지금 지원 담당자와 채팅
지원 담당자와 채팅

On Demand Migration Current - Active Directory Express User Guide

Microsoft Entra Join Profiles

What is an Microsoft Entra Join Profile?

A Microsoft Entra Join Profile is a collection of settings used to manage the Entra join process during Device Cutover which can be defined once and then applied to multiple Devices. Microsoft Entra Join Profiles are used for AD to Entra device migrations.

 

How are Microsoft Entra Join Profiles created?

To add an Microsoft Entra Join Profile:

  1. On the Microsoft Entra Join section of the Profiles page, Click the Add button. The Add Your Microsoft Entra Join Profile window appears.
  2. Enter a Profile Name to identify this Microsoft Entra Join Profile.
  3. Enter a value in the following field:
  • Bulk Enrollment Package File Name - The name of the Microsoft Entra bulk enrollment package in packagename.ppkg format, which has been created by the client administrator using the Windows Configuration Designer and copied to the network share defined in the Microsoft Entra Bulk Enrollment Repository

  1. Select an option from the following drop-down list:
  • Target Environment – The cloud-only Azure environment associated with the Azure bulk enrollment package used in this Profile

  1. Select a Device Name Option:
  • If you choose Device Name Defined Per Provisioning Package, the device will be migrated to Entra using the dynamic naming convention configured in the Microsoft Entra bulk enrollment package used in this Profile

  • If you choose Keep Original Device Name, the dynamic name assigned by the Microsoft Entra bulk enrollment package will be overwritten and replaced with the original device name when migrating to Entra

  1. Select the Enroll Into Intune Management option to enroll the device for Intune management with the first logged on user after cutover as the PrimaryUser.
  2. Select the Auto-Pilot/Intune Cleanup option to clear existing Auto-Pilot/Intune provisioning information from the device as part of the cutover.
  3. Select the Source Directory is Active Directory Joined or Hybrid Microsoft Entra ID Joined option if you wish to include Active Directory Joined or Hybrid Microsoft Entra Joined devices.
  4. Enter values in the following fields under Source Domain Credentials:
  • FQDN of Domain - The domain FQDN of the source in source.domain.com format.

  • Username - The username to access the source domain in domain\username or UPN (username@domain.com) format.

  • Password - The password credential to access the source domain.

  1. Under Preflight Check Validation, select the Skip Source Local Active Directory Validation option to not validate the source local Active Directory.
  2. Click Save Profile. The Microsoft Entra Join Profile is added to the list.

Credential Profiles

What is a Credential Profile?  

A Credential Profile is a set of source and target domain credentials used for Cutover which can be defined once and then applied to multiple Devices.

 

How are Credential Profiles created?  

The specified credentials must be able to join and disjoin a computer from the specified domain as well as disable a computer in the specified domain. A trust between the source and target domain is not required.

To add a Credential Profile:

  1. On the Credentials section of the Profiles page, Click the Add button. The Add Your Credentials Profile window appears.
  2. Enter a Credential Name to identify this Credentials Profile.

  1. Enter values in the following fields under Source Domain Credentials:
  • FQDN of Domain - The domain FQDN of the source in source.domain.dom format.

  • Username - The username to access the source domain in domain\username or UPN (username@domain.dom) format.

  • Password - The password credential to access the source domain.

  1. Enter values in the following fields under Target Domain Credentials
  • FQDN of Domain - The domain FQDN of the target in target.domain.dom format.

  • Username - The username to access the target domain in domain\username or UPN (username@domain.dom) format.

  • Password - The password credential to access the target domain.

  1. Check Source Device is EntraID Joined if the source device is disable the entered Source Domain Credentials.
  2. Click Save Profile. The Credential Profile is added to the list.

Credential Cache Profiles

What is a Credential Cache Profile?  

A Credential Cache Profile is a collection of settings related to the target domain controller used for caching a user’s target credentials prior to completing an Offline Domain Join cutover which can be defined once and then applied to multiple Devices.

 

How are Credential Cache Profiles created?  

To add a Credential Cache Profile:

  1. On the Credential Cache section of the Profiles page, Click the Add button. The Add Your Credential Cache Profile window appears.

  2. Enter a Credential Cache Name to identify this Credential Cache Profile.

  3. Enter values in the following fields:

    • Target Domain Controller IP Address – The IP address of the target Domain Controller.

    • Target Domain Controller Ping Interval - The number of seconds the script will sleep between pings to the defined target domain controller. The default value is 300 seconds.

    • Timeout Before Job Failure – The number of minutes to wait after Credential Cache job is downloaded by the agent before marking the job a failure due to timeout. The default value is 180 minutes.

    • Timeout for User Credential Prompt – The number of minutes to prompt the user with a dialog box to enter their target domain credentials for caching. The default value is 5 minutes

  4. Check the Hide Cancel/Close/Taskbar Icons options to stop the icons from appearing.

  5. Click Save Profile. The Credential Cache Profile is added to the list.

Migration Waves

What is a Migration Wave?  

A Migration Wave in Active Directory is a named logical grouping of Devices. This can be a useful tool for organizing, tracking, and staging your migrations.

 

How do I manage Migration Waves?  

There are two ways to manage Migration Waves in Active Directory. First, you can add Devices to a Wave by applying the ‘Set to Migration Wave’ Action to Devices from the Ready Devices table. The other way to manager Migration Waves is from the Migration Waves page which is accessible through ‘Waves’ in the left navigation menu. On that page you can create new Waves, Edit Wave names, Remove empty waves, and view how many Devices are in a Wave.

 

What can I do with a Migration Wave?  

Migrations Waves in Active Directory can be used to filter the Ready Devices table to view Device status and apply Actions.

 

How do I create a New Migration Wave?  

  1. Login to Active Directory.
  2. Select "Waves" in the left navigation menu.
  3. A new page will open listing your current migration waves.
  4. Click the Add icon.
  5. Name the Migration Wave, remember use a logical name representing the migration event.
  6. Click “Save.”
  7. Now that the Migration Wave is created, Devices can be added to the Wave by applying the ‘Set to Migration Wave’ Action to Devices from the Ready Devices table.

 

How do I remove a Migration Wave?  

  1. Login to Active Directory.
  2. Select "Waves" in the left navigation menu.
  3. A new page will open listing your current migration waves.
  4. Select one or more wave in the table.
  5. Click the Remove icon.
  6. Click "Yes" to confirm the removal.

 

How do I edit the name of a Migration Wave?  

  1. Login to Active Directory.
  2. Select "Waves" in the left navigation menu.
  3. A new page will open listing your current migration waves.
  4. Select a wave in the table.
  5. Click the Edit icon.
  6. Edit the name of the Migration Wave.
  7. Click “Save.”

 

How do I filter Devices by Migration Wave?  

  1. Login to Active Directory.
  2. Select "Devices + Servers" in the left navigation menu.
  3. On the Ready Devices tab, click the Filter icon.
  4. Select one or more wave under the Waves filter category.
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택