How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune

Let’s discuss How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune. UPN Name Hints Policy in Microsoft Intune is related to Microsoft Entra joined (formerly Azure AD joined) in a hybrid environment.

This policy is used to addresses challenge in hybrid-joined devices face when trying to authenticate or interact with on-premises Active Directory Domain Controllers (AD DCs). Unlike a traditional domain-joined device, a hybrid Microsoft Entra joined device lacks the automatic DC discovery mechanism for the on-premises AD forest.

When such a device tries to authenticate a user whose UPN needs to be resolved by an on-premises AD DC, it can fail because it doesn’t know which AD domain or DC to ask. As a solution for this, This policy provides a static, pre-configured list of Active Directory domains that the device should use as “hints” or fallback options when the automatic resolution process fails.

This policy provide many advanatges for admins, users and organization. By configuring this policy, you can Enhances user experience and productivity by enabling seamless Single Sign-On (SSO) to on-premises services like file shares, legacy applications, and intranets.

Patch My PC

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune

The UPN Name Hints policy is critically important in a hybrid environment because it bridges the authentication gap between cloud-centric (Microsoft Entra ID) device identity and on-premises (Active Directory) resource identity.

It is a necessary configuration to ensure that hybrid Microsoft Entra joined devices can still participate fully in the on-premises Kerberos authentication ecosystem, thus maintaining business continuity and a smooth user experience during the transition to a cloud-first infrastructure.

Configure UPN Name Hints Policy from Intune Portal

You can easily configure UPN Name Hints Policy from Microsoft Intune Portal. For this, Sign in with Microsoft Intune Admin center. Go to Devices > Configuration > +Create >+ New Policy.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.1
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.1

Create a Profile

After that, you can Create a Profile for the policy which you want to configure. To create a profile you have to select platform and profile type. Here I selected Windows 10 and later as the Platform and Settings catalog as the profile type. Then click on the Create button.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.2
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.2

Adding Basic Details

On the Basic tab you can add Name and Description for the policy for further reference. The Name field is necessary to identify the purpose of the policy and description shows more information. The Name is mandatory and if you like to add description you can add. Click on the Next Button.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.3
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.3

Configure the Windows Apps Access Tasks

The Configuration settings page is provided to select the settings to create the policy. The Settings Catalog provides a huge number of settings. To select a settings click on the +Add settings hyperlink. Then you will get Settings Picker. Choose Kerberos and select UPN Name Hints. Then I close the Settings Picker.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.4
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.4

Selecting Value

If your organization has a single on-premises Active Directory domain called corp.contoso.local. If contoso.com is the UPN suffix and/or the forest root, listing it is often enough to allow the device to find a Domain Controller within that forest. This is generally the most effective way to configure the hint. After that click on the Next button.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.5
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.5

How to Add Scope Tags

By using scope tags you can restrict the visiblity of Windows Apps Access Email Settings. It is helps to organize resources as well. Here I would like to skip this section, because it is not mandatory. Click on the Next button.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.6
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.6

Assignment Tab for Choosing Group

To assign the policy to specific groups, you can use the Assignment Tab. Here I click, +Add groups option under Included groups. I choose a group from the list of groups and click on the Select button. Again, I click on the Select button to continue.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.7
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.7

Last Step of Policy Creation

To complete the policy creation you can review all the policy details on the Review + create tab. It helps to avoid mistakes and successfully configure the policy. After varifying all the details click on the Create Button. After creating the policy you will get success message.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.8
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.8

Device Check-in Status

The Device Check-in Status page shows whether the policy has succeeded or not. To quickly configure the policy and take advantage of the policy sync, the device on the Company Portal, Open the Intune Portal. Go to Devices > Configuration > Search for the Policy. Here, the policy shows as successful.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.9
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.9

Event Viewer

If you get success message, that doesn’t means you will get the policy advanatges. To varify the policy successfully configured to client device check the Event Viwer. Filter for Event ID 814: This will help you quickly find the relevant logs.

Open Event Viewer: Go to Start > Event Viewer. Navigate to Logs: In the left pane, go to Application and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider > Admin.

MDM PolicyManager: Set policy string, Policy: (UPNNameHints), Area: (Kerberos), EnrollmentID
requesting merge: (EB427D85-802F-46D9-A3E2-D5B414587F63), Current User: (Device), String:
(ContosoCorp.local), Enrollment Type: (0x6), Scope: (0x0).

Removing the Assigned Group from UPN Name Hints Policy

If you want to remove the Assigned group from the policy, it is possible from Intune Portal. To do this open the Policy on Intune Portal and Edit the Assignments tab and Remove the Policy.

To get more detailed information, you can refer to our previous post – Learn How to Delete or Remove App Assignment from Intune using by Step-by-Step Guide.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.11
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.11

How to Delete UPN Name Hints

You can easily delete the Policy from Intune Portal From the Configuration section you can delete the policy. It will completely remove from the client devices.

For detailed information, you can refer to our previous post – How to Delete Allow Clipboard History Policy in Intune Step by Step Guide.

How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.12
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.12

Windows CSP Details

Enable/disable kiosk browser’s end session button. When the policy is enabled, the Kiosk Browser app shows a button to reset the browser. When the user selects the button, the app will prompt the user for confirmation to end the session. When the user confirms, the Kiosk browser will clear all browsing data (cache, cookies, etc.) and navigate back to the default URL.

ValueDescription
1Enable.
0 (Default)Disable.
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Table.1
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune - Fig.13
How to Force Entra ID Devices with UPN Name Hints Policy to Find On-Prem AD DCs using Intune – Fig.13

Need Further Assistance or Have Technical Questions?

Join the LinkedIn Page and Telegram group to get the step-by-step guides and news updates. Join our Meetup Page to participate in User group meetings. Also, Join the WhatsApp Community to get the latest news on  Microsoft Technologies. We are there on Reddit as well.

Author

Anoop C Nair has been Microsoft MVP for 10 consecutive years from 2015 onwards. He is a Workplace Solution Architect with more than 22+ years of experience in Workplace technologies. He is a Blogger, Speaker, and Local User Group Community leader. His primary focus is on Device Management technologies like SCCM and Intune. He writes about technologies like Intune, SCCM,  Windows, Cloud PC,  Entra, Microsoft Security, Career, etc.

Leave a Comment