Contact Sales

To contact our sales team, you can use the form below. Do not use this form for tickets or help desk, click here to create a ticket.

Please fill out the sales form below and we will reply as soon as possible.

Synchronise and migrate users and workstation between on-prem AD, Entra ID, Google the easy way. Seamlessly Move devices between AD Joined, Hybrid and Entra Joined.
  • Create ticket
  • Home
  • Getting Started

Known Issues and Limitations - Migration Agent

Written by Conrad Murray

Updated at March 25th, 2026

Contact Sales

To contact our sales team, you can use the form below. Do not use this form for tickets or help desk, click here to create a ticket.

Please fill out the contact form below and we will reply as soon as possible.

  • Getting Started
  • FAQs
  • API Documentation
  • Integrations
  • Migration Agent
  • Directory Synchronisation
  • Remote DC agent
  • Remote Password Sync Agent
  • Install and Configure
  • Support
  • Complex Expressions
+ More

Table of Contents

Version General macOS Testing Network Offline Domain Join Hybrid Entra Join Entra Join Intune Enrollment Intune Deployed Applications Conditional Access Restrictions Applications End Point Protection Tools VPNs WORKGROUP computers Admin Fallback Account Password User Profile in Use BitLocker Windows Services Scheduled Tasks SQL Server Office OneDrive for Business OneDrive Lists Outlook Microsoft Teams Azure Information Protection Microsoft Edge Google Chrome Multiple Migrations of the same Computer Deleting Computers in the source directory.

Version

This document is relevant to PowerSyncPro Workstation Migration Agent version 3.2.x

 

General

PowerSyncPro Migration Agent is a Workstation reconfiguration tool designed to primarily disjoin and join devices between Active Directory or Entra ID.  It will repermission Windows Profiles and reconfigure the baseline Microsoft Office Suite of applications to the fresh start experiences where necessary.

 

macOS

PowerSyncPro Migration Agent is not currently supported on macOS.

 

Testing

Proof of concept testing should be conducted in advance against as many representative workstations as possible to ensure the greatest level of success.  Especially around critical applications and particularly 3rd party and in-house custom applications.  En-point protections tools like CarbonBlack and CrowdStrike etc should be thoroughly tested.  Also check that VPN are still functional post-migration.

 

Network

For all migrations the workstation needs persistent network access to the PowerSyncPro Server for the duration of the migration event, typically over TCP Port 5000 or port 443 depending on your configuration.

 

For Active Directory Join (without ODJ) and Hybrid Entra Join, the workstation needs network access to a target Domain Controller.

 

For Entra Join and Hybrid Entra Join the workstation needs network access to Entra.

 

Offline Domain Join

For Offline domain join, the PowerSyncPro server requires a persistent connection to a target Domain Controller.

 

Offline domain join works without workstation connectivity to a Domain Controller - providing the user has cached their target credentials in advance.  NOTE:  After an Offline Domain Join AD to AD migration, the workstation must connect with a Domain Controller to initiate and complete the Hybrid Entra Join process.  Workstations will not start the Hybrid Join process until a Domain Controller is available.

 

Hybrid Entra Join

Hybrid Entra Join of devices generally requires client environmental configurations for Entra Connect and Group Policy applied to Workstations.  PowerSyncPro can leverage Controlled Domain Join "CDJ" where a device is not changing its Active Directory join state but needs to Hybrid Entra Join to a different tenant to which the home AD is currently syncing.  A second Entra connect instance is required to sync in the devices from the source AD to the target tenant.

 

Entra Join

Entra Join is achieved by using a bulk enrollment token created within PowerSyncPro.  MFA should be excluded as a requirement to Entra Join to a tenant on Conditional Access policies.  The setting in Entra:  Require Multifactor Authentication to register or join devices with Microsoft Entra must be set to No for automated Entra join with PowerSyncPro to correctly execute.

 

Intune Enrollment

Allow enrollment of personally owned devices is a requirement for Intune Enrollment.

 

Intune Deployed Applications

Applications that were deployed from a source tenant, that were set to REQUIRED in Intune, will be uninstalled when a device "leaves" the source Intune. A workaround can be provided – please contact support.

 

NOTE:  This issue does NOT exist for PowerSyncPro Migration Agent when deployed via Intune as a required application.

 

Conditional Access Restrictions

Conditional Access policies that immediately require a Hybrid Joined Device or Compliant Device may fail to allow workstation and user access to Entra and Microsoft 365 until Hybrid Entra Join completes or the device becomes compliant.  Consider using a grace period.

 

Applications

The PowerSyncPro Migration Agent will only reset the following applications to their fresh start status aka "Out of the Box Experience".

 

Outlook

Microsoft Teams

OneDrive for Business

OneNote / OneNote for Windows 10

Microsoft Office Core Applications e.g. Word, Excel, PowerPoint

Microsoft Office licence activation

Edge signed in primary browser profile

 

End Point Protection Tools

The PowerSyncPro Workstation Migration Agent may need to be excluded from End Point Protection tools that may block its ability to execute runbook phases.  Tools such as: CrowdStrike Falcon, VMWare CarbonBlack, SentinelOne, Zscaler, Symantec.

 

VPNs

VPN clients can fail after workstation identity migration because they rely on certificates, machine identity, domain trust, device compliance, or management-delivered profiles that are removed when the device leaves the source environment. These dependencies can create circular connectivity challenges where the device requires VPN access to obtain new credentials or policies needed for the VPN to function.

 

VPN connections should be thoroughly tested on a production build test workstation.

 

WORKGROUP computers

Currently, WORKGROUP (no domain joined) Windows computers cannot be fully orchestrated from withing the PowerSyncPro console.  Additional manual steps are required to register the device so that it maybe be scoped into Batches.

 

Admin Fallback Account Password

The password complexity that you use here must match any policy requirements on the device, otherwise you will see an event log error like: The password does not meet the password policy requirements. Check the minimum password length, password complexity and password history requirements and will not be created.

 

User Profile in Use

Currently there is a limitation where if a process has a User Profile open after a reboot, then that User Profile and associate applications cannot be reconfigured. An event log error like: The process cannot access the file because it is being used by another process will be seen. You should undertake thorough testing in advance on representative workstations to understand any background tasks, services or applications that may be running in the user context.

 

Prevent Login

We strongly recommend using the "Prevent Login" feature that will prohibit in scope users from logging in before the migration is complete.  This will not prevent local admin accounts from logging in.

 

BitLocker

PowerSyncPro agent can migrate workstations that have been encrypted with BitLocker by suspending and re-enabling the BitLocker protectors.  However, if the use of a PIN is a mandated configuration on a workstation, then PowerSyncPro cannot continue its runbook phases after the 1st reboot (or subsequent reboots) until the PIN has been entered.

 

Windows Services

Windows Services with saved credentials cannot always be fully migrated.  Windows Services that leverage non-local credentials will need to be updated. If during and AD to AD migration the User for services will be translated and if the passwords are identical, they will continue to run.

 

Scheduled Tasks

Scheduled tasks with saved credentials cannot be fully migrated.  Scheduled Tasks that leverage non-local credentials will need to be updated manually.

 

SQL Server

SQL Server logins cannot be migrated / translated from Active Directory accounts to Entra accounts.

 

Office

Office Recent Files and Pinned files and folders are not migrated

Office preferences are not migrated

3rd party plugins for Office Applications may not function correctly

 

OneDrive for Business

OneDrive for Business will be available for log on for the primary user after migration.

All previously connected / linked sites are removed including syncing of additional SharePoint and Microsoft Teams document libraries for any nominated tenants.

OneDrive may prompt the user to use an existing folder on the workstation when reconfiguring.  This is expected behaviour due to the target folder being created in advance by the PSPMA Agent to retain non dehydrated files.

 

A screenshot of a computer screen

Description automatically generated

 

OneDrive Lists

The OneDrive Lists Desktop Application is not reconfigured.

 

Outlook

Outlook Additional mailboxes and PSTs previously connected to Outlook profiles will need to be reattached / reconnected.

Outlook Preferences that are stored in the Outlook profile or in the cloud are not migrated.

3rd party plugins may need to be reconfigured.

 

Microsoft Teams

Any Microsoft Teams' preferences that are stored in the cloud are not migrated.

 

Azure Information Protection

AIP encrypted files will only open again from the target tenant providing they have been migrated correctly and that the AIP keys from the Source tenant have been added to the target tenant.

The Windows workstation will be bootstrapped by PowerSyncPro to get the new keys/policies from the new tenant.

 

Microsoft Edge

If you are migrating between tenants

Microsoft Edge signed in Profiles – requires the user to sign out once and sign in again.  Users will have the option to merge data to refresh the profile and then begin syncing to the target tenant.

Saved Passwords are not preserved / migrated

 

Local Edge profiles will lose passwords in all migrations where re-permissioning a windows profile occurs.

 

If you are migrating AD to Entra Joined – same tenant, then signed in Edge browser profiles are untouched and bookmarks and passwords are preserved

 

Google Chrome

The Windows Accounts extension "Microsoft Single Sign-On" for Google Chrome Profile requires the user to sign out once and sign in again to refresh the profile and reenable syncing.

Saved Passwords are not preserved / migrated

 

If you are using Chrome local profiles, that are not signed in with a Goole account and Google Password Manager enabled, then those passwords will not be preserved / migrated.

 

Multiple Migrations of the same Computer

A PowerSyncPro Migration Agent licence is tied to the device.  A device can be migrated as many times as required.  E.g. Apps only re-configuration, then AD to AD and then AD to Entra, however the following issues should be understood.

 

Currently scoping a device for migration is always done from the directory where the agent was first registered.  E.g. If you are migrating AD to AD from Contoso to Fabrikam and then AD to Entra Joined Fabrikam to "Entra Fabrikam" your Runbook and Batches will need to include the Contoso AD as a source directory for your 2nd pass migration, and the computer should be selected from the Contoso AD when adding to a batch.

 

Deleting Computers in the source directory.

Currently, if you delete a computer from the source AD post migration, that deletion will sync to the PSP Database and it will no longer be available for scoping.  If this is a use case for you then you should consider deferring your source AD computer clean-up.

 

When migrating from Entra joined state.  The device is always deleted from Entra ID during the migration phase.  If you need to do a 2nd pass migration, then currently you will not be able to scope the device.  In this instance, you will need to uninstall the PSP Agent from the device and the associated registry keys and then re-deploy the PSP Migration Agent.  It will still be licensed for its next migration.

restrictions problems known issues limitations

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Agent fails to register with: A transient HTTP error occurred while contacting PSP server: Error code: InternalServerError
  • Migration Agent is not starting or registering on a device
  • Migration Agent fails to install - File contains a virus or potentially unwanted software (0x800700E1)

Subscribe to Newsletter

Drop your email in the box below to sign up. We promise to keep our updates relevant and useful – and we’ll never share your details.

PowerSyncPro's logo

PowerSyncPro is the ultimate product for easing the pain and frustration during mergers, acquisitions, divestitures, and consolidations.

Terms & Conditions

  • FAQs
  • Privacy Policy
  • Cookies
  • Anti Slavery Notice

PowerSyncPro

  • Case Studies
  • Contact sales
  • Meet the Team
  • EULA

Get Connected

Room 73, Wrest House, Wrest Park, Silsoe, Bedford, England, MK45 4HR
info@powersyncpro.com

Twitter Youtube Linkedin

Expand