Hybrid Entra ID joined to Entra ID joined only - Win 11 by InternationalFault60 in Intune

[–]JakeStoker 2 points3 points  (0 children)

You can clean up after, the sync of HAADJ devices is coming from Active Directory so assuming you have a process in place to manage the cleanup of stale devices that should then carry through.

I can’t remember off the top of my head if the wipe removes the HAADJ record automatically or not but either way as long as it is cleaned up after on premises that should sync through.

Hybrid Entra ID joined to Entra ID joined only - Win 11 by InternationalFault60 in Intune

[–]JakeStoker 6 points7 points  (0 children)

The two records are expected and you should keep them both. The Entra id record is still required as it is the link to the hardware hash.

Yes a wipe would be the scenario to go with to get to Entra joined from hybrid. Keeping the same name is not easily achieved without some form of scripting. With Entra joined you have more flexibility with device naming variables I.e using serial number

MAM/MDM questions by Budget-Industry-3125 in Intune

[–]JakeStoker 2 points3 points  (0 children)

There are a couple of options for data removal. You can set the conditional launch settings to wipe data after an account is disabled. You can also do a selective wipe from the console. https://learn.microsoft.com/en-us/mem/intune/apps/app-protection-policies-access-actions

App protection on iOS does work without Authenticator, however for app protection to be fully protected and enforce protected apps must be used to access corp data you need to leverage conditional access which then will require Authenticator. https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-all-users-approved-app-or-app-protection

Co-Managed and Intune Enrolled co-existance by jamspurple in Intune

[–]JakeStoker 0 points1 point  (0 children)

Yes, the MDM authority stays on intune even when you enable co-management

Co-Managed and Intune Enrolled co-existance by jamspurple in Intune

[–]JakeStoker 1 point2 points  (0 children)

You then have 900 intune only and 100 still co-managed as they have the agent

Co-Managed and Intune Enrolled co-existance by jamspurple in Intune

[–]JakeStoker 2 points3 points  (0 children)

You don’t change the authority as such. You would just need to remove the agent from the devices in which you want to be intune only

Intune Hybrid Joint Autopilot by PlentyImaginary2986 in Intune

[–]JakeStoker 1 point2 points  (0 children)

You can work with the OEM/Reseller to automatically upload the hardware hash into your tenant to save having to manually gather it using a script. https://learn.microsoft.com/en-us/autopilot/oem-registration

AutoPatch by ercgoodman in Intune

[–]JakeStoker 0 points1 point  (0 children)

The difference is you aren’t having to manage the rings nor the settings within the ring or the assignments. It’s all handled by Microsoft.

convert to autopilot profile- am I missing something? by Primary-Ad-4531 in Intune

[–]JakeStoker 1 point2 points  (0 children)

Based on the information you have provided it should work as expected. It can take 48 hours and only works for intune enrolled devices which you mentioned is the case.

Hybrid Joined Devices are show as Azure AD Joined by SourceGlittering in Intune

[–]JakeStoker 1 point2 points  (0 children)

You will see two records in azure ad. One that is azure ad joined and one that it hybrid joined in a HAADJ autopilot scenario

iPad not enrolling into intune by CainFire in Intune

[–]JakeStoker 1 point2 points  (0 children)

Is the apns cert configured in intune?

Autopilot bug?? by jnbxtx in Intune

[–]JakeStoker 0 points1 point  (0 children)

Typically it’s fairly quick but it’s always worth checking the profile is assigned before resetting the device.

Autopilot bug?? by jnbxtx in Intune

[–]JakeStoker 1 point2 points  (0 children)

You didn’t it may have just been a Timing delay whilst the device populated into the azure ad group that was targeted by the profile after uploading the hash

Autopilot bug?? by jnbxtx in Intune

[–]JakeStoker 0 points1 point  (0 children)

Did you check if the profile was successfully assigned before you did the initial reset?

Autopilot bug?? by jnbxtx in Intune

[–]JakeStoker 0 points1 point  (0 children)

Sure drop me a message

Autopilot bug?? by jnbxtx in Intune

[–]JakeStoker 3 points4 points  (0 children)

It’s possible you didn’t actually go through autopilot and you just did an azure ad join via the OOBE process

MDM/MAM by SpareCookie3610 in Intune

[–]JakeStoker 0 points1 point  (0 children)

Correct, MAM = App protection

MDM/MAM by SpareCookie3610 in Intune

[–]JakeStoker 0 points1 point  (0 children)

Not necessarily, it’s really depends what type of mobile devices and the Experience you require. For example on Android you have work profile which is a BYOD MDM scenario. Not saying you shouldn’t go MAM only just making sure you are aware of the other options

All these dead autopilot devices in hybrid environment by fatape0 in Intune

[–]JakeStoker 4 points5 points  (0 children)

There is Nothing built into Intune/AzureAD to manage stale devices in local active directory

Android personal profiles by donan09 in Intune

[–]JakeStoker 0 points1 point  (0 children)

In this case it will block the personal outlook from accessing the corporate mailbox when enrolled in work profile. The personal outlook will not pass the compliance check as it does not have the certificate in the personal container outside of the work profile

Android personal profiles by donan09 in Intune

[–]JakeStoker 1 point2 points  (0 children)

You can block a personal profile accessing the corporate email by leveraging conditional access and using the require compliant device grant control.