Skip to content

Commit bd91cc7

Browse files
committed
Merge branch 'main' into release-ga-purview-policy
2 parents aafc463 + 2e7355d commit bd91cc7

File tree

129 files changed

+2527
-1730
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+2527
-1730
lines changed

articles/active-directory/authentication/concept-authentication-strengths.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -205,15 +205,14 @@ An authentication strength Conditional Access policy works together with [MFA tr
205205
- Email one-time pass (Guest)
206206
- Hardware-based OATH token
207207

208-
- **Conditional Access What-if tool** – When running the what-if tool, it will return policies that require authentication strength correctly. However, when clicking on the authentication strength name, a name page is open with additional information about the methods the user can use. This information may be incorrect.
209-
210208
- **Authentication strength is not enforced on Register security information user action** – If an Authentication strength Conditional Access policy targets **Register security information** user action, the policy would not apply.
211209

212-
- **Conditional Access audit log** – When a Conditional Access policy with the authentication strength grant control is created or updated in the Azure AD portal, the auditing log includes details about the policy that was updated, but doesn't include the details about which authentication strength is referenced by the Conditional Access policy. This issue doesn't exist when a policy is created or updated By using Microsoft Graph APIs.
213-
214210
- **Using 'Require one of the selected controls' with 'require authentication strength' control** - After you select authentication strengths grant control and additional controls, all the selected controls must be satisfied in order to gain access to the resource. Using **Require one of the selected controls** isn't applicable, and will default to requiring all the controls in the policy.
215211

216-
- **Authentication loop** - when the user is required to use Microsoft Authenticator (Phone Sign-in) but the user is not registered for this method, they will be given instructions on how to set up the Microsoft Authenticator, that does not include how to enable Passwordless sign-in. As a result, the user can get into an authentication loop. To avoid this issue, make sure the user is registered for the method before the Conditional Access policy is enforced. Phone Sign-in can be registered using the steps outlined here: [Add your work or school account to the Microsoft Authenticator app](https://support.microsoft.com/en-us/account-billing/add-your-work-or-school-account-to-the-microsoft-authenticator-app-43a73ab5-b4e8-446d-9e54-2a4cb8e4e93c)
212+
- **Authentication loop** can happen in one of the following scenarios:
213+
1. **Microsoft Authenticator (Phone Sign-in)** - When the user is required to use Microsoft Authenticator (Phone Sign-in) but the user is not registered for this method, they will be given instructions on how to set up the Microsoft Authenticator, that does not include how to enable Passwordless sign-in. As a result, the user can get into an authentication loop. To avoid this issue, make sure the user is registered for the method before the Conditional Access policy is enforced. Phone Sign-in can be registered using the steps outlined here: [Add your work or school account to the Microsoft Authenticator app ("Sign in with your credentials")](https://support.microsoft.com/en-us/account-billing/add-your-work-or-school-account-to-the-microsoft-authenticator-app-43a73ab5-b4e8-446d-9e54-2a4cb8e4e93c)
214+
2. **Conditional Access Policy is targeting all apps** - When the Conditional Access policy is targeting "All apps" but the user is not registered for any of the methods required by the authentication strength, the user will get into an authentication loop. To avoid this issue, target specific applications in the Conditional Access policy or make sure the user is registered for at least one of the authentication methods required by the authentication strength Conditional Access policy.
215+
217216

218217
## Limitations
219218

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 10/21/2022
7+
ms.date: 10/27/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -43,7 +43,9 @@ Number matching is available for the following scenarios. When enabled, all scen
4343
>[!NOTE]
4444
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
4545
46-
Number matching is available for sign-in for Azure Government. It's available for combined registration two weeks after General Availability. Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
46+
Number matching is available for sign-in for Azure Government. However, it's currently not available for Authenticator setup in combined registration. Number matching will be available for Authenticator setup in [combined registration](howto-registration-mfa-sspr-combined.md) by November 30, 2022 for Azure Government.
47+
48+
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
4749

4850
### Multifactor authentication
4951

@@ -57,7 +59,7 @@ During self-service password reset, the Authenticator app notification will show
5759

5860
### Combined registration
5961

60-
When a user goes through combined registration to set up the Authenticator app, the user is asked to approve a notification as part of adding the account. For users who are enabled for number matching, this notification will show a number that they need to type in their Authenticator app notification. Number matching will be available for combined registration in Azure Government two weeks after General Availability.
62+
When a user goes through combined registration to set up the Authenticator app, the user is asked to approve a notification as part of adding the account. For users who are enabled for number matching, this notification will show a number that they need to type in their Authenticator app notification. Number matching will be available for Authenticator setup in combined registration in Azure Government by November 30, 2022.
6163

6264
### AD FS adapter
6365

articles/active-directory/devices/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,13 +53,15 @@
5353
- name: Troubleshoot hybrid Azure AD joined Windows current version
5454
href: troubleshoot-hybrid-join-windows-current.md
5555
- name: Troubleshoot pending device state
56-
href: /troubleshoot/azure/active-directory/pending-devices
56+
href: /troubleshoot/azure/active-directory/pending-devices?toc=/azure/active-directory/fundamentals/toc.json
5757
- name: Troubleshoot using dsregcmd
5858
href: troubleshoot-device-dsregcmd.md
5959
- name: Troubleshoot hybrid Azure AD joined down level Windows devices
6060
href: troubleshoot-hybrid-join-windows-legacy.md
6161
- name: Manage device identities
6262
href: device-management-azure-portal.md
63+
- name: Troubleshooting Windows devices
64+
href: troubleshoot-device-windows-joined.md
6365
- name: Manage stale devices
6466
href: manage-stale-devices.md
6567
- name: Azure Linux VMs and Azure AD
Loading
217 KB
Loading
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Troubleshoot registered, hybrid, and Azure AD joined Windows machines
3+
description: This article helps you troubleshoot hybrid Azure Active Directory-joined Windows 10 and Windows 11 devices
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: devices
8+
ms.topic: troubleshooting
9+
ms.date: 08/29/2022
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: amycolannino
14+
ms.reviewer: jogro
15+
---
16+
# Troubleshooting Windows devices in Azure AD
17+
18+
If you have a Windows 11 or Windows 10 device that isn't working with Azure Active Directory (Azure AD) correctly, start your troubleshooting here.
19+
20+
1. Sign in to the **Azure portal**.
21+
1. Browse to **Azure Active Directory** > **Devices** > **Diagnose and solve problems**.
22+
1. Select **Troubleshoot** under the **Windows 10+ related issue** troubleshooter.
23+
:::image type="content" source="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows.png" alt-text="A screenshot showing the Windows troubleshooter located in the diagnose and solve pane of the Azure portal." lightbox="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows.png":::
24+
1. Select **instructions** and follow the steps to download, run, and collect the required logs for the troubleshooter to analyze.
25+
1. Return to the Azure portal when you've collected and zipped the `authlogs` folder and contents.
26+
1. Select **Browse** and choose the zip file you wish to upload.
27+
:::image type="content" source="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows-upload.png" alt-text="A screenshot showing how to browse to select the logs gathered in the previous step to allow the troubleshooter to make recommendations." lightbox="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows-upload.png":::
28+
29+
The troubleshooter will review the contents of the file you uploaded and provide suggested next steps. These next steps may include links to documentation or contacting support for further assistance.
30+
31+
## Next steps
32+
33+
- [Troubleshoot devices by using the dsregcmd command](troubleshoot-device-dsregcmd.md)
34+
- [Troubleshoot hybrid Azure AD-joined devices](troubleshoot-hybrid-join-windows-current.md)
35+
- [Troubleshooting hybrid Azure Active Directory joined down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
36+
- [Troubleshoot pending device state](/troubleshoot/azure/active-directory/pending-devices)
37+
- [MDM enrollment of Windows 10-based devices](/windows/client-management/mdm/mdm-enrollment-of-windows-devices)
38+
- [Troubleshooting Windows device enrollment errors in Intune](/troubleshoot/mem/intune/troubleshoot-windows-enrollment-errors)

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: troubleshooting
9-
ms.date: 02/15/2022
9+
ms.date: 08/29/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -508,7 +508,7 @@ Use Event Viewer to look for the log entries that are logged by the Azure AD Clo
508508
> [!NOTE]
509509
> When you're collecting network traces, it's important to *not* use Fiddler during repro.
510510
511-
1. Run `netsh trace start scenario=internetClient_dbg capture=yes persistent=yes`.
511+
1. Run `netsh trace start scenario=internetClient_dbg capture=yes persistent=yes`.
512512
1. Lock and unlock the device. For hybrid-joined devices, wait a minute or more to allow the PRT acquisition task to finish.
513513
1. Run `netsh trace stop`.
514514
1. Share the *nettrace.cab* file with Support.

0 commit comments

Comments
 (0)