Key points:
- Use dsregcmd /status to check Entra Join, MDM URL presence, and enrollment status.
- Monitor Event Viewer logs (User Device Registration, DeviceManagement-Enterprise-Diagnostics-Provider) for enrollment errors and event IDs.
- Leverage PowerShell and Graph API to confirm device registration and Intune management status.
- Inspect registry keys under HKLM\SOFTWARE\Microsoft\Enrollments for join and enrollment artifacts.
- Review Group Policy settings to ensure automatic MDM enrollment is properly configured.
- Common root causes: missing Intune licenses, GPO misconfigurations, Entra Join issues, firewall blocks, duplicate device entries.
- Remediation options include removing stale records, resetting devices, or manually rejoining Entra Join.
- Automating diagnostics, monitoring, and remediation improves enrollment reliability at scale.
Endpoint configuration errors can significantly delay your onboarding process, making Intune device enrollment troubleshooting essential. Diagnostic logs, which are among Intune’s built-in tools, are valuable for tracking important processes and assessing the health of the device being enrolled.
This article explains how to diagnose and resolve Intune device enrollment issues for Intune MDM, Autopilot, Hybrid Entra Join, and more.
Microsoft Intune device enrollment troubleshooting guide
Keep your goals, scope, and operational capacity in mind before debugging Intune device enrollment issues.
📌 Prerequisites:
- Windows 10/11 Pro, Enterprise, or Education
- Entra Join or a hybrid Entra Join environment
- Intune license assigned to the target user
- Access to Microsoft cloud endpoints
- Administrator privileges
- Microsoft Entra Connect (for hybrid scenarios)
📌 Recommended deployment strategies:
| Click to Choose a Method | 💻 Best for Individual Users | 💻💻💻 Best for Enterprises |
| How to use dsregcmd to check Entra Join and MDM state | ✓ | |
| How to check logs in Event Viewer | ✓ | ✓ |
| How to check enrollment and registration data via PowerShell | ✓ | |
| How to check for enrollment artifacts via Registry Editor | ✓ | ✓ |
| How to validate Group Policy settings for auto-enrollment | ✓ |
Build a more robust cross-platform environment with Automated Device Enrollment (ADE).
How to use dsregcmd to check Entra Join and MDM state
📌 Use Cases: Check a device’s Entra Join status on a lightweight command shell after provisioning.
- Press Win + R, type cmd, and press Ctrl + Shift + Enter.
- Run the following command to analyze device join status:
dsregcmd /status
- Key fields to check:
- AzureAdJoined
- YES: The device is joined.
- NO: Microsoft Entra ID registration hasn’t been completed yet.
- DeviceAuthStatus
- SUCCESS: The device was authenticated by Entra Join.
- FAILED/UNKNOWN: Authentication issues due to certificate issues, incorrect time settings, connection difficulties, and more.
- Explore Microsoft’s official documentation on device health checks to find out more.
- TenantDetails
- Correct tenant ID: Your device is joined to your organization (also known as “the tenant”).
- Incorrect or missing tenant ID: The device is joined to the wrong tenant or is currently waiting to be joined, blocking Intune policies.
- MDMUrl
- URL present: Your device is configured to enroll in Intune.
- Blank or incorrect URL: The device isn’t set up for MDM enrollment or is experiencing auto-enrollment issues and licensing problems.
- DMEnrollment and MDMEnrollmentStatus
- YES/SUCCESS: The device is enrolled in Intune and can receive policies you deploy.
- NO/FAILED: Enrollment failed due to licensing problems, misconfigured policies, or enrollment restrictions.
- Device State, User State, and Diagnostic Data
- Complete values: Your enrolled endpoint works as expected.
- Incomplete/invalid values: Misconfigured user/device settings leading to partial joins and sync issues.
- AzureAdJoined
How to check logs in Event Viewer
📌 Use Cases: Check for codes that correspond with your device’s current enrollment status.
- Press Win + R, type eventvwr.msc, and press Ctrl + Shift + Enter.
- Navigate to:
Applications and Services Logs > Microsoft > Windows > User Device Registration
- Navigate to:
Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider
- Right-click on the specific log folder and select View > Show Analytic and Debug Logs for detailed diagnostics logs.

- Click on the event log that matches your enrollment attempt’s timestamp and check for error codes.
- Read the Event ID column for IDs related to enrollment.
| Event ID | Log folder | What it means |
| 204 | User Device Registration | Join request started |
| 304 | User Device Registration | Join was successful |
| 305 | User Device Registration | Join attempt failed |
| 201 | DeviceManagement-Enterprise-Diagnostics-Provider | MDM enrollment was attempted |
| 301 | DeviceManagement-Enterprise-Diagnostics-Provider | MDM enrollment successful |
| 404, 500, 600 | DeviceManagement-Enterprise-Diagnostics-Provider | Enrollment error |
How to verify enrollment and registration status via PowerShell
📌 Use Cases: Confirm if a device is network-joined or is experiencing registration problems.
📌 Prerequisites: Microsoft Graph API or Entra Join module for registration check.
- Press Win + R, type powershell, and press Ctrl + Shift + Enter.
- Run the following for your device’s MDM details and workplace join status:
Get-WmiObject -Namespace root\cimv2\mdm\dmmap -Class MDM_DevDetail_Ext01
- Check if the device is registered in Entra Join:
Get-AzureADDevice -SearchString "<DeviceName>"
Replace <DeviceName> with the device’s computer name.
- Open PowerShell.
- Run this command to output your device’s name:
$env:COMPUTERNAME
- Run these commands sequentially to confirm if the device is enrolled and managed by Microsoft Intune.
Connect-MSGraph
Get-IntuneManagedDevice | Where-Object {$_.DeviceName -eq "<DeviceName>"}
Replace <DeviceName> with the device’s computer name.
- Open PowerShell.
- Run this command to output your device’s name:
$env:COMPUTERNAME
How to check for enrollment artifacts via Registry Editor
⚠️ Warning: Editing the registry can cause system issues. Create a backup before proceeding.
📌 Use Cases: Inspect devices for proof of enrollment.
- Press Win + R, type regedit, and press Ctrl + Shift + Enter.
- Check registry keys to validate if enrollment or policy settings were applied locally.
- Autopilot/MDM Enrollment keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Enrollments\
- If this key stores enrollment data, the device has been enrolled in Intune/an MDM
- AAD Join artifacts:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CloudDomainJoin
- If this key stores Entra Join information (e.g., join status, tenant ID), the device is Entra-joined or Entra hybrid-joined.
- Windows Health Monitoring and MDM diagnostics:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\current\device\
- If this key contains implemented MDM policies and sync timestamps, your directives were pushed to this device via Intune.
How to validate Group Policy settings for auto-enrollment
📌 Use Cases: Ensure devices auto-enroll into Intune properly.
📌 Prerequisites: Hybrid Entra environment.
- On a domain controller/server, press Win + R, type gpmc.msc, and press Ctrl + Shift + Enter.
- Navigate to:
Computer Configuration > Policies > Administrative Templates > Windows Components > MDM
- Scroll down and double-click Enable automatic MDM enrollment using default Entra Join credentials.
- Click Enable.
- Under Options, select Device Credential.
- Click Apply, then OK.
- Force a policy update:
gpupdate /force
- Use Resultant Set of Policy (RSOP) or run the following to confirm your changes:
gpresult /h report.html
⚠️ Things to look out for
Intune device enrollment troubleshooting involves low-level settings, so even slight mistakes can disrupt operations.
Common causes of enrollment failure
| Risks | Potential Consequences | Reversals |
| Clearing event logs | Lost diagnostic data and possible misdiagnosis | Redo the process to create another copy of the error logs. |
| No valid license | MDM enrollment fails | Assign an Intune/AADP license. |
| Entra Join not completed | “AzureAdJoined: NO” | Manually join the device via Settings or CMD. |
| Hybrid Join SCP misconfig | Event ID 304 or 305 | Validate SCP using ADSI Edit. |
| GPO not applied | Auto-enrollment not triggered | Check GPO scope and security filtering with gpresult /h report.html. |
| Proxy/firewall blocks | dsregcmd hangs or fails | Allow required endpoints. |
| Device already registered | Enrollment fails with error code (e.g., 8018000a) | Remove the duplicate device from Entra Join and try again. |
| Misconfigured GPO (wrong scope/credential type) | Auto-enrollment can’t initiate |
|
Simplify device enrollment and provisioning for spotless endpoin management.
Troubleshooting Intune endpoint errors with dsregcmd
Here are the most common roadblocks IT pros encounter during Intune device enrollment troubleshooting:
Remove failed enrollment remnants
If your enrollment is being blocked, delete outdated records in your registry under HKLM\SOFTWARE\Microsoft\Enrollments and remove stale certificates via Microsoft Management Console.
Intune MDM certificates become obsolete after one year or when the device doesn’t connect to Intune 40 days before expiry and drops out.
💡 Note: Deleting registry entries carries considerable risk. Only remove unnecessary certificates and document modifications appropriately.
Wipe Workplace Join records
If you’re unable to enroll a BYOD device, it’s likely due to its existing Microsoft Entra ID record and/or local key, which makes the system view your device as already registered. To resolve this:
- Remove the Workplace Join record.
- Run
dsregcmd /leavewith admin rights. - Go to Settings > Accounts > Access work or school, and disconnect the account.
- Run
- Delete stale objects in Microsoft Entra ID.
💡 Warning: Deleting Intune-managed devices on Entra results in the loss of access to company resources, affecting other services like Autopilot, Conditional Access, Hybrid Join, and more.
- Reboot the system, then attempt to rejoin your device.
Rejoin manually
If auto-enrollment fails, do the following to manually join your device:
- Navigate to Settings > Accounts > Access work or school and connect the device, or
- Run
dsregcmd /joinwith elevated permissions
Use Autopilot Reset (if enabled) for full reinitialization
If your devices need to be reconfigured for Intune enrollment, use Autopilot Reset to give them a fresh start while keeping their enrollment status and important data intact.
Device Cap Reached
This common error occurs when a user has registered the maximum number of devices allowed by policy. By default, Microsoft Entra caps devices at 5 per user. Any new device enrollment attempts fail until you remove old or unused devices, raise the device quota in the Entra admin center, or reassign devices to stay within compliance.
Restart the User Device Registration Service
Devices are registered on Microsoft Entra ID through the User Device Registration Service (UDRS), which can be refreshed for better functionality. To do this, run the following:
Restart-Service -Name “UserDeviceRegistration”
Use this when a device experiences an indefinitely pending registration status or can’t produce a Primary Refresh Token (PRT).
NinjaOne services
| NinjaOne service | What it is | How does it resolve enrollment issues |
| Automated scripts | At-scale deployment of PowerShell and/or CMD. | Automates the search for failed Entra Join joins, lost MDM settings, and failed enrollments. |
| Remote monitoring and system alerts | A feature that monitors performance and enrollment status. | Real-time alerts when compliance drift or enrollment failure occurs. |
| Custom scripting | A tool that remotely analyzes join status (dsregcmd /status). | Centralized diagnostics remove the need for on-premises action. |
| Device tagging | Further control over the way you label endpoints (e.g., join type, domain, enrollment type). | Added organization options can help prioritize which devices to troubleshoot. |
| Reporting and dashboards | Visualization of enrollment trends and compliance shifts over time. | Identifies patterns across your fleet and enhances system reports. |
Streamline Intune device enrollment with custom scripting
Intune device enrollment troubleshooting requires several advanced tools. From checking event logs to removing any residue from previous MDMs, these methods use elevated permissions to modify important device settings. As such, you should always keep a backup for data integrity and possible redos.
Simplify IT management with automated solutions that empower MSPs and in-house sysadmins to control every process through a single pane of glass.
Related topics:
