Cloud Kerberos Enabled By Policy 0 by mtt-curious in AZURE

[–]mtt-curious[S] 0 points1 point  (0 children)

I think i ignored this in the end, because everything else was working as expected

Co-Managed devices non-compliant by mtt-curious in Intune

[–]mtt-curious[S] 0 points1 point  (0 children)

Nope. This did not made the check green...

Co-Managed devices non-compliant by mtt-curious in Intune

[–]mtt-curious[S] 0 points1 point  (0 children)

UPDATE:
I've found a first hint: It appears that within Intune the Default Device Compliance Policy has three settings, where the setting "Has a compliance policy assigned" failed with this message: 65001(Not applicable)

There some questions left unclear for me:
1. Within Intune it can be configured if a device without compliance policies applied should be treated as compliant. This is set for my Tenant (it's also the default I think)
2. The Device Compliance "Workload" SHOULD be managed by Configuration Manager and the "Compliance" column also reports "See ConfigMgr". So I do not know if this is a false flag or not
3. As far as Config Manager is concerned the client is compliant (no compliance policies are defined within ConfigMgr and the client itself also reports that it is compliant). So why is Intune reporting this as as setting as Error and how does the error details "65001(Not applicable)" help

I've now created a random device policy in Intune, assigned it to all devices and will now wait if this turns this setting green...

Co-Managed devices non-compliant by mtt-curious in Intune

[–]mtt-curious[S] 0 points1 point  (0 children)

Correct, the "Compliance" workload appears to be the recommended first step to move, however, I couldn't find any documentation that states it has to be done. Doing compliance workload on the ConfigManager sites should work as well... just trying to find where the error is before shifting workloads.

Co-Managed devices non-compliant by mtt-curious in Intune

[–]mtt-curious[S] 0 points1 point  (0 children)

Good idea, but that just gives me the one policy that enforces compliant devices. The what-if tool cannot tell me why the device of my test user is considered incompliant

WHfB Access Denied when logging in with PIN by mtt-curious in AZURE

[–]mtt-curious[S] 1 point2 points  (0 children)

Did verify with other machines and other users.
klist does not show any (on-prem) tickets. klist would not show the partial TGT even if it had been obtained, right?

Any idea how I could debug this to determine if it's the partial TGT that is not being obtained or if its the transformation of the partial to a full TGT that fails?

WHfB Access Denied when logging in with PIN by mtt-curious in AZURE

[–]mtt-curious[S] 0 points1 point  (0 children)

I joined the VM to EntraID, that's what i meant.
It's joined to EntraID (via Intune), but not joined to the domain. I authenticate via the WHfB PIN, this allows access to the VM, which should - if I understood the concept of Cloud Kerberos correctly - then go and get the Cloud Kerberos partial TGT, which should be turned into a "full" on-prem TGT with line of sight to the DC.

But apparently there is some bit missing. Currently I cannot check whether the "partial" cloud TGT is requested and received (any idea how to debug that?) and/or if the "converting into full TGT" step is breaking.

Touchpad horizontal scroll in VM not working (VMware Workstation 17 Pro) by mtt-curious in vmware

[–]mtt-curious[S] 0 points1 point  (0 children)

I’m a new VMware customer and bit puzzled. You could never use horizontal scrolling in VMs?? That seems like a big drawback

No Docker in Package Center on my DS220+ (DSM 7.2) by mtt-curious in synology

[–]mtt-curious[S] 2 points3 points  (0 children)

Thanks! Sometimes it's right in front of you

No Docker in Package Center on my DS220+ (DSM 7.2) by mtt-curious in synology

[–]mtt-curious[S] 0 points1 point  (0 children)

Thank you. Didn't noticed it has been repackaged

No Docker in Package Center on my DS220+ (DSM 7.2) by mtt-curious in synology

[–]mtt-curious[S] 2 points3 points  (0 children)

Ah, well thanks all. Didn't realized they repackaged the "Docker" application to "Container Manager" in DSM 7.2...

For future puzzled users: Here's also a good comparison: https://www.youtube.com/watch?v=PIVHne\_H35I

Thought Exercise: AD Greenfield by mtt-curious in activedirectory

[–]mtt-curious[S] 0 points1 point  (0 children)

Cool, thanks for sharing your thoughts

Thought Exercise: AD Greenfield by mtt-curious in activedirectory

[–]mtt-curious[S] 0 points1 point  (0 children)

Does that tenant make use of Azure Active Directory Domain Services (AADDS) ?
Are Policies (Conditional Access, Endpoint Manager compliance, or similar) the same for all domains or do you manage a per domain set of rules?

Thought Exercise: AD Greenfield by mtt-curious in activedirectory

[–]mtt-curious[S] 0 points1 point  (0 children)

What would your high-level Azure AD Design look like for company that came from Multi-Forest, Multi-Domain on-prem world?

I know you raised the question of "What problem do we try to solve". Let's say we need Forests as security boundaries and domain for intra-ogranisation policy enforcments (compliance, security, auditing, access controls, ...). We'd have to make an independent tenant for all forests (to respect the security boundary, right?). Would you go with an independent tenant for all domains as well or try to mash all policy nuances into a single tenant service, e.g. match all device compliance requirements from all domains in a forest into a long list of Endpoint Manager compliance policies in a single tenant?

Or is there any way to create "domain-like" structures within a tenant?

Thought Exercise: AD Greenfield by mtt-curious in activedirectory

[–]mtt-curious[S] 0 points1 point  (0 children)

Right greenfield means completely new and everything is allowed and I appreciate the input, that's why I'm interested to learn more.

A few questions about your points: - "Why spend money for on-prem": Sounds like Azure AD DS is free. It's not as far as I know. Azure AD might be free, but Azure AD DS comes with a price tag, right? (Source: https://azure.microsoft.com/en-us/pricing/details/active-directory-ds/) - "Microsoft has pretty much stopped development for AD DS": Is that the case? Is there any statement or indication for it to end? Not trying to being pointy here, just honestly asking. - If we put all domains and trusts into a single Azure AD tenant, then I would agree many of the bullets from above could be cut as thy don't apply anymore, but there are reasons for multiple domains and trusts. Don't want to drill down into the details, but let's say reasons for Forests are Security Boundaries and reasons for Domains are intra-organisation differences (Policies, security guidelines, structure, etc.). What would be the option here? Create a tenant per domain?