: Azure Instance Metadata Service endpoint.To enable Microsoft Entra authentication for your Windows VMs in Azure, you need to ensure that your VM's network configuration permits outbound access to the following endpoints over TCP port 443. This feature is now available in the following Azure clouds: Windows Server 2019 Datacenter and later.This feature currently supports the following Windows distributions: Requirements Supported Azure regions and Windows distributions If you need to do so, disconnect the VM from Microsoft Entra ID by uninstalling the extension. You cannot join them to another domain, like on-premises Active Directory or Microsoft Entra Domain Services. Windows Server VMs don't support MDM enrollment.Īfter you enable this capability, your Windows VMs in Azure will be Microsoft Entra joined. MDM autoenrollment requires Microsoft Entra ID P1 licenses. ![]() Use Intune to automate and scale Microsoft Entra join with mobile device management (MDM) autoenrollment of Azure Windows VMs that are part of your virtual desktop infrastructure (VDI) deployments. Use Azure Policy to deploy and audit policies to require Microsoft Entra login for Windows VMs and to flag the use of unapproved local accounts on the VMs.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |