Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 7a5b19f

Browse files
committedFeb 25, 2022
WIP
1 parent ec467f1 commit 7a5b19f

File tree

2 files changed

+5
-23
lines changed

2 files changed

+5
-23
lines changed
 

‎articles/active-directory/devices/enterprise-state-roaming-faqs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: devices
99
ms.topic: troubleshooting
10-
ms.date: 02/15/2022
10+
ms.date: 02/25/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
@@ -33,7 +33,7 @@ sections:
3333
* Windows settings will always roam with the primary account.
3434
* App data will be tagged with the account used to acquire the app. Only apps tagged with the primary account will sync. App ownership tagging is determined when an app is side-loaded through the Windows Store or mobile device management (MDM).
3535
36-
If an application owner cant be identified, it will roam with the primary account. If a device is upgraded from Windows 8 or Windows 8.1 to Windows 10, all the apps will be tagged as acquired by the Microsoft account. This is because most users acquire apps through the Windows Store, and there was no Windows Store support for Azure AD accounts prior to Windows 10. If an app is installed via an offline license, the app will be tagged using the primary account on the device.
36+
If an application owner can't be identified, it will roam with the primary account. If a device is upgraded from Windows 8 or Windows 8.1 to Windows 10, all the apps will be tagged as acquired by the Microsoft account. This is because most users acquire apps through the Windows Store, and there was no Windows Store support for Azure AD accounts prior to Windows 10. If an app is installed via an offline license, the app will be tagged using the primary account on the device.
3737
3838
> [!NOTE]
3939
> Windows 10 or newer devices that are enterprise-owned and are connected to Azure AD can no longer connect their Microsoft accounts to a domain account. The ability to connect a Microsoft account to a domain account and have all the user's data sync to the Microsoft account (that is, the Microsoft account roaming via the connected Microsoft account and Active Directory functionality) is removed from Windows 10 devices that are joined to a connected Active Directory or Azure AD environment.

‎articles/active-directory/devices/enterprise-state-roaming-troubleshooting.md

Lines changed: 3 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: troubleshooting
9-
ms.date: 02/15/2022
9+
ms.date: 02/25/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -75,9 +75,9 @@ Enterprise State Roaming requires the device to be registered with Azure AD. Alt
7575

7676
Under certain conditions, Enterprise State Roaming can fail to sync data if Azure AD Multi-Factor Authentication is configured. For more information on these symptoms, see the support document [KB3193683](https://support.microsoft.com/kb/3193683).
7777

78-
**Potential issue**: If your device is configured to require Multi-Factor Authentication on the Azure Active Directory portal, you may fail to sync settings while signing in to a Windows 10 or newer device using a password. This type of Multi-Factor Authentication configuration is intended to protect an Azure administrator account. Admin users may still be able to sync by signing in to their Windows 10 or newer devices with their Microsoft Passport for Work PIN or by completing Multi-Factor Authentication while accessing other Azure services like Microsoft 365.
78+
**Potential issue**: If your device is configured to require Multi-Factor Authentication on the Azure Active Directory portal, you may fail to sync settings while signing in to a Windows 10 or newer device using a password. This type of Multi-Factor Authentication configuration is intended to protect an Azure administrator account. Admin users may still be able to sync by signing in to their Windows 10 or newer devices with their Windows Hello for Business PIN or by completing Multi-Factor Authentication while accessing other Azure services like Microsoft 365.
7979

80-
**Potential issue**: Sync can fail if the admin configures the Active Directory Federation Services Multi-Factor Authentication Conditional Access policy and the access token on the device expires. Ensure that you sign in and sign out using the Microsoft Passport for Work PIN or complete Multi-Factor Authentication while accessing other Azure services like Microsoft 365.
80+
**Potential issue**: Sync can fail if the admin configures the Active Directory Federation Services Multi-Factor Authentication Conditional Access policy and the access token on the device expires. Ensure that you sign in and sign out using the Windows Hello for Business PIN or complete Multi-Factor Authentication while accessing other Azure services like Microsoft 365.
8181

8282
### Event Viewer
8383

@@ -94,15 +94,6 @@ Make sure the Windows 10 v1607 client has the August 23, 2016 Cumulative Update
9494

9595
---
9696

97-
### Internet Explorer Favorites do not sync
98-
99-
Affects devices running the Windows 10 November Update (Version 1511).
100-
101-
**Recommended action**
102-
Make sure the Windows 10 v1511 client has the July 2016 Cumulative Update ([KB3172985](https://support.microsoft.com/kb/3172985) OS Build 10586.494).
103-
104-
---
105-
10697
### Date, Time, and Region settings do not sync on domain-joined device
10798

10899
Devices that are domain-joined will not experience sync for the setting Date, Time, and Region: automatic time. Using automatic time may override the other Date, Time, and Region settings and cause those settings not to sync.
@@ -112,15 +103,6 @@ None.
112103

113104
---
114105

115-
### Sync does not work on devices that use smart card for login
116-
117-
If you attempt to sign in to your Windows device using a smart card or virtual smart card, settings sync will stop working.
118-
119-
**Recommended action**
120-
None. Future updates to Windows may resolve this issue.
121-
122-
---
123-
124106
### Domain-joined device is not syncing after leaving corporate network
125107

126108
Domain-joined devices registered to Azure AD may experience sync failure if the device is off-site for extended periods of time, and domain authentication can't complete.

0 commit comments

Comments
 (0)
Please sign in to comment.