Fix Hybrid Azure AD Joined Devices Not Auto-Enrolling into Intune

🖥️ Fixing Hybrid Azure AD Joined Devices That Don’t Auto-Enroll into Intune

You’ve set up Hybrid Azure AD Join, expecting your Windows devices to automatically enroll into Microsoft Intune, but instead, only a few enroll correctly—while the rest refuse to show up in the Intune portal.

If this sounds familiar, you’re not alone. Several admins have faced this exact issue where devices complete the hybrid join but fail to auto-enroll into Intune, leaving no clues in Task Scheduler or Event Viewer. Let’s break down what’s happening and how to fix it.


🔍 The Problem

The devices appear in Microsoft Entra ID as Hybrid Azure AD Joined, but never reach Intune. You open Task Scheduler, expecting to find the MDM enrollment task under
Microsoft > Windows > EnterpriseMgmt,
but it’s missing entirely.

Here’s what’s confirmed working:

  • Licensing: ✅ Users have the correct Intune and Azure AD licenses.
  • Scope: ✅ MDM user scope set to All Users in Intune.
  • GPO: ✅ Configured correctly for MDM auto-enrollment.
  • Hybrid Join: ✅ Successful and showing in Azure AD.

Yet, devices still won’t auto-enroll. One or two might work, while the rest fail without warning.


🧠 Step 1: Run Diagnostics

Start by checking the device’s join and MDM status.

Open Command Prompt as Administrator and run:

dsregcmd /status

Scroll to the Device State section.

  • If AzureAdJoined = YES but MDMUrl = (blank) → the MDM enrollment never started.
  • If Device State shows Pending or No, it means the enrollment trigger didn’t fire.

💡 Tip: A working device can help you compare outputs. Look at both the MDM URLs and Join Type for differences.


🧾 Step 2: Check Event Viewer

Head to:

Event Viewer → Applications and Services Logs → Microsoft → Windows → DeviceManagement-Enterprise-Diagnostics-Provider → Admin

Look for event IDs:

  • 75 or 76 → MDM Enrollment attempt
  • 82 → Enrollment failed

These logs reveal if the device tried (and failed) to connect to the Intune MDM endpoint.

If there are no logs at all, it likely means the scheduled MDM task never triggered—which points to a join or policy delivery problem.


⚙️ Step 3: Verify Group Policy

Check the GPO for MDM Auto Enrollment:

Computer Configuration → Administrative Templates → Windows Components → MDM → Enable automatic MDM enrollment using default Azure AD credentials

Ensure this policy is Enabled and targeted to the correct user group.

If you’ve recently updated GPOs or changed your Intune authority, run:

gpupdate /force

and reboot the device.


🧭 Step 4: Compare with a Working Device

Find one that enrolled successfully and compare:

  • Registry: HKLM\SOFTWARE\Microsoft\Enrollments
  • Task Scheduler: Microsoft > Windows > EnterpriseMgmt
  • dsregcmd /status output

You may find missing registry entries or scheduled tasks on the problem devices.


🧰 Step 5: Possible Fixes

SolutionWhat It Does
Re-run dsregcmd /joinForces Azure AD re-registration and retriggers MDM enrollment.
Clear old enrollment keysDelete keys under HKLM\SOFTWARE\Microsoft\Enrollments (only if the device isn’t enrolled).
Recheck Intune Connector HealthVerify that the Intune Connector for Active Directory (if used) is running and connected.
Reboot after GPO syncA fresh policy pull sometimes recreates the MDM task automatically.
Wait and MonitorIf several tenants are seeing the same thing, it could be a temporary Microsoft backend issue—check the Microsoft 365 Service Health Dashboard.

🗣️ What the Community Says

Several admins in the Reddit thread reported the same pattern:

  • Hybrid Join worked fine, but Intune enrollment suddenly stopped for multiple devices.
  • One user said only one machine enrolled properly while others stayed unmanaged for days.
  • Another suspected a service-side outage, though Microsoft hadn’t posted a related advisory.

This suggests that the issue isn’t always configuration-based—sometimes it’s a temporary backend sync delay between Azure AD and Intune.


✅ Summary

If hybrid-joined devices won’t auto-enroll into Intune:

  • Run dsregcmd /status to check join state.
  • Review Event Viewer logs for MDM enrollment attempts.
  • Verify the MDM GPO and Intune user scope.
  • Compare a working vs failing device.
  • Keep an eye on Microsoft’s Service Health page for known issues.

By methodically reviewing join status, GPOs, and scheduled tasks, you can isolate whether the issue is local, policy-based, or service-related.



Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top