Close Menu
    Facebook X (Twitter) Instagram
    Saturday, October 11
    X (Twitter) LinkedIn Reddit RSS
    All about Endpoint Management
    • Home
    All about Endpoint Management
    Home»Co-management»Investigating Co-Management Issues with Windows Endpoints in SCCM/Intune

    Investigating Co-Management Issues with Windows Endpoints in SCCM/Intune

    Eswar KonetiBy Eswar KonetiOctober 26, 10:45 pm3 Mins Read Co-management 2,943 Views
    Share
    Facebook Twitter LinkedIn Reddit

    Managing Windows endpoints with SCCM (System Center Configuration Manager) and co-management enabled can be challenging, especially when dealing with co-management issues. In this post, I’ll share insights and troubleshooting steps to help you resolve issues with devices that are supposed to be co-managed by Intune but aren’t appearing as expected.

    Background

    I recently worked on a Power BI report designed to compare devices listed in Active Directory (AD) with those in Intune (via Log Analytics) based on their last logon status. The goal was to identify devices that are co-managed or Intune-enrolled. During this process, I noticed that hundreds of devices—both Windows 10 and Windows 11—were missing from Intune, displaying “Null” in the report, indicating no record of these devices in Intune.

    Initial Investigation

    Since these devices have SCCM agents and should be co-managed, Intune enrollment should have occurred via the co-management configuration. Devices that aren’t co-managed won’t receive any workloads that have been transitioned to Intune, which hinders effective management.

    I decided to pick a handful of these devices to investigate why they weren’t showing as co-managed.

    Troubleshooting Steps

    Step 1: Check Device Status in Entra ID

    1. Start by selecting a device from the Power BI report and searching for it in Entra ID (formerly Azure AD).
    2. Verify if the device is hybrid-joined. As shown in the screenshot (not included here), hybrid join was successful, but the device was only managed by Microsoft Defender for Endpoint (MDE) rather than Intune—indicating that Intune enrollment wasn’t successful.

    image

    Step 2: Verify Device Status in the Intune Portal

    1. Next, look up the device in the Intune portal.
    2. In this case, the device was only showing as managed by MDE and SCCM through tenant attach but was not co-managed. This confirmed that the device wasn’t enrolled in Intune, and co-management hadn’t been properly set up.

    image

    Step 3: Review Device Status in SCCM

    1. Search for the device in SCCM to verify its connection status.
    2. The device was online, active, but not co-managed. This could be confirmed by checking the CoManagementHandler.log, which indicated that co-management was disabled.

      Log location: C:\Windows\CCM\Logs\CoManagementHandler.log

    3. The log confirmed that co-management wasn’t enabled, which meant the device hadn’t enrolled in Intune.

    image

    image

    Additional Checks

    For devices that are successfully enrolled in Intune, a registry key confirms enrollment status, and Event Viewer logs can also provide useful troubleshooting information. For further guidance on diagnosing enrollment issues, refer to Microsoft’s documentation.

    Solution and Script for Remediation

    After identifying the root cause (event viewer, registry), I developed a script to automate the fix. This script clears the problematic registry entries and triggers re-enrollment, allowing devices to join Intune as co-managed devices.

    The script can be run directly on affected devices or deployed via SCCM for a larger scale remediation. After running the script, you can check the CoManagementHandler.log to confirm that co-management is enabled and the device has successfully enrolled in Intune.

    image

    Final Verification

    1. Confirm the device’s co-management status in the CoManagementHandler.log.
    2. Check the Intune portal to ensure the device now appears as co-managed.

    image

    image

    Download the remediation script from my GitHub Repository and follow the instructions to implement it.

    The script does the following.

    1.Deletes registry entries associated with co-management if enrolled via Microsoft’s Intune.

    2.Initiates the device re-enrollment process using Device Enroller.
    3. Runs the co-management compliance baseline rule to ensure proper policy synchronization.

    This process should help you quickly identify and resolve co-management enrollment issues in your environment, allowing you to manage Windows endpoints more effectively in SCCM and Intune.

    AutoEnrollMDM co-management deviceenroller.exe EMS Enroll intune intune SCCM
    Share. Twitter LinkedIn Email Facebook Reddit

    Related Posts

    Export Microsoft Entra ID User Authentication Methods to CSV using PowerShell & Microsoft Graph API

    August 13, 2:08 pm

    SCCM SQL Report – Compare Installed Apps on TWO Different Computers

    July 13, 10:35 am

    Automating Intune Deployment Rings Using Entra ID Dynamic Groups and Regex

    July 01, 10:31 pm

    4 Comments

    1. Sam Theisen on April 5, 2025 7:34 AM

      Currently running into the same exact issue. When I run your script I get the error message "Failed to run CoMgmtSettingsProd"

      Is that because my workloads are not all moved to Intune? I have left client apps, office apps and windows updates as Pilot Intune.

      Thank you for the post btw. Good to know I'm not the only one. Premier support told me to talk to our CSP and our CSP can't figure it out

      Reply
      • Eswar Koneti on April 6, 2025 9:38 AM

        Hi Sam,
        Did you manage to delete the registry keys manually and try to run the co-management workloads on the device manually too if that helps?
        Take a look at the script for the registry keys that required to delete and trigger the compliance baseline policy in the configuration manager applet in control panel for further investigation.
        what does the comgmt log handler says?

        Thanks,
        Eswar

        Reply
    2. Edmon on November 20, 2024 12:03 AM

      Thank you for this post Eswar. I'm currently in this situation but when i call the baseline on your script i'm getting the error: "RPC server unavailable". I have tried disabling the Windows firewall but i'm still getting this error.

      Reply
      • Eswar Koneti on November 21, 2024 9:23 PM

        Hi Edmon,
        can you check if the wufb workload is moved to intune for the device you are investigating? are you able to locate the baseline policy on the client and try to trigger/initiate the policy to see if it works?
        what is the configuration baseline policy appear in configuration manager client applet on endpoint?

        thanks,
        Eswar

        Reply

    Leave a ReplyCancel reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Sign Up

    Get email notifications for new posts.

    Author

    I’m Eswar Koneti ,a tech enthusiast, security advocate, and your guide to Microsoft Intune and Modern Device Management. My goal? To turn complex tech into actionable insights for a streamlined management experience. Let’s navigate this journey together!

    Support

    Awards

    Archives

    © Copyright 2009-2025 Eswar Koneti, All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.