Windows Computers Intune joined, have intermittent disconnect to AD/ print services.

Jon (Admin) 0 Reputation points
2025-12-15T03:09:44.5133333+00:00

We have several windows computers joined to Intune; while communicating to a on prem DC on Server 2025. Several months before I joined, the windows computers started having issues connecting to the print servers. They will get the "unable to communicate to the domain controller to authenticate this service request" error, or "the credentials provided are not sufficient to access this resource". Rebooting the computer, or clearing the credentials sometimes are successful. There are two DCs but the primary DC is located at the same site as all the Windows computers (mainly MAC env).

All users have Windows Hello for Business setup (mainly thumbprint login); so we suspect the issue is related to how the credentials on the end client communicate to the DC via WHfB. We are looking for other possible ideas and solutions, but are right now, looking at setting up Kereboros on Azure to handle the communication.

thoughts?

Windows for business | Windows Server | Directory services | Certificates and public key infrastructure (PKI)
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Q&A Assist
    2025-12-15T03:10:01.5833333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The issues you are experiencing with Windows computers joined to Intune, particularly the intermittent disconnects to Active Directory (AD) and print services, may stem from several factors. Here are some considerations and potential solutions:

    1. Windows Hello for Business (WHfB) Configuration: Since all users have Windows Hello for Business set up, ensure that the configuration is correct and that the devices are properly registered with the AD. Misconfigurations can lead to authentication issues.
    2. Kerberos Authentication: If you are considering setting up Kerberos on Azure, ensure that the Kerberos configuration is compatible with your on-premises AD. Kerberos relies on proper ticket granting and may require adjustments in your AD settings to ensure seamless communication.
    3. Network Connectivity: Check the network connectivity between the Windows computers and the domain controllers. Intermittent network issues can lead to authentication failures. Ensure that there are no firewall rules or network policies that could be blocking traffic.
    4. Credential Caching: The caching of credentials may play a role in the intermittent authentication issues. If users are frequently prompted for credentials, consider reviewing the credential manager settings and policies related to credential caching.
    5. Active Directory Domain Controller Health: Since you have two domain controllers, verify that both are functioning correctly. Issues with the primary DC can cause authentication problems for clients. Regularly check the health of your DCs and ensure they are replicating properly.
    6. Event Logs: Review the event logs on both the client machines and the domain controllers for any errors or warnings that could provide more insight into the authentication failures.
    7. User-Based Authentication: As cloud-native endpoints do not support machine authentication, ensure that your applications and services are configured to use user-based authentication instead of machine accounts. This could alleviate some of the issues related to accessing resources.

    By addressing these areas, you may be able to resolve the intermittent disconnects and authentication issues with your Windows computers.


    References:

    0 comments No comments

  2. Harry Phan 10,770 Reputation points Independent Advisor
    2025-12-15T03:53:32.9366667+00:00

    Hello Jon (Admin)

    Based on the symptoms you described, the intermittent connectivity to the print servers often points to credential handling between Windows Hello for Business (WHfB) and the on-premises domain controllers. Since WHfB relies on key-based authentication rather than traditional passwords, certain legacy services (like print servers) may not fully recognize the credential flow, especially if Kerberos tickets are not being issued consistently. I recommend verifying that your domain controllers are properly configured to support WHfB key trust or certificate trust models, and ensuring that the print servers are updated to handle Kerberos authentication. Additionally, reviewing event logs on both the client and DC side can help pinpoint whether ticket issuance or replication between the two DCs is contributing to the failures. Setting up Azure Kerberos could indeed provide a more seamless bridge, but it’s worth confirming the on-premises configuration first to avoid introducing unnecessary complexity.

    If this guidance helps move you forward, please consider hitting “Accept Answer” 🙂 - it’s always appreciated!

    Harry.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.