Skip to content

Commit 4de44f7

Browse files
Header, Numbers, and image
- Updated the header to be accurate "joined" - Changed to "Potential cause #1" and "Potential cause #2" - Updated with a link to the image
1 parent 2ecefd4 commit 4de44f7

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

windows-365/enterprise/connection-errors.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,10 @@ ms.collection: M365-identity-device-management
3232

3333
The following errors can occur when connecting to a Cloud PC.
3434

35-
## Errors when connecting to an Azure AD join Cloud PC
35+
## Errors when connecting to an Azure AD joined Cloud PC
3636

3737
### The logon attempt failed
38-
**Potential cause**: The Cloud PC VM is denying PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
38+
**Potential cause #1**: The Cloud PC VM is denying PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
3939

4040
- The Cloud PC is Azure AD joined.
4141
- The user is connecting from the Windows desktop client.
@@ -46,13 +46,13 @@ The following errors can occur when connecting to a Cloud PC.
4646
1. [Create a filter for all Cloud PCs](create-filter).
4747
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog.md).
4848
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests**, then select **Allow**.
49-
![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/allow-pku2u.png)
49+
![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/connection-errors/allow-pku2u.png)
5050
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
5151
6. Complete the creation of the device configuration policy.
5252

53-
**Potential cause**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is enabled for the user account. Per-user multi-factor authentication is not supported for users connecting to Azure AD joined Cloud PCs since it blocks login.
53+
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is enabled for the user account. Per-user multi-factor authentication is not supported for users connecting to Azure AD joined Cloud PCs since it blocks login.
5454

55-
**Possible solution**: Disable per-user multi-factor authentication for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies) and assign it to the appropriate users.
55+
**Possible solution**: [Disable per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies) and assign it to the appropriate users.
5656

5757
## Specific connection errors
5858

0 commit comments

Comments
 (0)