Skip to content

Commit 8ec4c1d

Browse files
authored
Merge pull request #248900 from MicrosoftGuyJFlo/DevicesGeneralUpdates0823
[Microsoft Entra ID] Devices standardization
2 parents a79fd98 + 5187c89 commit 8ec4c1d

16 files changed

+45
-45
lines changed

articles/active-directory/devices/assign-local-admin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ To view and update the membership of the [Global Administrator](/azure/active-di
4444

4545
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4646

47-
In the Azure portal, you can manage the [Azure AD Joined Device Local Administrator](/azure/active-directory/roles/permissions-reference#azure-ad-joined-device-local-administrator) role from **Device settings**.
47+
You can manage the [Azure AD Joined Device Local Administrator](/azure/active-directory/roles/permissions-reference#azure-ad-joined-device-local-administrator) role from **Device settings**.
4848

49-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
49+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
5050
1. Browse to **Azure Active Directory** > **Devices** > **Device settings**.
5151
1. Select **Manage Additional local administrators on all Azure AD joined devices**.
5252
1. Select **Add assignments** then choose the other administrators you want to add and select **Add**.
@@ -111,5 +111,5 @@ Additionally, you can also add users using the command prompt:
111111

112112
## Next steps
113113

114-
- To get an overview of how to manage device in the Azure portal, see [managing devices using the Azure portal](manage-device-identities.md).
114+
- To get an overview of how to manage devices, see [managing devices using the Azure portal](manage-device-identities.md).
115115
- To learn more about device-based Conditional Access, see [Conditional Access: Require compliant or hybrid Azure AD joined device](../conditional-access/howto-conditional-access-policy-compliant-device.md).

articles/active-directory/devices/device-join-out-of-box.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Your device may restart several times as part of the setup process. Your device
4343
:::image type="content" source="media/device-join-out-of-box/windows-11-first-run-experience-device-sign-in-info.png" alt-text="Screenshot of Windows 11 out-of-box experience showing the sign-in experience.":::
4444
1. Continue to follow the prompts to set up your device.
4545
1. Azure AD checks if an enrollment in mobile device management is required and starts the process.
46-
1. Windows registers the device in the organization’s directory in Azure AD and enrolls it in mobile device management, if applicable.
46+
1. Windows registers the device in the organization’s directory and enrolls it in mobile device management, if applicable.
4747
1. If you sign in with a managed user account, Windows takes you to the desktop through the automatic sign-in process. Federated users are directed to the Windows sign-in screen to enter your credentials.
4848
:::image type="content" source="media/device-join-out-of-box/windows-11-first-run-experience-complete-automatic-sign-in-desktop.png" alt-text="Screenshot of Windows 11 at the desktop after first run experience Azure AD joined.":::
4949

@@ -57,7 +57,7 @@ To verify whether a device is joined to your Azure AD, review the **Access work
5757

5858
## Next steps
5959

60-
- For more information about managing devices in the Azure portal, see [managing devices using the Azure portal](manage-device-identities.md).
60+
- For more information about managing devices, see [managing devices using the Azure portal](manage-device-identities.md).
6161
- [What is Microsoft Intune?](/mem/intune/fundamentals/what-is-intune)
6262
- [Overview of Windows Autopilot](/mem/autopilot/windows-autopilot)
6363
- [Passwordless authentication options for Azure Active Directory](../authentication/concept-authentication-passwordless.md)

articles/active-directory/devices/enterprise-state-roaming-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Enterprise State Roaming provides users with a unified experience across their W
2626

2727
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
2828

29-
1. Sign in to the [Azure portal](https://portal.azure.com).
29+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
3030
1. Browse to **Azure Active Directory** > **Devices** > **Enterprise State Roaming**.
3131
1. Select **Users may sync settings and app data across devices**. For more information, see [how to configure device settings](./manage-device-identities.md).
3232

@@ -49,7 +49,7 @@ The country/region value is set as part of the Azure AD directory creation proce
4949

5050
Follow these steps to view a per-user device sync status report.
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com).
52+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
5353
1. Browse to **Azure Active Directory** > **Users** > **All users**.
5454
1. Select the user, and then select **Devices**.
5555
1. Select **View devices syncing settings and app data** to show sync status.

articles/active-directory/devices/enterprise-state-roaming-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Enterprise State Roaming requires the device to be registered with Azure AD. Alt
7070

7171
**Potential issue**: **WamDefaultSet** and **AzureAdJoined** both have “NO” in the field value, the device was domain-joined and registered with Azure AD, and the device doesn't sync. If it's showing this, the device may need to wait for policy to be applied or the authentication for the device failed when connecting to Azure AD. The user may have to wait a few hours for the policy to be applied. Other troubleshooting steps may include retrying autoregistration by signing out and back in, or launching the task in Task Scheduler. In some cases, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
7272

73-
**Potential issue**: The field for **SettingsUrl** is empty and the device doesn't sync. The user may have last logged in to the device before Enterprise State Roaming was enabled in the Azure portal. Restart the device and have the user login. Optionally, in the portal, try having the IT Admin navigate to **Azure Active Directory** > **Devices** > **Enterprise State Roaming** disable and re-enable **Users may sync settings and app data across devices**. Once re-enabled, restart the device and have the user login. If this doesn't resolve the issue, **SettingsUrl** may be empty if there's a bad device certificate. In this case, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
73+
**Potential issue**: The field for **SettingsUrl** is empty and the device doesn't sync. The user may have last logged in to the device before Enterprise State Roaming was enabled. Restart the device and have the user login. Optionally, in the portal, try having the IT Admin navigate to **Azure Active Directory** > **Devices** > **Enterprise State Roaming** disable and re-enable **Users may sync settings and app data across devices**. Once re-enabled, restart the device and have the user login. If this doesn't resolve the issue, **SettingsUrl** may be empty if there's a bad device certificate. In this case, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
7474

7575
## Enterprise State Roaming and multifactor authentication
7676

articles/active-directory/devices/faq.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ summary: |
2020
sections:
2121
- name: General FAQ
2222
questions:
23-
- question: I registered the device recently. Why can't I see the device under my user info in the Azure portal? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
23+
- question: I registered the device recently. Why can't I see the device under my user info? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
2424
answer: |
2525
Windows 10 or newer devices that are hybrid Azure AD joined don't show up under **USER devices**.
26-
Use the **All devices** view in the Azure portal. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice) cmdlet.
26+
Use the **All devices** view. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice) cmdlet.
2727
2828
Only the following devices are listed under **USER devices**:
2929
@@ -35,7 +35,7 @@ sections:
3535
3636
- question: How do I know what the device registration state of the client is?
3737
answer: |
38-
In the Azure portal, go to **All devices**. Search for the device by using the device ID. Check the value under the join type column. Sometimes, the device might be reset or reimaged. So it's essential to also check the device registration state on the device:
38+
Go to **All devices**. Search for the device by using the device ID. Check the value under the join type column. Sometimes, the device might be reset or reimaged. So it's essential to also check the device registration state on the device:
3939
4040
- For Windows 10 or newer and Windows Server 2016 or later devices, run `dsregcmd.exe /status`.
4141
- For down-level OS versions, run `%programFiles%\Microsoft Workplace Join\autoworkplace.exe`.
@@ -47,7 +47,7 @@ sections:
4747
4848
4949
50-
- question: I see the device record under the USER info in the Azure portal. And I see the state as registered on the device. Am I set up correctly to use Conditional Access?
50+
- question: I see the device record under the USER info and I see the state as registered. Am I set up correctly to use Conditional Access?
5151
answer: |
5252
The device join state, shown by **deviceID**, must match the state on Azure AD and meet any evaluation criteria for Conditional Access.
5353
For more information, see [Require managed devices for cloud app access with Conditional Access](../conditional-access/concept-conditional-access-grant.md).
@@ -59,15 +59,15 @@ sections:
5959
On Windows 10/11 devices joined or registered with Azure AD, users are issued a [Primary refresh token (PRT)](concept-primary-refresh-token.md) which enables single sign-on. The validity of the PRT is based on the validity of the device itself. Users see this message if the device is either deleted or disabled in Azure AD without initiating the action from the device itself. A device can be deleted or disabled in Azure AD one of the following scenarios:
6060
6161
- User disables the device from the My Apps portal.
62-
- An administrator (or user) deletes or disables the device in the Azure portal or by using PowerShell
63-
- Hybrid Azure AD joined only: An administrator removes the devices OU out of sync scope resulting in the devices being deleted from Azure AD
64-
- Hybrid Azure AD joined only: An administrator disables the computer account on premises, resulting in the device being disabled in Azure AD
62+
- An administrator (or user) deletes or disables the device.
63+
- Hybrid Azure AD joined only: An administrator removes the devices OU out of sync scope resulting in the devices being deleted from Azure AD.
64+
- Hybrid Azure AD joined only: An administrator disables the computer account on premises, resulting in the device being disabled in Azure AD.
6565
- Upgrading Azure AD connect to the version 1.4.xx.x. [Understanding Azure AD Connect 1.4.xx.x and device disappearance](/troubleshoot/azure/active-directory/reference-connect-device-disappearance).
6666
6767
6868
6969
70-
- question: I disabled or deleted my device in the Azure portal or by using Windows PowerShell. But the local state on the device says it's still registered. What should I do?
70+
- question: I disabled or deleted my device, but the local state on the device says it's still registered. What should I do?
7171
answer: |
7272
This operation is by design. In this case, the device doesn't have access to resources in the cloud. Administrators can perform this action for stale, lost, or stolen devices to prevent unauthorized access. If this action was performed unintentionally, you need to re-enable or re-register the device using the steps that follow:
7373
@@ -104,7 +104,7 @@ sections:
104104
105105
106106
107-
- question: Why do I see duplicate device entries in the Azure portal?
107+
- question: Why do I see duplicate device entries?
108108
answer: |
109109
- For Windows 10 or newer and Windows Server 2016 or later, repeated tries to unjoin and rejoin the same device might cause duplicate entries.
110110
- Each Windows user who uses **Add Work or School Account** creates a new device record with the same device name.
@@ -116,7 +116,7 @@ sections:
116116
- question: Does Windows 10/11 device registration in Azure AD support TPMs in FIPS mode?
117117
answer: Windows 10/11 device registration is only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Microsoft doesn't provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Contact your hardware OEM for support.
118118

119-
- question: Why can a user still access resources from a device I disabled in the Azure portal?
119+
- question: Why can a user still access resources from a device I disabled?
120120
answer: |
121121
It takes up to an hour for a revoke to be applied from the time the Azure AD device is marked as disabled.
122122
@@ -161,7 +161,7 @@ sections:
161161
162162
- question: Can a guest user sign in to an Azure AD joined device?
163163
answer: |
164-
No, currently, guest users can not sign in to an Azure AD joined device.
164+
No, currently, guest users can't sign in to an Azure AD joined device.
165165
166166
167167

articles/active-directory/devices/how-to-hybrid-join-verify.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ For downlevel devices, see the article [Troubleshooting hybrid Azure Active Dire
3131

3232
## Using the Azure portal
3333

34-
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
35-
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](./manage-device-identities.md).
36-
3. If the **Registered** column says **Pending**, then hybrid Azure AD join hasn't completed. In federated environments, this state happens only if it failed to register and Azure AD Connect is configured to sync the devices. Wait for Azure AD Connect to complete a sync cycle.
37-
4. If the **Registered** column contains a **date/time**, then hybrid Azure AD join has completed.
34+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
35+
1. Browse to **Azure Active Directory** > **Devices** > **All devices**.
36+
1. If the **Registered** column says **Pending**, then hybrid Azure AD join hasn't completed. In federated environments, this state happens only if it failed to register and Azure AD Connect is configured to sync the devices. Wait for Azure AD Connect to complete a sync cycle.
37+
1. If the **Registered** column contains a **date/time**, then hybrid Azure AD join has completed.
3838

3939
## Using PowerShell
4040

articles/active-directory/devices/howto-manage-local-admin-passwords.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Other than the built-in Azure AD roles of Cloud Device Administrator, Intune Adm
8585

8686
To enable Windows LAPS with Azure AD, you must take actions in Azure AD and the devices you wish to manage. We recommend organizations [manage Windows LAPS using Microsoft Intune](/mem/intune/protect/windows-laps-policy). However, if your devices are Azure AD joined but you're not using Microsoft Intune or Microsoft Intune isn't supported (like for Windows Server 2019/2022), you can still deploy Windows LAPS for Azure AD manually. For more information, see the article [Configure Windows LAPS policy settings](/windows-server/identity/laps/laps-management-policy-settings).
8787

88-
1. Sign in to the **Azure portal** as a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
88+
1. Sign in to the **Azure portal** as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
8989
1. Browse to **Azure Active Directory** > **Devices** > **Device settings**
9090
1. Select **Yes** for the Enable Local Administrator Password Solution (LAPS) setting and select **Save**. You may also use the Microsoft Graph API [Update deviceRegistrationPolicy](/graph/api/deviceregistrationpolicy-update?view=graph-rest-beta&preserve-view=true).
9191
1. Configure a client-side policy and set the **BackUpDirectory** to be Azure AD.

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ To configure role assignments for your Azure AD-enabled Linux VMs:
209209
| Role | **Virtual Machine Administrator Login** or **Virtual Machine User Login** |
210210
| Assign access to | User, group, service principal, or managed identity |
211211

212-
![Screenshot that shows the page for adding a role assignment in the Azure portal.](../../../includes/role-based-access-control/media/add-role-assignment-page.png)
212+
![Screenshot that shows the page for adding a role assignment.](../../../includes/role-based-access-control/media/add-role-assignment-page.png)
213213

214214
After a few moments, the security principal is assigned the role at the selected scope.
215215

@@ -267,7 +267,7 @@ The application that appears in the Conditional Access policy is called *Azure L
267267

268268
If the Azure Linux VM Sign-In application is missing from Conditional Access, make sure the application isn't in the tenant:
269269

270-
1. Sign in to the [Azure portal](https://portal.azure.com).
270+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
271271
1. Browse to **Azure Active Directory** > **Enterprise applications**.
272272
1. Remove the filters to see all applications, and search for **Virtual Machine**. If you don't see Microsoft Azure Linux Virtual Machine Sign-In as a result, the service principal is missing from the tenant.
273273

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ To configure role assignments for your Azure AD-enabled Windows Server 2019 Data
203203
| Role | **Virtual Machine Administrator Login** or **Virtual Machine User Login** |
204204
| Assign access to | User, group, service principal, or managed identity |
205205

206-
![Screenshot that shows the page for adding a role assignment in the Azure portal.](../../../includes/role-based-access-control/media/add-role-assignment-page.png)
206+
![Screenshot that shows the page for adding a role assignment.](../../../includes/role-based-access-control/media/add-role-assignment-page.png)
207207

208208
### Azure Cloud Shell
209209

@@ -369,7 +369,7 @@ Exit code -2145648607 translates to `DSREG_AUTOJOIN_DISC_FAILED`. The extension
369369
- `curl https://pas.windows.net/ -D -`
370370

371371
> [!NOTE]
372-
> Replace `<TenantID>` with the Azure AD tenant ID that's associated with the Azure subscription. If you need to find the tenant ID, you can hover over your account name or select **Azure Active Directory** > **Properties** > **Directory ID** in the Azure portal.
372+
> Replace `<TenantID>` with the Azure AD tenant ID that's associated with the Azure subscription. If you need to find the tenant ID, you can hover over your account name or select **Azure Active Directory** > **Properties** > **Directory ID**.
373373
>
374374
> Attempts to connect to `enterpriseregistration.windows.net` might return 404 Not Found, which is expected behavior. Attempts to connect to `pas.windows.net` might prompt for PIN credentials or might return 404 Not Found. (You don't need to enter the PIN.) Either one is sufficient to verify that the URL is reachable.
375375
@@ -469,7 +469,7 @@ Share your feedback about this feature or report problems with using it on the [
469469

470470
If the Azure Windows VM Sign-In application is missing from Conditional Access, make sure that the application is in the tenant:
471471

472-
1. Sign in to the [Azure portal](https://portal.azure.com).
472+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
473473
1. Browse to **Azure Active Directory** > **Enterprise applications**.
474474
1. Remove the filters to see all applications, and search for **VM**. If you don't see **Azure Windows VM Sign-In** as a result, the service principal is missing from the tenant.
475475

0 commit comments

Comments
 (0)