Hi Garman WA, Gary,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Having an issue trying to get computers connected to our domain when the computer is not connected to the domain. We are able to import the has for the computer. Autopilot connects thru the "intune Connector" and adds the computer to AD. Then offers to log in with the e-mail. Once enter the e-mail ESP then installs GlobalProtect just fine. The computer then continues on and offers a login prompt. Try logging and gives a trust relationship error. It offers a GlobalProtect sign in option at the login screen, but still gives the same error. Autopilot woks fine when connected directly to the domain (In the office). Any help would be greatly appreciated. Please let me know if you have any questions.
Hi Garman WA, Gary,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
Hi Garman WA, Gary,
To resolve this, your GlobalProtect client must be configured to establish a Pre-Logon machine tunnel. This is different from a standard user tunnel and requires configuring Intune to push a machine certificate to the device during the initial Device Enrollment Status Page phase. You also need to ensure the VPN configuration is correctly injected into the system registry during installation. Specifically, your portal address must be defined in the HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\PanSetup registry path so the GlobalProtect client knows exactly where to connect before a user profile is ever created.
Once the VPN client installs and reads that registry key, it uses the Intune-deployed machine certificate to silently build a secure tunnel in the background at the lock screen. You must also ensure your Autopilot deployment profile has the option to skip the Active Directory connectivity check configured to yes. This prevents the setup process from failing if the background tunnel takes a few extra seconds to establish. With the machine tunnel active at the login screen, the computer can securely reach the domain controller, validate the domain trust, and process the initial user login without errors.
Hope this answer brought you some useful information, if it did, please hit "accept answer". Should you have any questions, feel free to leave a comment.
VP
The described symptoms match a classic hybrid Autopilot/domain-join trust problem: the device account is created in on-premises AD by the Intune Connector, but at first logon from home the machine cannot contact a domain controller to validate the secure channel, so Windows reports a trust relationship error.
Key points from the scenario:
From the provided context, the following items should be verified and corrected:
msaODJ##### to create computer objects in the target OU. If this account cannot properly create or update the computer object, the resulting machine account may not be usable at logon.
If Autopilot continues to work on-premises but fails only from home, focus on:
References: