You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/known-issues.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,16 +30,21 @@ This article describes known issues that can often be resolved by configuration
30
30
31
31
### Device-based Conditional Access policies
32
32
33
-
The Intune Enrollment app must be excluded from any Conditional Access policy requiring **Terms of Use** because it isn’t supported. See [Per-device terms of use](/azure/active-directory/conditional-access/terms-of-use#per-device-terms-of-use).
33
+
1.The Intune Enrollment app must be excluded from any Conditional Access policy requiring **Terms of Use** because it isn’t supported. See [Per-device terms of use](/azure/active-directory/conditional-access/terms-of-use#per-device-terms-of-use).
34
34
35
-
Exceptions to Conditional Access policies to exclude **Microsoft Intune Enrollment** and **Microsoft Intune** cloud apps are needed to complete Autopilot enrollment in cases where restrictive polices are present such as:
36
-
- Conditional Access policy 1: Block all apps except those on an exclusion list.
37
-
- Conditional Access policy 2: Require a compliant device for the apps on the exclusion list.
38
-
In this case, Microsoft Intune Enrollment and Microsoft Intune should be included in that exclusion list of policy 1.
35
+
2. Exceptions to Conditional Access policies to exclude **Microsoft Intune Enrollment** and **Microsoft Intune** cloud apps are needed to complete Autopilot enrollment in cases where restrictive polices are present such as:
36
+
- Conditional Access policy 1: Block all apps except those on an exclusion list.
37
+
- Conditional Access policy 2: Require a compliant device for the apps on the exclusion list.
38
+
39
+
In this case, Microsoft Intune Enrollment and Microsoft Intune should be included in that exclusion list of policy 1.
39
40
40
-
If a policy is in place such that **all cloud apps** require a compliant device (there is no exclusion list), Microsoft Intune Enrollment will already be excluded by default, so that the device can register with Azure AD and enroll with Intune and avoid a circular dependency.
41
+
If a policy is in place such that **all cloud apps** require a compliant device (there is no exclusion list), Microsoft Intune Enrollment will already be excluded by default, so that the device can register with Azure AD and enroll with Intune and avoid a circular dependency.
41
42
42
-
When Hybrid Azure AD devices are deployed with Autopilot, 2 device IDs get associated with the same device – one Azure AD and one hybrid. The hybrid compliance state will display as **N/A** when viewed from the devices list in the Azure portal. Intune only syncs with the Hybrid device ID after a successful user login. This can cause issues with any device based Conditional Access polices that block access based on compliance. Conditional Access is behaving as intended in this situation. Intune/Autopilot should validate that they are configuring correctly then escalate to the devices team if correct. Only 1 object should exist.
43
+
3.**Hybrid Azure AD devices**: When Hybrid Azure AD devices are deployed with Autopilot, 2 device IDs are initially associated with the same device – one Azure AD and one hybrid. The hybrid compliance state will display as **N/A** when viewed from the devices list in the Azure portal. Intune only syncs with the Hybrid device ID after a successful user login.
44
+
45
+
This can cause issues with any device based Conditional Access polices that block access based on compliance. Conditional Access is behaving as intended in this situation. To resolve the conflict, a user must to sign in to the device, or the policy must be modified for the device.
46
+
47
+
4. Conditional Access policies such as BitLocker compliance require a grace period for Autopilot devices because until the device has been rebooted the status of BitLocker and Secure Boot have not been captured and cannot be used as part of the Compliance Policy. The grace period can be as short as 0.25 days.
43
48
44
49
### Device goes through Autopilot deployment without an assigned profile
0 commit comments