Skip to content

Commit 2e6525a

Browse files
WIP
1 parent 9c90985 commit 2e6525a

File tree

5 files changed

+48
-49
lines changed

5 files changed

+48
-49
lines changed

articles/active-directory/devices/azureadjoin-plan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ Starting Windows 10 2004 update, users can also use remote desktop from an Azure
190190
Currently, Azure AD joined devices don't support RADIUS authentication for connecting to Wi-Fi access points, since RADIUS relies on presence of an on-premises computer object. As an alternative, you can use certificates pushed via Intune or user credentials to authenticate to Wi-Fi.
191191

192192
## Understand your provisioning options
193-
**Note**: Azure AD joined devices cannot be deployed using System Preparation Tool (Sysprep) or similar imaging tools
193+
**Note**: Azure AD joined devices can’t be deployed using System Preparation Tool (Sysprep) or similar imaging tools
194194

195195
You can provision Azure AD joined devices using the following approaches:
196196

@@ -209,7 +209,7 @@ Here’s a comparison of these three approaches
209209
| Require device OEM support | No | Yes | No |
210210
| Supported versions | 1511+ | 1709+ | 1703+ |
211211

212-
Choose your deployment approach or approaches by reviewing the table above and reviewing the following considerations for adopting either approach:
212+
Choose your deployment approach or approaches by reviewing the previous table and reviewing the following considerations for adopting either approach:
213213

214214
- Are your users tech savvy to go through the setup themselves?
215215
- Self-service can work best for these users. Consider Windows Autopilot to enhance the user experience.

articles/active-directory/devices/howto-hybrid-azure-ad-join.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Hybrid Azure AD join requires devices to have access to the following Microsoft
4444
4545
If your organization requires access to the internet via an outbound proxy, you can use [Web Proxy Auto-Discovery (WPAD)](/previous-versions/tn-archive/cc995261(v=technet.10)) to enable Windows 10 computers for device registration with Azure AD. To address issues configuring and managing WPAD, see [Troubleshooting Automatic Detection](/previous-versions/tn-archive/cc302643(v=technet.10)).
4646

47-
If you don't use WPAD, you can configure WinHTTP proxy settings on your computer beginning with Windows 10 1709. For more information, see [WinHTTP Proxy Settings deployed by GPO](/archive/blogs/netgeeks/winhttp-proxy-settings-deployed-by-gpo).
47+
If you don't use WPAD, you can configure WinHTTP proxy settings on your computer with a Group Policy Object (GPO) beginning with Windows 10 1709. For more information, see [WinHTTP Proxy Settings deployed by GPO](/archive/blogs/netgeeks/winhttp-proxy-settings-deployed-by-gpo).
4848

4949
> [!NOTE]
5050
> If you configure proxy settings on your computer by using WinHTTP settings, any computers that can't connect to the configured proxy will fail to connect to the internet.
@@ -119,7 +119,7 @@ With Windows 10 1803 or newer, if instantaneous hybrid Azure AD join for a feder
119119

120120
## Other scenarios
121121

122-
Organizations who may wish to test hybrid Azure AD join on a subset of their environment before a full rollout, the steps to complete a targeted deployment can be found in the article [Hybrid Azure AD join targeted deployment](hybrid-azuread-join-control.md).
122+
Organizations can test hybrid Azure AD join on a subset of their environment before a full rollout. The steps to complete a targeted deployment can be found in the article [Hybrid Azure AD join targeted deployment](hybrid-azuread-join-control.md). Organizations should include a sample of users from varying roles and profiles in this pilot group. A targeted rollout will help identify any issues your plan may not have addressed before you enable for the entire organization.
123123

124124
Some organizations may not be able to use Azure AD Connect to configure AD FS, the steps to configure the claims manually can be found in the article [Configure hybrid Azure Active Directory join manually](hybrid-azuread-join-manual.md).
125125

articles/active-directory/devices/hybrid-azuread-join-control.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ For devices running Windows 10, the minimum supported version is Windows 10 (ver
2525

2626
To do a targeted deployment of hybrid Azure AD join on Windows current devices, you need to:
2727

28-
1. Clear the Service Connection Point (SCP) entry from Active Directory (AD) if it exists
29-
1. Configure client-side registry setting for SCP on your domain-joined computers using a Group Policy Object (GPO)
30-
1. If you're using Active Directory Federation Services (AD FS), you must also configure the client-side registry setting for SCP on your AD FS server using a GPO
28+
1. Clear the Service Connection Point (SCP) entry from Active Directory (AD) if it exists.
29+
1. Configure client-side registry setting for SCP on your domain-joined computers using a Group Policy Object (GPO).
30+
1. If you're using Active Directory Federation Services (AD FS), you must also configure the client-side registry setting for SCP on your AD FS server using a GPO.
3131
1. You may also need to [customize synchronization options](../hybrid/how-to-connect-post-installation.md#additional-tasks-available-in-azure-ad-connect) in Azure AD Connect to enable device synchronization.
3232

3333
### Clear the SCP from AD
@@ -36,43 +36,43 @@ Use the Active Directory Services Interfaces Editor (ADSI Edit) to modify the SC
3636

3737
1. Launch the **ADSI Edit** desktop application from and administrative workstation or a domain controller as an Enterprise Administrator.
3838
1. Connect to the **Configuration Naming Context** of your domain.
39-
1. Browse to **CN=Configuration,DC=contoso,DC=com** > **CN=Services** > **CN=Device Registration Configuration**
40-
1. Right-click on the leaf object **CN=62a0ff2e-97b9-4513-943f-0d221bd30080** and select **Properties**
41-
1. Select **keywords** from the **Attribute Editor** window and select **Edit**
42-
1. Select the values of **azureADId** and **azureADName** (one at a time) and select **Remove**
43-
1. Close **ADSI Edit**
39+
1. Browse to **CN=Configuration,DC=contoso,DC=com** > **CN=Services** > **CN=Device Registration Configuration**.
40+
1. Right-click on the leaf object **CN=62a0ff2e-97b9-4513-943f-0d221bd30080** and select **Properties**.
41+
1. Select **keywords** from the **Attribute Editor** window and select **Edit**.
42+
1. Select the values of **azureADId** and **azureADName** (one at a time) and select **Remove**.
43+
1. Close **ADSI Edit**.
4444

4545
### Configure client-side registry setting for SCP
4646

4747
Use the following example to create a Group Policy Object (GPO) to deploy a registry setting configuring an SCP entry in the registry of your devices.
4848

4949
1. Open a Group Policy Management console and create a new Group Policy Object in your domain.
5050
1. Provide your newly created GPO a name (for example, ClientSideSCP).
51-
1. Edit the GPO and locate the following path: **Computer Configuration** > **Preferences** > **Windows Settings** > **Registry**
52-
1. Right-click on the Registry and select **New** > **Registry Item**
53-
1. On the **General** tab, configure the following
54-
1. Action: **Update**
55-
1. Hive: **HKEY_LOCAL_MACHINE**
56-
1. Key Path: **SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD**
57-
1. Value name: **TenantId**
58-
1. Value type: **REG_SZ**
59-
1. Value data: The GUID or **Tenant ID** of your Azure AD instance (This value can be found in the **Azure portal** > **Azure Active Directory** > **Properties** > **Tenant ID**)
60-
1. Select **OK**
61-
1. Right-click on the Registry and select **New** > **Registry Item**
62-
1. On the **General** tab, configure the following
63-
1. Action: **Update**
64-
1. Hive: **HKEY_LOCAL_MACHINE**
65-
1. Key Path: **SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD**
66-
1. Value name: **TenantName**
67-
1. Value type: **REG_SZ**
68-
1. Value data: Your verified **domain name** if you're using federated environment such as AD FS. Your verified **domain name** or your onmicrosoft.com domain name for example, `contoso.onmicrosoft.com` if you're using managed environment
69-
1. Select **OK**
70-
1. Close the editor for the newly created GPO
71-
1. Link the newly created GPO to the correct OU containing domain-joined computers that belong to your controlled rollout population
51+
1. Edit the GPO and locate the following path: **Computer Configuration** > **Preferences** > **Windows Settings** > **Registry**.
52+
1. Right-click on the Registry and select **New** > **Registry Item**.
53+
1. On the **General** tab, configure the following.
54+
1. Action: **Update**.
55+
1. Hive: **HKEY_LOCAL_MACHINE**.
56+
1. Key Path: **SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD**.
57+
1. Value name: **TenantId**.
58+
1. Value type: **REG_SZ**.
59+
1. Value data: The GUID or **Tenant ID** of your Azure AD instance (This value can be found in the **Azure portal** > **Azure Active Directory** > **Properties** > **Tenant ID**).
60+
1. Select **OK**.
61+
1. Right-click on the Registry and select **New** > **Registry Item**.
62+
1. On the **General** tab, configure the following.
63+
1. Action: **Update**.
64+
1. Hive: **HKEY_LOCAL_MACHINE**.
65+
1. Key Path: **SOFTWARE\Microsoft\Windows\CurrentVersion\CDJ\AAD**.
66+
1. Value name: **TenantName**.
67+
1. Value type: **REG_SZ**.
68+
1. Value data: Your verified **domain name** if you're using federated environment such as AD FS. Your verified **domain name** or your onmicrosoft.com domain name, for example `contoso.onmicrosoft.com` if you're using managed environment.
69+
1. Select **OK**.
70+
1. Close the editor for the newly created GPO.
71+
1. Link the newly created GPO to the correct OU containing domain-joined computers that belong to your controlled rollout population.
7272

7373
### Configure AD FS settings
7474

75-
If you're using AD FS, you first need to configure client-side SCP using the instructions mentioned above by linking the GPO to your AD FS servers. The SCP object defines the source of authority for device objects. It can be on-premises or Azure AD. When client-side SCP is configured for AD FS, the source for device objects is established as Azure AD.
75+
If you're using AD FS, you first need to configure client-side SCP using the instructions mentioned earlier by linking the GPO to your AD FS servers. The SCP object defines the source of authority for device objects. It can be on-premises or Azure AD. When client-side SCP is configured for AD FS, the source for device objects is established as Azure AD.
7676

7777
> [!NOTE]
7878
> If you failed to configure client-side SCP on your AD FS servers, the source for device identities would be considered as on-premises. ADFS will then start deleting device objects from on-premises directory after the stipulated period defined in the ADFS Device Registration's attribute "MaximumInactiveDays". ADFS Device Registration objects can be found using the [Get-AdfsDeviceRegistration cmdlet](/powershell/module/adfs/get-adfsdeviceregistration).

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -65,10 +65,10 @@ For devices running the Windows desktop operating system, supported versions are
6565
### Windows down-level devices
6666

6767
- Windows 8.1
68-
- Windows 7 support ended on January 14, 2020. For more information, see [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020).
68+
- Windows 7 support ended on January 14, 2020. For more information, see [Support for Windows 7 has ended](https://support.microsoft.com/en-us/help/4057281/windows-7-support-ended-on-january-14-2020)
6969
- Windows Server 2012 R2
7070
- Windows Server 2012
71-
- Windows Server 2008 R2. For support information on Windows Server 2008 and 2008 R2, see [Prepare for Windows Server 2008 end of support](https://www.microsoft.com/cloud-platform/windows-server-2008).
71+
- Windows Server 2008 R2 for support information on Windows Server 2008 and 2008 R2, see [Prepare for Windows Server 2008 end of support](https://www.microsoft.com/cloud-platform/windows-server-2008)
7272

7373
As a first planning step, you should review your environment and determine whether you need to support Windows down-level devices.
7474

@@ -87,16 +87,16 @@ As a first planning step, you should review your environment and determine wheth
8787

8888
- If you're relying on a Virtual Machine (VM) snapshot to create more VMs, make sure that snapshot isn't from a VM that is already registered with Azure AD as hybrid Azure AD joined.
8989

90-
- If you're using [Unified Write Filter](/windows-hardware/customize/enterprise/unified-write-filter) and similar technologies that clear changes to the disk at reboot, they must be applied after the device is hybrid Azure AD joined. Enabling such technologies before completion of hybrid Azure AD join will result in the device getting unjoined on every reboot
90+
- If you're using [Unified Write Filter](/windows-hardware/customize/enterprise/unified-write-filter) and similar technologies that clear changes to the disk at reboot, they must be applied after the device is hybrid Azure AD joined. Enabling such technologies before completion of hybrid Azure AD join will result in the device getting unjoined on every reboot.
9191

9292
### Handling devices with Azure AD registered state
9393

94-
If your Windows 10 domain joined devices are [Azure AD registered](concept-azure-ad-register.md) to your tenant, it could lead to a dual state of hybrid Azure AD joined and Azure AD registered device. We recommend upgrading to Windows 10 1803 (with KB4489894 applied) or above to automatically address this scenario. In pre-1803 releases, you'll need to remove the Azure AD registered state manually before enabling hybrid Azure AD join. In 1803 and above releases, the following changes have been made to avoid this dual state:
94+
If your Windows 10 domain joined devices are [Azure AD registered](concept-azure-ad-register.md) to your tenant, it could lead to a dual state of hybrid Azure AD joined and Azure AD registered device. We recommend upgrading to Windows 10 1803 (with KB4489894 applied) or newer to automatically address this scenario. In pre-1803 releases, you'll need to remove the Azure AD registered state manually before enabling hybrid Azure AD join. In 1803 and above releases, the following changes have been made to avoid this dual state:
9595

9696
- Any existing Azure AD registered state for a user would be automatically removed <i>after the device is hybrid Azure AD joined and the same user logs in</i>. For example, if User A had an Azure AD registered state on the device, the dual state for User A is cleaned up only when User A logs in to the device. If there are multiple users on the same device, the dual state is cleaned up individually when those users log in. After removing the Azure AD registered state, Windows 10 will unenroll the device from Intune or other MDM, if the enrollment happened as part of the Azure AD registration via auto-enrollment.
97-
- Azure AD registered state on any local accounts on the device is not impacted by this change. Only applicable to domain accounts. Azure AD registered state on local accounts isn't removed automatically even after user logon, since the user isn't a domain user.
97+
- Azure AD registered state on any local accounts on the device isn’t impacted by this change. Only applicable to domain accounts. Azure AD registered state on local accounts isn't removed automatically even after user logon, since the user isn't a domain user.
9898
- You can prevent your domain joined device from being Azure AD registered by adding the following registry value to HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin: "BlockAADWorkplaceJoin"=dword:00000001.
99-
- In Windows 10 1803, if you have Windows Hello for Business configured, the user needs to reconfigure Windows Hello for Business after the dual state cleanup. This issue has been addressed with KB4512509
99+
- In Windows 10 1803, if you have Windows Hello for Business configured, the user needs to reconfigure Windows Hello for Business after the dual state cleanup. This issue has been addressed with KB4512509.
100100

101101
> [!NOTE]
102102
> Even though Windows 10 automatically removes the Azure AD registered state locally, the device object in Azure AD is not immediately deleted if it is managed by Intune. You can validate the removal of Azure AD registered state by running dsregcmd /status and consider the device not to be Azure AD registered based on that.
@@ -139,9 +139,8 @@ A managed environment can be deployed either through [Password Hash Sync (PHS)](
139139
These scenarios don't require you to configure a federation server for authentication.
140140

141141
> [!NOTE]
142-
> [Cloud authentication using Staged rollout](../hybrid/how-to-connect-staged-rollout.md) is only supported starting Windows 10 1903 update
143-
144-
> [!NOTE]
142+
> [Cloud authentication using Staged rollout](../hybrid/how-to-connect-staged-rollout.md) is only supported starting at the Windows 10 1903 update.
143+
>
145144
> Azure AD doesn't support smartcards or certificates in managed domains.
146145
147146
### Federated environment
@@ -167,13 +166,13 @@ Beginning with version 1.1.819.0, Azure AD Connect provides you with a wizard to
167166

168167
Sometimes, on-premises AD users UPNs are different from your Azure AD UPNs. In these cases, Windows 10 hybrid Azure AD join provides limited support for on-premises AD UPNs based on the [authentication method](../hybrid/choose-ad-authn.md), domain type, and Windows 10 version. There are two types of on-premises AD UPNs that can exist in your environment:
169168

170-
- Routable users UPN: A routable UPN has a valid verified domain, that is registered with a domain registrar. For example, if contoso.com is the primary domain in Azure AD, contoso.org is the primary domain in on-premises AD owned by Contoso and [verified in Azure AD](../fundamentals/add-custom-domain.md)
169+
- Routable users UPN: A routable UPN has a valid verified domain, that is registered with a domain registrar. For example, if contoso.com is the primary domain in Azure AD, contoso.org is the primary domain in on-premises AD owned by Contoso and [verified in Azure AD](../fundamentals/add-custom-domain.md).
171170
- Non-routable users UPN: A non-routable UPN doesn't have a verified domain and is applicable only within your organization's private network. For example, if contoso.com is the primary domain in Azure AD and contoso.local is the primary domain in on-premises AD but isn't a verifiable domain in the internet and only used within Contoso's network.
172171

173172
> [!NOTE]
174173
> The information in this section applies only to an on-premises users UPN. It isn't applicable to an on-premises computer domain suffix (example: computer1.contoso.local).
175174
176-
The table below provides details on support for these on-premises AD UPNs in Windows 10 hybrid Azure AD join
175+
The following table provides details on support for these on-premises AD UPNs in Windows 10 hybrid Azure AD join
177176

178177
| Type of on-premises AD UPN | Domain type | Windows 10 version | Description |
179178
| ----- | ----- | ----- | ----- |

0 commit comments

Comments
 (0)