Virtual private networks (VPNs) give your users secure remote access to your organization network. In the examples, the Trusted Root and SCEP profiles are named as follows. ![]() ![]() The examples in this guide use SCEP certificate authentication for these profiles and assume that the Trusted Root and SCEP profiles work correctly on the device. What successful VPN profiles look like on your deviceĮntries in Company Portal logs of successful VPN profile deployment This article is divided into the following sections: This guide helps you understand and troubleshoot VPN profile issues that you may encounter when you use Microsoft Intune.
0 Comments
Leave a Reply. |