Skip to content

Commit 8597a76

Browse files
Updating errors to be more specific on W365 errors page
1 parent 2e89611 commit 8597a76

1 file changed

Lines changed: 17 additions & 4 deletions

File tree

windows-365/enterprise/connection-errors.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,12 +34,25 @@ The following errors can occur when connecting to a Cloud PC.
3434

3535
## Errors when connecting to an Azure AD join Cloud PC
3636

37-
**Potential cause**: Possible causes for connection errors include:
37+
### The logon attempt failed
38+
**Potential cause**: The Cloud PC VM is denying PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
3839

39-
- Windows sign-in works directly against Azure AD, potentially triggering Azure AD authentication controls.
40-
- Sign-in attempts from the Windows desktop client to a Cloud PC use a different protocol, called PKU2U.
40+
- The Cloud PC is Azure AD joined.
41+
- The user is connecting from the Windows desktop client.
42+
- The user's physical device is either Azure AD registered, Azure AD joined, or Hybrid Azure AD joined to the same organization as the Cloud PC.
4143

42-
**Possible solution**: Follow the guidance to [troubleshoot connections to Azure AD joined VMs](/azure/virtual-desktop/troubleshoot-azure-ad-connections?context=/windows-365/context/pr-context).
44+
**Possible solution**: Enable PKU2U protocol requests on your Cloud PC. To do this:
45+
46+
1. [Create a filter for all Cloud PCs](create-filter).
47+
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog.md).
48+
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests**, then select **Allow**.
49+
![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/allow-pku2u.png)
50+
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
51+
6. Complete the creation of the device configuration policy.
52+
53+
**Potential cause**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is enabled for the user account. Per-user multi-factor authentication is not supported for users connecting to Azure AD joined Cloud PCs since it blocks login.
54+
55+
**Possible solution**: Disable per-user multi-factor authentication for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies) and assign it to the appropriate users.
4356

4457
## Specific connection errors
4558

0 commit comments

Comments
 (0)