Forum Discussion
tst3541
Dec 16, 2024Copper Contributor
PPKG didn't join device in Intune, although it should
AzureAD joined device via PPKG didn't enroll in Intune | Microsoft Community Hub → an old reference I seem to have the same problem.
So before the tipp comes up. Yes I configured the MDM scope.
The User I created the token in the wcd with is in there.
The most funny thing is, It worked before up untill end of november, everything went fine. I had to do some scripting around the bulk joining but those problems are solved.
So all of a sudden I stopped working.
No the tokkens I used are still valid, and I created new ones.
For several departments I do multiple ppkg in different subfolders.
I let them run through powershell.
So no errors, when dthe device restarts, no Intunejoin but why?
In the errorlogs (if I looked in the correct one) there are errors with no substance, like unknown error 0x00...
Any leads?
Was there an update in any form on MS side? anything?
Just to be sure I made the mdm scope all, as you can see in the screenshot.
So 2 days no progress now I'm here.
- tst3541Copper Contributor
I got my solution.
I had to disable mfa for the Intune Join, so now my tokenuser, musstn't use its nonexistent mfa
- ItsBhattiBrass Contributor
If a PPKG didn’t join the device to Intune:
- Check PPKG Configuration: Ensure it’s set up correctly for Intune enrollment.
- Network Connection: Verify the device has internet access during setup.
- Licensing: Confirm the device and user have proper Intune licenses.
- Time Sync: Ensure the system time and date are accurate.
- Reapply PPKG: Retry applying the provisioning package.
- Logs: Check event logs for errors during the PPKG application process.
- kyazaferrSteel Contributor
Let's troubleshoot this Intune device enrollment issue systematically:
- Preliminary Checks:
- Confirm MDM scope is set to "All"
- Verify the user creating the token has:
- Proper Intune licenses
- Azure AD joining permissions
- Enrollment rights
- Diagnostic Steps:
# Check current MDM information
Get-MsolCompanyInformation | Select-Object *mdm*# Verify Intune enrollment status
Get-MsolDevice -All | Where-Object {$_.DeviceTrustType -eq "Azure AD Joined"}- otential Troubleshooting Areas:
- Recent Microsoft Updates: Check if there were any Intune or Azure AD Connect updates in late November/early December
- Verify Conditional Access policies
- Check Azure AD join and Intune enrollment logs:
- Windows Event Viewer → Applications and Services Logs → Microsoft → Windows → DeviceManagement-Enterprise-Diagnostics-Provider
- Microsoft Intune management extension logs
- Azure AD Connect sync logs
- Additional Verification:
# Check device registration status
dsregcmd /status# Verify Intune enrollment
Start-Process "ms-device-enrollment:?mode=mdm"- Common Causes to Investigate:
- Token validity
- Licensing changes
- Conditional Access policy modifications
- Network/proxy configuration alterations
- Unexpected Windows updates