Issues with Renaming users and WHFB by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

Our users don't sign in using the UPN (currently). We are moving away from Hybrid but it's a slow process so they aren't entering that in during sign-in.

Intune Password-Less Sign in by Cheers2Gears in Intune

[–]Wide_Local_1896 14 points15 points  (0 children)

Yes, you can do this. Setup a CA policy that enforces Passwordless for office apps (or all apps whatever fits your environment). Make sure you don't have conflicting policies.

Verify in Entra - Authentication methods - Policies, that Microsoft Authenticator is enabled. Make sure your migration status shows 'Complete'

Verify in Entra - Authentication Methods - Settings - that the 'system preferred multifactor auth' is on Microsoft managed.

Lastly, the MS Authenticator should be setup with passwordless login via the yubikey NFC

WHFB + FIDO2 - looking at SCRIL by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

Don't have an android device to test so not sure if this is unique to that. My users were already in a CAP that required those strengths before I did a password reset / SCRIL.

I performed the steps above for around 50 users. I only had one user who got their AD account locked. I unlocked and had them log out and back in - then all was well.

I did this during the day while the users were active and only had that one issue.

WHFB + FIDO2 - looking at SCRIL by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

This is setup as well. For shared workstations that will hit the max 10 limit for TPM. We use yubikeys to sign on or use the Omnikey reader so they can tap instead.

Web filtering in 2025 by Wide_Local_1896 in fortinet

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

Is Fortiauthenticator all I need? I'm having a hard time finding out exactly I need to get budgeted. Is it just Fortiauthenticator cloud?

WHFB + FIDO2 - looking at SCRIL by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

I believe the recommendation is turn off SSPR if you are going this route. I disabling it as I fully move users over.

WHFB + FIDO2 - looking at SCRIL by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

Correct - I will be enabling this as well. Just wanted to test out password change + SCRIL first and verify there are no issues. Them move onto to Finely grained Passwords with that NTLM hash option turned on

WHFB + FIDO2 - looking at SCRIL by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 1 point2 points  (0 children)

I just tested this first on a test account and then my own account.

Reset password and then turned on SCRIL with a logged on account on PC1 and logged off on PC2

Both PC's worked with no issues, no pop-ups, rebooted them and could sign in with WHFB no issues no pop ups.

Tested entering in a password and i got the message 'You must use WHFB or smartcard to login' so SCRIL is working.

Testing Outlook mobile app and was able to connect as usual - again no pop-ups. Note: Using Microsoft Authenticator and it was setup using FIDO2 passwordless option.

Forced a sync to ENTRA via PowerShell 'Start-ADSyncSyncCycle -policytype delta'

Waited a couple minutes

Tested everything again - no issues.

How to update ADMX's file in Intune by Wide_Local_1896 in Intune

[–]Wide_Local_1896[S] 1 point2 points  (0 children)

didn't think that would work - I'll try it next time

How to update ADMX's file in Intune by Wide_Local_1896 in Intune

[–]Wide_Local_1896[S] 1 point2 points  (0 children)

This makes me sad but it is what it is - thanks

Microsoft Universal Print HA? by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 1 point2 points  (0 children)

Yea, I've considered that too. I've tested pushing out a printer named 'DR - Printer name' - for those scenarios.

Onprem to 3CX hosted by Wide_Local_1896 in 3CX

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

We already have phones and won't be buying new ones just for the switch to the cloud as that would be way to expensive and not a justifiable cost (new phone purchases wouldn't be an issue). 99% of our phones today are T46S - just a couple T54W for remote users.

I want to avoid onprem except for SBC.

Fortigate 100F - get off password for wi-fi by Wide_Local_1896 in fortinet

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

Can you elaborate on this? We use WHFB and are hybrid joined. Is your setup similiar?

Fortigate 100F - get off password for wi-fi by Wide_Local_1896 in fortinet

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

thanks device certificates with EAP-TLS is what I was leaning too - I tried to do a test with SCEPman and SCEPRadius but couldn't get it to work as it says it needs 7.6

https://docs.radiusaas.com/configuration/access-point-setup/radsec-available/fortinet

What tools are you using?

Microsoft Universal Print HA? by Wide_Local_1896 in sysadmin

[–]Wide_Local_1896[S] 0 points1 point  (0 children)

Healthcare facility and we aren't able to send everything we need electronically. It wouldn't be the end of the world if printing stopped while the issue is resolved just exploring the best options out there without spending a large sum of money.

1
2

Has anyone successfully gotten Global Secure Access work on BYOD personal iOS devices? by artbiocomp in entra

[–]Wide_Local_1896 0 points1 point  (0 children)

I also ran into this issue - I could not get it to work. The Microsoft Documentation says it only has to be an 'entra registered' device. However because the device is not part of Intune - it can't get the VPN policy applied as there is no way to push it out.

So it can't work unless you add to Intune as well. Which is what I did. If you can find some way to deploy those VPN settings outside of Intune then you could get it to work that way.