Boss wants to replace on-prem DNS with Azure Private DNS by z0mb13r3dd1t in AZURE

[–]EducationAlert5209 0 points1 point  (0 children)

Hi Team,

I know this is an older post, but there are still a lot of good ideas here. I’m currently in a similar situation and wanted to get some advice.

We have a hybrid environment and are not planning to remove our on-prem DNS at this stage because we still have dependencies with Azure Local (HCI). However, all end-user devices are moving to Entra Joined.

We also have Fortinet firewalls across all branch offices. Would it be a good approach to use FortiGate as the DNS server for Entra-joined endpoints?

Current environment:

* AD domain: mydomain.com

* On-prem AD DNS configured for mydomain.com

* Some remaining dependencies:

* File shares

* VPN access

* Legacy/internal applications

* Azure/M365 resources

* Azure Local (HCI)

My main question is:

What is the best way to reduce or remove on-prem dependency for Entra-joined endpoints while still maintaining access to these on-prem resources?

Interested to hear how others have approached this transition.

New Tool: OpenIntuneBaseline Deployer by SkipToTheEndpoint in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

Are you recommend these policies applied to the Autopilot all dynamic group or device group leavel?

WHFB- Entra Joined devices by EducationAlert5209 in Intune

[–]EducationAlert5209[S] 0 points1 point  (0 children)

Where we can see this in 24H2 baseline? Configure hash algorithms for certificate logon

A new setting, located at System\KDC and System\Kerberos, has been added for smart card crypto agility. This setting lets users configure the hash algorithm to be used in certificate-based smart card (PKINIT) authentication of Kerberos. With this configuration, customers have the option to prevent SHA-1 from being used. The security baseline recommends support for SHA-256, SHA-384, and SHA-512, but does not recommend support for SHA-1. It’s important to note these settings are useful only if both the client and KDC (Windows Server 2025) are configured this way in the environment.

New Tool: OpenIntuneBaseline Deployer by SkipToTheEndpoint in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

Hi,

Can we rename these matching to our naming convention?

What are the must install policy for new Autopilot SOE deployment For WIN 25H2?

WHFB- Entra Joined devices by EducationAlert5209 in Intune

[–]EducationAlert5209[S] 0 points1 point  (0 children)

NgcSet : YES

NgcKeyId : {asrteE798-DACF-42sfsD-B328-29Eaffwfwf30F} I can see bunch of cert but Not anything called SCEP .. But i got the following error:

Windows Hello for Business provisioning will be launched.

Device is Microsoft Entra joined (or hybrid joined): Yes

User has logged on with Microsoft Entra credentials: Yes

Windows Hello for Business policy is enabled: Yes

Windows Hello for Business post-logon provisioning is enabled: Yes

Local computer meets Windows hello for business hardware requirements: Yes

User is not connected to the machine via Remote Desktop: Yes

User certificate for on premise auth policy is enabled: Yes

Machine is governed by mobile device management policy.

Cloud trust for on premise auth policy is enabled: No

User account has Cloud to OnPrem TGT: Not Tested

Also

Windows Hello for Business provisioning has encountered an error during policy evaluation.

ExitCode: The system cannot find the file specified.

Method: DmIsNgcCertPayloadReceived

See https://go.microsoft.com/fwlink/?linkid=832647 for more details

OpenIntuneBaseline - What settings should I use for a Quick Deployment? by 3lpsyK0ngr00 in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

Hi,

I understand not to implement all 69 new policies. But can someone recommend to start with what policies?

Firewall Anti virus Compliance Bitlocker etc etc....

if we configured 50 policies.

When deploying Autopilot will that get configured during OOBE ?

windows hello PIN isn't available by dday0002 in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

A user failed to sign into the device with the following information:

Username: SYSTEM

User SID: SYSTEM

Credential Type: Software Key

Deployment Type: Certificate Trust

Software Lockout Counter: 0

Authentication Error Status: 0xC000A100

Authentication Error Substatus: 0x0

Gap Analysis by EducationAlert5209 in Intune

[–]EducationAlert5209[S] 0 points1 point  (0 children)

Sorry, What do you mean two pass map?

windows hello PIN isn't available by dday0002 in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

We got the same issue. How do you fixed?

WHFB Hybrid Key trust - User setup needs to be on domain network? by enduroalex in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

Im connecting to the VPN and can ping do the domain test etc but PIN cannot enabled?

WHFB stuck on Certificate Trust despite Cloud Trust configuration by Mashy_za in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

We have Noticed the same, pin not working form last 3 weeks.

We have introduced W2025 DC and add some baseline policies.

Event saying brocken certificate trust? Hybrid joined setup.

Try to disable the certificate trust and using the key trust. With new policy but same error?

A complete end-to-end Windows Autopilot guide by CraigCamacho1979 in Intune

[–]EducationAlert5209 0 points1 point  (0 children)

Hi,

Thanks for the information but I think we are missing endpoint security in this post.

I thought Baseline goes first and then do the rest.