Skip to content

Commit e73d0ad

Browse files
authored
wording changes
1 parent 18d8b0f commit e73d0ad

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

windows-365/enterprise/connection-errors.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: ErikjeMS
88
ms.author: erikje
99
manager: dougeby
10-
ms.date: 02/09/2022
10+
ms.date: 02/10/2022
1111
ms.topic: reference
1212
ms.service: cloudpc
1313
ms.subservice:
@@ -32,27 +32,27 @@ ms.collection: M365-identity-device-management
3232

3333
The following errors can occur when connecting to a Cloud PC.
3434

35-
## Errors when connecting to an Azure AD joined Cloud PC
35+
## Errors when connecting to an Azure Active Directory (Azure AD) joined Cloud PC
3636

3737
### The logon attempt failed
38-
**Potential cause #1**: The Cloud PC VM is denying PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
38+
**Potential cause #1**: The Cloud PC denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
3939

4040
- The Cloud PC is Azure AD joined.
4141
- The user is connecting from the Windows desktop client.
42-
- The user's physical device is either Azure AD registered, Azure AD joined, or Hybrid Azure AD joined to the same organization as the Cloud PC.
42+
- The user's physical device is Azure AD registered, Azure AD joined, or hybrid Azure AD joined to the same organization as the Cloud PC.
4343

44-
**Possible solution**: Enable PKU2U protocol requests on your Cloud PC. To do this:
44+
**Possible solution**: Turn on PKU2U protocol requests on your Cloud PC:
4545

46-
1. [Create a filter for all Cloud PCs](create-filter.md).
46+
1. [Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs).
4747
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog.md).
48-
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests**, then select **Allow**.
48+
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests** > **Allow**.
4949
![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/connection-errors/allow-pku2u.png)
5050
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
5151
6. Complete the creation of the device configuration policy.
5252

53-
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates.md) is enabled for the user account. Per-user multi-factor authentication is not supported for users connecting to Azure AD joined Cloud PCs since it blocks login.
53+
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates.md) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Azure AD joined Cloud PCs.
5454

55-
**Possible solution**: [Disable per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required.md) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.
55+
**Possible solution**: [Remove per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required.md) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.
5656

5757
## Specific connection errors
5858

0 commit comments

Comments
 (0)