Azure%20AD%20from%20my%20little%20understanding.%20Is%20there%20any%20way%20to%20force%20it%20to%20sync%20with%20AAD%20or%20debug%20the%20reason%20why%20it's%20not%20getting%20an%20authentication%20in%20AAD%3F%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3285779%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3285779%22%20slang%3D%22en-US%22%3ELicensing%20is%20fine%2C%20as%20we%20have%20M365%20E5%20for%20all%20of%20them%2C%20and%20some%20are%20enrolling%20fine%20in%20Intune.%3CBR%20%2F%3EI'll%20get%20those%20Logs%20to%20try%20to%20check%20if%20something%20there%20might%20help.%3CBR%20%2F%3E%3CBR%20%2F%3EI%20could%20use%20a%20filter%20to%20exclude%20MFA%2C%20but%20in%20fact%20all%20of%20our%20users%20have%20MFA%2C%20and%20some%20of%20them%20enroll%20just%20fine%20in%20Intune%2C%20while%20some%20others%20don't%2C%20so%20I%20don't%20really%20think%20it's%20MFA%20related.%3CBR%20%2F%3E%3CBR%20%2F%3EI'll%20start%20by%20getting%20the%20Logs%20from%20those%20machines%20and%20check%20those.%3CBR%20%2F%3EI'll%20post%20after%20I%20read%20the%20Logs.%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3285637%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3285637%22%20slang%3D%22en-US%22%3EJust%20to%20be%20sure...%20the%20people%20who%20are%20working%20on%20that%20device..%20do%20they%20even%20have%20a%20intune%20license%20applied%20and%20in%20the%20MDM%20scope%3F%3CBR%20%2F%3EDid%20you%20have%20taken%20a%20look%20at%20the%20event%20log%20DeviceManagement-Enterprise-Diagnostic-Provider%20..%20it%20should%20mention%20something%3CBR%20%2F%3E%3CBR%20%2F%3ENo%20old%20lingering%20enrollments%3F%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fcall4cloud.nl%2F2021%2F04%2Falice-and-the-device-certificate%2F%23part2%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fcall4cloud.nl%2F2021%2F04%2Falice-and-the-device-certificate%2F%23part2%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EAlso%20worth%20trying..%20what%20happens%20when%20you%20use%20a%20filter%20to%20exclude%20azure%20ad%20hybrid%20devices%20from%20mfa%3F%20so%20you%20could%20rule%20out%20the%20mfa%20issue%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3285491%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3285491%22%20slang%3D%22en-US%22%3EHi%2C%3CBR%20%2F%3EThanks%20for%20the%20reply.%3CBR%20%2F%3E%3CBR%20%2F%3EWhat%20I%20mean%20they%20are%20not%20enrolling%20correctly%20in%20Azure%20AD%20is%20that%2C%20after%20we%20join%20the%20devices%20(Windows%2010%20and%2011%20devices)%20to%20our%20onprem%20AD%2C%20they%20sync%20to%20Azure%20AD%2C%20so%20I%20can%20see%20them%20in%20Azure%20AD%2C%20but%20on%20this%20cases%20they%20don't%20get%20an%20Owner%20attribute%2C%20like%20the%20screenshot%20attached.%20When%20they%20don't%20get%20the%20owner%20attribute%2C%20they%20are%20not%20enrolled%20into%20Intune.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwetransfer.com%2Fdownloads%2F83a2c1886d87b8886bbb62541e94fc7520220414084043%2F33003d55320bf529fd4f6fde54bdbeab20220414084059%2F714328%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwetransfer.com%2Fdownloads%2F83a2c1886d87b8886bbb62541e94fc7520220414084043%2F33003d55320bf529fd4f6fde54bdbeab20220414084059%2F714328%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EAlso%2C%20on%20the%20link%20bellow%20you%20can%20see%20one%20example%20of%20the%20dsregcmd%20%2Fstatus.%20I've%20redacted%20some%20areas%2C%20but%20you%20can%20see%20the%20AzurePrt%20is%20NO%2C%20and%20the%20reason%20why.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwe.tl%2Ft-34rNN0x1OU%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwe.tl%2Ft-34rNN0x1OU%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3284872%22%20slang%3D%22en-US%22%3ERe%3A%20Problems%20enrolling%20devices%20into%20Intune%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3284872%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1095589%22%20target%3D%22_blank%22%3E%40dmarquesgn%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHi%2C%20So%20you%20are%20running%20a%20hybrid%20setup%20and%20those%20are%20existing%20devices.%20You%20have%20made%20sure%20those%20devices%20are%20in%20scope%20of%20the%20azure%20ad%26nbsp%3B%20connect%20instance.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%20are%20mentioning%20%22they%20are%20not%26nbsp%3B%3CSPAN%3Eenrolling%20with%20the%20user%20in%20Azure%20AD.%22.%20Could%20you%20explain%20this%20a%20little%20bit%20more%3F%20Could%20you%20also%20confirm%20if%20those%20devices%20are%20azure%20ad%20joined%26nbsp%3B%20and%20domain%20joined%20when%20looking%20at%20the%20dsregcmd%20status.%20While%20at%20it%20%2C%20I%20assume%20the%20azureprt%20is%20also%20%22yes%22%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3ETroubleshoot%20questions%3A%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E*Anything%20in%20the%26nbsp%3B%20DeviceManagement-Enterprise-Diagnostic-Provider%20%26gt%3B%20Admin.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E*Could%20you%20confirm%20the%20task%20schedules%20have%20been%20created%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fcall4cloud.nl%2F2020%2F05%2Fintune-auto-mdm-enrollment-for-devices-already-azure-ad-joined%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EEnable%20automatic%20MDM%20enrollment%20for%20Azure%20Ad%20joined%20Devices%20(call4cloud.nl)%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EResume%3A%20I%20guess%20we%20need%20some%20more%20info....%20%3A)%3C%2Fimg%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Contributor

Hi,

 

We're deploying our machines to Intune, using a GPO. Most of the times everything works fine, but I still have about 300 machines which didn't get into Intune, and now we're analyzing why.

After reading a bit, I've found that most of the devices which are not getting into Intune is because they are not enrolling with the user in Azure AD.

So after the machine gets into the domain, it will go to Azure AD Devices as well, as Hybrid Azure AD Joined, which is fine. But when Owner field is not populated with the user, the device will not join Intune.

 

Looking at those machines, and running the command "dsregcmd /status", the ones which are not ok, in the "SSO State" area, have the following error:

Server Error Code : interaction_required
Server Error Description : AADSTS50076: Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to access '00000002-0000-0000-c000-000000000000'.

 

The users can logon to Azure AD with their MFA working fine. So any clue on how can I correct this issue?
I've read about disabling security defaults in Azure AD, but in our case, it's already disabled.

 

Thanks

7 Replies

@dmarquesgn 

 

Hi, So you are running a hybrid setup and those are existing devices. You have made sure those devices are in scope of the azure ad  connect instance.

 

You are mentioning "they are not enrolling with the user in Azure AD.". Could you explain this a little bit more? Could you also confirm if those devices are azure ad joined  and domain joined when looking at the dsregcmd status. While at it , I assume the azureprt is also "yes"

 

Troubleshoot questions: 

*Anything in the  DeviceManagement-Enterprise-Diagnostic-Provider > Admin.

*Could you confirm the task schedules have been created

 

Enable automatic MDM enrollment for Azure Ad joined Devices (call4cloud.nl)

 

Resume: I guess we need some more info.... :) 

Hi,
Thanks for the reply.

What I mean they are not enrolling correctly in Azure AD is that, after we join the devices (Windows 10 and 11 devices) to our onprem AD, they sync to Azure AD, so I can see them in Azure AD, but on this cases they don't get an Owner attribute, like the screenshot attached. When they don't get the owner attribute, they are not enrolled into Intune.
https://wetransfer.com/downloads/83a2c1886d87b8886bbb62541e94fc7520220414084043/33003d55320bf529fd4f...

Also, on the link bellow you can see one example of the dsregcmd /status. I've redacted some areas, but you can see the AzurePrt is NO, and the reason why.
https://we.tl/t-34rNN0x1OU

Thanks
Just to be sure... the people who are working on that device.. do they even have a intune license applied and in the MDM scope?
Did you have taken a look at the event log DeviceManagement-Enterprise-Diagnostic-Provider .. it should mention something

No old lingering enrollments?
https://call4cloud.nl/2021/04/alice-and-the-device-certificate/#part2

Also worth trying.. what happens when you use a filter to exclude azure ad hybrid devices from mfa? so you could rule out the mfa issue
Licensing is fine, as we have M365 E5 for all of them, and some are enrolling fine in Intune.
I'll get those Logs to try to check if something there might help.

I could use a filter to exclude MFA, but in fact all of our users have MFA, and some of them enroll just fine in Intune, while some others don't, so I don't really think it's MFA related.

I'll start by getting the Logs from those machines and check those.
I'll post after I read the Logs.

Thanks
Hi,

I've got already the logs from some of the devices.
On the Operational Log there are no errors.
On the Admin Log I've got 3 events repeated from 5 to 5 minutes, events 80, 90 and 76.
Event 80 - Warning - Auto MDM Enroll DmRaiseToastNotificationAndWait Failure (Unknown Win32 Error code: 0x8018002a)
Event 90 - Information - Auto MDM Enroll Get AAD Token: Device Credential (0x0), Resource Url (https://enrollment.manage.microsoft.com/), Resource Url 2 (NULL), Status (Unknown Win32 Error code: 0x8018002a)
Event 76 - Error - Auto MDM Enroll: Device Credential (0x0), Failed (Unknown Win32 Error code: 0x8018002a).

So seems the device is not authenticating correctly in Azure AD from my little understanding. Is there any way to force it to sync with AAD or debug the reason why it's not getting an authentication in AAD?

Thanks

@dmarquesgn 

 

- Ensure Modern Auth is enabled in the Org settings under admin.microsoft.com

- Disable sec defaults

- Disable the classic per user MFA and use CA policies to enforce MFA instead

- Target all users all cloud apps all devices all locations with Grant and Require MFA via CA policy

- Exclude Break the Glass accounts (max 2 Break the glass accounts are fine) from the CA policy

- Exclude SMTP accounts from the CA policy or move SMTP traffic to a third party like SMTP2GO and then create a CA policy to block legacy auth all together in the tenant

- Disable all forms of legacy auth/basic auth the Org settings under admin.microsoft.com

- see again if Devices are now auto enrolling into Intune ~300 are quite high number and there has to be a good reason

Hi,

Thanks for the notes and tips. Some of those we are already implementing, but some of those mess with the users, so they need to be done carefully. And some might impact legacy stuff, which needs to be considered carefully.
On the meanwhile of course I would like to debug this cases so I can understand what is going on and try to fix it.

Thanks