Systems Admin

Microsoft Entra Hybrid Join: Step-by-Step Guide

Microsoft Entra Hybrid Join is the configuration that lets a Windows device live in two directories at once — your on-premises Active Directory (e.g. lab.local) and Microsoft Entra ID (e.g. ezaz2281.onmicrosoft.com) — without the user noticing anything has changed. The Windows login still happens with the AD account. Group Policy still applies. But the device now also has a cloud identity, which unlocks Intune, Conditional Access, and Single Sign-On to Microsoft 365.

This is the right device-join model for any organisation that already runs on-prem AD and is moving toward cloud management without a cutover. The previous post in this Entra ID Security pathway covered Entra Registered (BYOD); this one covers Hybrid Join end-to-end — prerequisites, network URLs, OU sync scope, the Entra Connect wizard, the on-client Automatic Device Join task, and four ways to verify it actually worked.

Hybrid vs Joined vs Registered — pick the right model

Feature Entra Registered Entra Joined Hybrid Entra Joined
Needs on-prem AD No No Yes — required
Needs Entra Connect No No Yes — required
Login account Personal/local Entra ID work On-prem AD account
Appears in on-prem AD No No Yes
Appears in Entra ID Yes Yes Yes — both
GPO support No No Yes
Intune policies Limited Full Full
SSO to M365 Yes Yes Yes
Conditional Access Partial Full Full
Best for BYOD Cloud-only Hybrid environments

Prerequisites

Requirement Lab value
On-prem AD domain lab.local with at least one DC
Microsoft Entra Connect Installed on the DC and actively syncing
Entra ID tenant ezaz2281.onmicrosoft.com
Global Admin account For the Entra Connect wizard sign-in
Enterprise Admin account For one-time SCP creation in AD
OU in sync scope The OU holding computer objects
Client OS Windows 10 or Windows 11
Network URLs reachable Four Microsoft endpoints (next section)
License Entra ID Free is sufficient
Microsoft Entra Admin Center Overview page showing the Microsoft Entra Connect status section displaying Enabled and a recent Last sync timestamp confirming Entra Connect is installed and actively syncing identities to Entra ID
Pre-flight — Entra Admin Center > Overview > Microsoft Entra Connect shows Enabled with a recent sync timestamp.

The four URLs that must reach Microsoft

Hybrid Join talks to four Microsoft endpoints. If any of them are blocked by a proxy or firewall, the join silently fails — the device will be domain-joined but never registers in Entra ID, and you’ll waste a long afternoon hunting for a clean error message that doesn’t exist.

URL Purpose
https://enterpriseregistration.windows.net Device registration endpoint
https://login.microsoftonline.com Authentication during registration
https://device.login.microsoftonline.com Device login endpoint used during the join itself
https://autologon.microsoftazuread-sso.com Required if Seamless SSO is enabled or planned

Allow them via Group Policy

  1. On the DC, open Group Policy Management.
  2. Edit Default Domain Policy (or a new GPO).
  3. Computer Configuration > Policies > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page > Site to Zone Assignment List.
  4. Enable. Click Show. Add each URL with value 1 (Intranet zone).
  5. OK / Apply / OK.

Even if your users only ever touch Edge or Chrome, the Windows authentication stack still reads this Internet Explorer zone list during registration. It’s legacy, it’s real, configure it.

Group Policy Management Editor showing the Site to Zone Assignment List policy enabled with the four Microsoft URLs added enterpriseregistration.windows.net login.microsoftonline.com device.login.microsoftonline.com and autologon.microsoftazuread-sso.com all set to value 1 for the Intranet zone
Group Policy — Site to Zone Assignment List with the four Hybrid Join URLs set to value 1 (Intranet zone). Block any of these and Hybrid Join silently fails.

Computers OU must be in the Entra Connect sync scope

When a device joins lab.local, a computer object is created in CN=Computers (or your custom OU). For that object to reach the cloud, the OU has to be in Entra Connect’s sync scope. If it isn’t, the cert never syncs and the device never registers.

Active Directory Users and Computers MMC console showing the Computers container in the lab.local domain with several computer objects listed which is the OU that must be included in the Entra Connect synchronization scope for Hybrid Join to push devices to the cloud
On-prem AD — the Computers container (or your custom OU) holds the computer objects that need to be in the sync scope.
  1. On the DC: Start > Synchronization Service Manager (installed with Entra Connect).
  2. Connectors tab > double-click your lab.local connector.
  3. Configure Directory Partitions > click Containers.
  4. Enter on-prem Administrator credentials when prompted (any account that can read AD — doesn’t need to be Enterprise Admin).
  5. In the Select Containers window, tick the OU your computer objects live in. Default is Computers.
  6. OK out of every dialog.
Microsoft Entra Connect Synchronization Service Manager Connector configuration showing the Containers selection dialog with the Computers OU in lab.local checked confirming this OU is included in the sync scope so device objects will be synchronized to Entra ID
Synchronization Service Manager > Connectors > lab.local > Configure Directory Partitions > Containers. Tick the OU your computer objects live in.

Run the Entra Connect Hybrid Join wizard

This is where the Service Connection Point (SCP) gets created in AD. The SCP is a tiny config object that tells client devices ‘here’s your Entra ID tenant name and tenant ID’ so the Automatic Device Join task knows where to register. Without the SCP, clients have nowhere to call.

  1. Open the Microsoft Entra Connect shortcut on the DC desktop (may still say Azure AD Connect — same tool).
  2. Welcome > Configure.
  3. Select Configure device options > Next.
  4. Read the Hybrid Join / Device Writeback intro > Next.
  5. Sign in with Global Admin (or Hybrid Identity Admin) > complete MFA > Next.
  6. Device Options screen: Configure Hybrid Microsoft Entra ID Join is selected by default. Next.
  7. Device Operating Systems: tick Windows 10 or later domain joined devices. Add Supported Windows down-level only if you have Win 7 / 8.1. Next.
  8. SCP screen: confirm forest = lab.local. Authentication Service = Microsoft Entra ID (NOT AD FS unless you actually run AD FS). Click Add under Enterprise Administrator credentials.
  9. Enter the on-prem Enterprise Admin username and password > OK > Next.
Microsoft Entra Connect configuration wizard Service Connection Point screen showing the lab.local forest with Microsoft Entra ID selected as the authentication service and Enterprise Administrator credentials added ready to create the SCP object in on-prem Active Directory
Entra Connect wizard > Configure device options > Hybrid Join > SCP screen with Enterprise Admin creds added. Click Next to write the SCP into AD.
  1. Review summary > Configure.
  2. Wait a few seconds > Configuration complete > Exit.
Microsoft Entra Connect wizard final Configuration complete screen confirming the Hybrid Join setup completed successfully with the Service Connection Point created in on-prem Active Directory and Entra Connect now configured to sync hybrid join data
Wizard finished — Configuration complete. SCP is now in CN=Configuration > Services > Device Registration Configuration.

The Enterprise Admin credentials are used only for this one-time SCP creation. They’re not stored. After the SCP exists, you can revoke Enterprise Admin from that account — but keep the account around in case you need to re-run the wizard.

Force a sync to push devices to Entra ID

Trigger an initial sync immediately so existing computer objects flow up:

Start-ADSyncSyncCycle -PolicyType Initial

For routine subsequent syncs, delta is fine:

Start-ADSyncSyncCycle -PolicyType Delta

Watch progress in Synchronization Service Manager > Operations tab. After the run completes, wait 5–10 minutes before checking Entra Admin Center — cloud propagation is fast but not instant.

Domain-join the client (if it isn’t already)

  1. On the Win 10/11 client: System > Domain or workgroup (or Advanced system settings > Computer Name > Change).
  2. Member of: Domain > type lab.local.
  3. Domain admin creds > OK > Welcome message > Restart.
  4. Sign in with a domain account.

The Automatic Device Join task — how the cloud half completes

You don’t register the client manually. A built-in Windows scheduled task does it after the device joins the domain and reboots:

  1. Task Scheduler > Task Scheduler Library > Microsoft > Windows > Workplace Join.
  2. Right pane shows Automatic Device Join.
State Meaning
Disabled Device not joined to any AD domain. Expected pre-domain-join.
Ready Domain-joined; task is armed and will run on next login.
Running → finished Task contacted Entra ID, got a cert, registration complete.
Windows Task Scheduler showing the Workplace Join folder under Microsoft Windows with the Automatic Device Join task in Disabled state because the device is not yet joined to a domain confirming task transitions to Ready after domain join and reboot
Task Scheduler > Microsoft > Windows > Workplace Join > Automatic Device Join. Disabled before domain join, Ready after.

What the task actually does

  1. Reads the SCP from AD — learns the tenant name and tenant ID.
  2. Contacts Entra ID at the registration endpoint, authenticates as the device using domain creds.
  3. Entra ID issues a certificate.
  4. The cert’s public key lands in the device’s on-prem AD computer object under the userCertificate attribute.
  5. Entra Connect on its next sync sees the populated userCertificate, syncs the device object up, and the device shows up in Entra Admin Center as Hybrid Joined.

Empty userCertificate = no sync. Entra Connect has a built-in sync rule that explicitly skips device objects without a certificate. If your device is missing from Entra Admin Center, this attribute is the first thing to check.

Verify the Hybrid Join — four methods

Method 1 — dsregcmd /status on the client

After the reboot and a few minutes for the task to complete:

AzureAdJoined : YES
DomainJoined  : YES
AzureAdPrt    : YES

Both AzureAdJoined and DomainJoined as YES = Hybrid Joined. AzureAdPrt YES = Primary Refresh Token issued, SSO will work. If you run dsregcmd before reboot, AzureAdJoined will still be NO — that’s expected.

Command Prompt window showing dsregcmd slash status output Device State section displaying AzureAdJoined YES DomainJoined YES and AzureAdPrt YES which is the canonical signature of a successfully Hybrid Entra Joined Windows device with Primary Refresh Token active
Verification 1 — dsregcmd /status: AzureAdJoined: YES + DomainJoined: YES + AzureAdPrt: YES. The Hybrid Join signature.

Method 2 — Entra Admin Center

entra.microsoft.com > Identity > Devices > All Devices > search by hostname. Join Type should read Microsoft Entra Hybrid Joined.

Microsoft Entra Admin Center Devices All Devices page filtered to show the newly Hybrid Joined Windows device with Join Type column displaying Microsoft Entra Hybrid Joined and Owner column showing the user that holds the device
Verification 2a — Entra Admin Center > Identity > Devices > All Devices. Join Type = Microsoft Entra Hybrid Joined.
Entra Admin Center device properties detail panel showing the Device ID OS version compliance status enabled flag join type and registration timestamp for a Hybrid Joined Windows 11 device confirming all metadata flowed across from on-prem AD
Verification 2b — click into the device for full properties: Device ID, OS, compliance, registration date.
Entra Admin Center single user Devices view filtered for the user who logged in on the Hybrid Joined device showing the device listed under that user account confirming the user device relationship synced from on-prem AD to the cloud
Verification 2c — Identity > Users > the user > Devices shows the same device under their account.

Method 3 — userCertificate attribute in AD

On the DC: AD Users and Computers > find the device’s computer object > Properties > Attribute Editor > userCertificate. Should contain a certificate value, not be empty. Empty = the Auto Device Join task didn’t complete or failed.

Active Directory Users and Computers Properties dialog Attribute Editor tab for the computer object showing the userCertificate attribute populated with a certificate value confirming the Automatic Device Join task completed successfully and the cert was written back to AD
Verification 3 — on-prem AD > computer object > Attribute Editor > userCertificate populated. Empty here = sync will skip the device.

Method 4 — the SCP in ADSI Edit

To prove the SCP exists with the right tenant info:

  1. ADSI Edit on the DC.
  2. Connect to: Configuration.
  3. Configuration > Services > Device Registration Configuration.
  4. Properties > keywords attribute — should hold azureADName:ezaz2281.onmicrosoft.com and azureADId:<tenant-guid>.
ADSI Edit window connected to the Configuration partition expanded to Services Device Registration Configuration showing the keywords attribute containing the Entra ID tenant name ezaz2281.onmicrosoft.com and the tenant ID confirming the Service Connection Point was created correctly during the Entra Connect wizard
Verification 4 — ADSI Edit > Configuration > Services > Device Registration Configuration. keywords attribute holds your tenant name and ID.

Managing Hybrid Joined devices afterward

From on-prem AD

  • GPOs apply normally — nothing changes about Group Policy
  • SCCM / ConfigMgr, AD Users and Computers, traditional tooling all keep working
  • Devices remain in their original OU as normal computer objects

From Entra Admin Center

  • Hybrid Joined devices visible in Devices > All Devices
  • Intune device configuration profiles apply
  • Conditional Access policies (e.g. require Hybrid Joined to access Exchange Online)
  • Compliance reporting
  • Windows Hello for Business configuration

If you have Intune licensed, you can co-manage — SCCM and Intune both manage the device, with workloads moved gradually from on-prem to cloud at your own pace.

Things that bite people

Device joined to domain, never appears in Entra Admin Center

In order: (1) Auto Device Join task ran? Task Scheduler. (2) userCertificate attribute populated? AD Users and Computers > Attribute Editor. (3) Four URLs reachable? Try opening each in a browser on the client. (4) OU in sync scope? Synchronization Service Manager > Containers. (5) SCP exists with right tenant? ADSI Edit.

dsregcmd still shows AzureAdJoined: NO after reboot

Manually trigger the task: Task Scheduler > Workplace Join > right-click Automatic Device Join > Run. If still NO after that, walk the list above.

Auto Device Join task is Disabled even after domain join

Run gpupdate /force, recheck. If still Disabled, right-click the task > Enable manually.

SCP wizard says Enterprise Admin creds rejected

The account needs Enterprise Admin in the forest root domain, not just Domain Admin in a child domain. Use the forest-root EA account or get one created.

Hybrid Join works for new devices but not legacy ones

Legacy devices need an additional MSI deployment (Windows Installer for the Workplace Join client) and the down-level option ticked in the wizard. Modern Win 10/11 has the task built-in.

Conditional Access policy requires ‘hybrid Azure AD joined’ and blocks everyone

Confirm devices are actually Hybrid Joined in the cloud first (dsregcmd, Entra Admin Center) before turning on a CA policy that requires it. Otherwise you lock the entire workforce out.

Licensing reminder

Hybrid Join itself works on Entra ID Free. The features built on top of it (Conditional Access requiring compliant devices, certain Intune features) need P1 / P2 / Intune licensing separately, but the Hybrid Join configuration is free.

What’s next

That covers the happy path. The next post in the Entra ID Security pathway is the realistic follow-up: Hybrid Join Troubleshooting — the failure modes you’ll actually meet in production, mapped to the exact log entries, registry keys, and event IDs that point at root cause.

Leave a Reply