This scenario occurs when you have new Windows 10 devices that join Microsoft Entra ID and automatically enroll to Intune, and then you install the Configuration Manager client to reach a co-management state.
Before you start
Before you start troubleshooting, it's important to collect some basic information about the issue and make sure that you follow all required configuration steps. This helps you better understand the problem and reduce the time to find a resolution. To do this, follow this checklist of pre-troubleshooting questions:
Most issues occur because one or more of these steps were not completed. If you find that a step was skipped or was not completed successfully, check the details of each step, or see the following tutorial:
Troubleshooting hybrid Microsoft Entra configuration
If you are experiencing issues that affect either Microsoft Entra hybrid identity or Microsoft Entra Connect, refer to the following troubleshooting guides:
If you are experiencing issues that affect Microsoft Entra hybrid join for managed domains or federated domains, refer to the following troubleshooting guides:
What log can I use to validate workloads and determine where policies and apps come from in a co-management scenario?
You can use the following log file on Windows 10 devices:
%WinDir%\CCM\logs\CoManagementHandler.log
How do I validate that my cloud service has a unique DNS name?
To do this, follow these steps:
Sign in to the Azure portal, go to All Services > Cloud Services (Classic), and then click Add.
In the in DNS name field, enter a name that you want to use.
When you have a name that is available for you to use, note it without creating it in the Cloud Service pane.
Create a CNAME record that maps your domain to <name>.cloudapp.net in both internal and external DNS servers.
Where can I find the Configuration Manager client setup MSI?
You can find the ccmsetup.msi file in the following folder on the Configuration Manager site server:
<ConfigMgr installation directory>\bin\i386
How do I verify the Configuration Manager client deployment from Intune to the managed Windows 10 devices?
To verify the deployment, follow these steps on the Windows 10 device:
Open File Explorer, and go to %WinDir%\CCM\logs.
Open the ADALOperationProvider.log file with CMTrace, and look for Getting Microsoft Entra ID (User) token and Getting Microsoft Entra ID (device) token to verify the tokens.
In CMTrace, open the CoManagementHandler.log file, look for Device is already enrolled with MDM and Device Provisioned to verify the enrollment.
Open Control Panel, type Configuration Manager in the search box, and then select it.
Select the General tab, and verify the Assigned management point.
Select the Network tab, and verify the Internet-based management point.
Common issues
Configuration Manager allows only an HTTPS-enabled management point for Microsoft Entra joined clients
This issue occurs if you use Configuration Manager current branch version 1802 or an earlier version. In these versions, management points that you enable for CMG must be HTTPS. Starting in version 1806, the management point can be HTTP.
To fix the issue, update to Configuration Manager current branch version 1806 or a later version.
Whether PKI certificates are still a valid option instead of enhanced HTTP
PKI certificates are still a valid option for you, but they have the following requirements:
All client communication is done over HTTPS.
You must have advanced control of the signing infrastructure.
I can't find the Client Computer Communication tab in Site Configuration
Starting in Configuration Manager current branch version 1906, this tab is renamed to Communication Security.
The Use Configuration Manager-generated certificates for HTTP site systems option is enabled, but no certificate is received
This behavior is expected. It can take up to 30 minutes for the management point to receive and configure the new certificate from the site. You can use the following log to track, monitor, and verify this:
Records for the resources and their associated information from Microsoft Entra ID aren't created in the Configuration Manager database
When you onboard the Configuration Management site to Microsoft Entra ID, the Microsoft Entra user resources aren't discovered or populated into the Configuration Manager database. Usually, you receive the 0x87d00231 error in this scenario.
This issue occurs in one of the following situations:
You didn't successfully configure the API permissions for the app registration in the Azure portal.
Microsoft Entra user Discovery isn't enabled or configured.
To fix the issue, follow the steps in Microsoft Entra user Discovery to configure API permissions and Microsoft Entra user Discovery. You can use the following logs to check details:
<ConfigMgr installation directory>\Logs\SMS_AZUREAD_DISCOVERY_AGENT.log on the site server
%WinDir%\CCM\logs\CcmMessaging.log on the client
%WinDir%\CCM\logs\LocationServices.log on the client
CoManagementHandler.log shows Queuing enrollment timer to fire at...
The ADALOperationProvider.log file on the Windows devices shows Getting Microsoft Entra ID (User) token and Getting Microsoft Entra ID (device) token. However, the device isn't enrolled, and the last line in CoManagementHandler.log is Queuing enrollment timer to fire at....
This behavior is expected in Configuration Manager current branch version 1806 and later versions. Starting in version 1806, automatic enrollment isn't immediate for all clients. This behavior helps enrollment scale better for large environments. Configuration Manager randomizes enrollment based on the number of clients. For example, if your environment has 100,000 clients, enrollment may occur over several days.
To monitor co-management, go to Monitoring > Co-Management in the Configuration Manager console.
I copied the customized client installation command from the Configuration Manager console, but the Configuration Manager client can't be installed
This issue occurs in one of the following situations:
The installation parameters in the command don't conform to the supported values.
The length of the command line is greater than 1,024 characters.
To fix the issue, make sure that the command meets the requirement and the command line isn't more than 1,024 characters long.
Configuration Manager agent state is unhealthy in Intune
Intune evaluates the Configuration Manager agent state based on the ClientHealthLastSyncTime and ClientHealthStatus values in the following registry subkey:
The value found in ClientHealthStatus is a combination of multiple flags which include:
1: Client installed
2: Client registered
4: Successful health evaluation
8: Client install or upgrade error
16: Communication error with a management point
The following are common values of ClientHealthStatus:
1: Client installed, but hasn't registered
3: Client installed and registered, but hasn't reported a successful health evaluation yet
5: Client installed, not currently registered, and sent a successful health evaluation (previously)
7: Client healthy
23: Client was healthy but had a communication error with a management point
If the ClientHealthStatus value is 7 (healthy), Intune considers the Configuration Manager client as healthy if the ClientHealthLastSyncTime is not older than 30 days.
If the ClientHealthStatus value isn't 7 (unhealthy), Intune considers the Configuration Manager client as healthy if the ClientHealthLastSyncTime is not older than 48 hours.
The ClientHealthLastSyncTime value is updated by the Client Notification component of Configuration Manager client, and the log file is CcmNotificationAgent.log.
To troubleshoot this issue, check the CcmNotificationAgent.log file if the ClientHealthLastSyncTime is not up to date. Here is an example:
Updating MDM_ConfigSetting.ClientHealthLastSyncTime with value 2019-04-01T21:42:51Z BgbAgent 4/2/2019 8:42:51 AM 9476 (0x2504)
If the ClientHealthLastSyncTime value is up-to-date, but the last check-in time of the Configuration Manager agent is 2/1/1900 in Intune, this means that the device compliance policies workload is managed by Configuration Manager. In this case, switch the compliance policies workload to Intune or Pilot Intune.
The CMG connection point shows as disconnected
The issue occurs because of a permissions issue between the remote site system where the CMG connection point role is installed and the primary site.
The remote site system collects the TrafficData report from the CMG, then sends the data to the primary site through state messages. Here is a sample log snippet of SMS_Cloud_ProxyConnector.log:
Because the remote site system is also a management point, these state messages are moved into an outbox that is accessed by MP File Dispatch Manager that sends the files to the primary site. Here is a sample log snippet of mpfdm.log:
SMS_MP_FILE_DISPATCH_MANAGER 7044 (0x1b84) ~Moving 1 *.SMX file(s) from C:\SMS\MP\OUTBOXES\statemsg.box\ to \\PS.contoso.com\SMS_PS1\inboxes\auth\statesys.box\incoming\.
SMS_MP_FILE_DISPATCH_MANAGER 6584 (0x19b8) ~Moved file C:\SMS\MP\OUTBOXES\statemsg.box\___CMUp5onztqe.SMX to \\PS.contoso.com\SMS_PS1\inboxes\auth\statesys.box\incoming\___CMUp5onztqe.SMX
When there is a permission issue, MP File Dispatch Manager can't access the inboxes on the primary site and logs the following error in mpfdm.log:
SMS_MP_FILE_DISPATCH_MANAGER 3828 (0xef4) ~**ERROR: Cannot connect to the inbox source, sleep 30 seconds and try again.
To fix the issue, add the machine account of the remote site system to the Local Administrators group on the primary site.
Clients can't locate the management point by using the CMG, and you receive error 403
When this issue occurs, the following error is logged in LocationServices.log on the client:
If the CMG connection point server has a valid client authentication certificate, the most possible cause is failure to validate the Certificate Revocation List (CRL) for the certificate. If this is the case, you receive the 0x87d0027e error, and the following error is logged in the CAPI2 event log:
The revocation function was unable to check revocation because the revocation server was offline. 80092013
Additionally, if you enable verbose logging by setting the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SMS\SMS_CLOUD_PROXYCONNECTOR\VerboseLogging registry value to 1, error entries that resemble the following are logged in SMS_Cloud_ProxyConnector.log:
Chain build failed cert: C019CC17EEFA681D154BA9F24F8EAE9640D54C49
Chain 0 status: RevocationStatusUnknown
Chain 1 status: OfflineRevocation
Chain build failed cert: 54E09FEA31FE83F9A8AA5389B8D08B34D42FB3CF
Chain 0 status: RevocationStatusUnknown
Chain 1 status: OfflineRevocation
Not allowed cert: 52E140B1DD16A556AB77932B63DE87955BBC4616 52E140B1DD16A556AB77932B63DE87955BBC4616
Filtered cert count with allowed root CA and has private key: 0
Filtered cert count with client auth: 0
We recommend that, instead of automatically disabling CRL checking, you first make sure that it works. However, if you can't get CRL checking to work correctly, temporarily disable CRL checking for CMG connection points. This lets a client certificate be selected without performing CRL checking, and enables communication with the management point.
More information
For more information about troubleshooting co-management issues, see the following articles:
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.