<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>microsoft Archives | XOAP</title>
	<atom:link href="https://xoap.io/tag/microsoft/feed/" rel="self" type="application/rss+xml" />
	<link>https://xoap.io/tag/microsoft/</link>
	<description>Platform for IT infrastructure and workplace automation</description>
	<lastBuildDate>Wed, 24 Dec 2025 07:50:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://xoap.io/wp-content/uploads/2023/11/cropped-favicon-32x32.png</url>
	<title>microsoft Archives | XOAP</title>
	<link>https://xoap.io/tag/microsoft/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>From cryptic SIDs to clear names: The end of Entra identity confusion</title>
		<link>https://xoap.io/the-end-of-entra-identity-confusion/</link>
		
		<dc:creator><![CDATA[Stella]]></dc:creator>
		<pubDate>Wed, 24 Dec 2025 07:50:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[entra id]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://xoap.io/?p=28442</guid>

					<description><![CDATA[<p>Windows Insider Build 27881 introduces native Entra SID-to-name resolution, letting admins finally see clear, human-readable Entra groups and roles on Windows devices without scripts or workarounds.</p>
<p>The post <a href="https://xoap.io/the-end-of-entra-identity-confusion/">From cryptic SIDs to clear names: The end of Entra identity confusion</a> appeared first on <a href="https://xoap.io">XOAP</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="28442" class="elementor elementor-28442" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-86c21a6 e-flex e-con-boxed e-con e-parent" data-id="86c21a6" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-05c1ca8 e-con-full e-flex e-con e-child" data-id="05c1ca8" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
		<div class="elementor-element elementor-element-f9543e8 e-con-full e-flex e-con e-child" data-id="f9543e8" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
		<div class="elementor-element elementor-element-2c46337 e-con-full e-flex e-con e-child" data-id="2c46337" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
				<div class="elementor-element elementor-element-a37a44e elementor-toc--content-ellipsis elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents" data-id="a37a44e" data-element_type="widget" data-e-type="widget" data-settings="{&quot;headings_by_tags&quot;:[&quot;h2&quot;],&quot;container&quot;:&quot;main&quot;,&quot;exclude_headings_by_selector&quot;:[],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;fas fa-arrow-right&quot;,&quot;library&quot;:&quot;fa-solid&quot;,&quot;rendered_tag&quot;:&quot;&lt;svg class=\&quot;e-font-icon-svg e-fas-arrow-right\&quot; viewBox=\&quot;0 0 448 512\&quot; xmlns=\&quot;http:\/\/www.w3.org\/2000\/svg\&quot;&gt;&lt;path d=\&quot;M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;&quot;},&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}" data-widget_type="table-of-contents.default">
				<div class="elementor-widget-container">
									<div class="elementor-toc__header">
						<h4 class="elementor-toc__header-title">
				Table of contents			</h4>
										<div class="elementor-toc__toggle-button elementor-toc__toggle-button--expand" role="button" tabindex="0" aria-controls="elementor-toc__a37a44e" aria-expanded="true" aria-label="Open table of contents"><svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-down" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z"></path></svg></div>
				<div class="elementor-toc__toggle-button elementor-toc__toggle-button--collapse" role="button" tabindex="0" aria-controls="elementor-toc__a37a44e" aria-expanded="true" aria-label="Close table of contents"><svg aria-hidden="true" class="e-font-icon-svg e-fas-chevron-up" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z"></path></svg></div>
					</div>
				<div id="elementor-toc__a37a44e" class="elementor-toc__body">
			<div class="elementor-toc__spinner-container">
				<svg class="elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading" aria-hidden="true" viewBox="0 0 1000 1000" xmlns="http://www.w3.org/2000/svg"><path d="M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z"></path></svg>			</div>
		</div>
						</div>
				</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-970cb6e elementor-widget elementor-widget-text-editor" data-id="970cb6e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>One of the longest-standing pain points for administrators managing Entra-joined devices is finally being addressed. Starting with Windows Insider build 27881, Microsoft has introduced a long-awaited improvement: <strong>Windows can now automatically translate Entra group and Intune role SIDs (like Device Administrators and Company Administrators) into readable names — directly on the device.</strong></p>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-d4c7ac4 e-con-full e-flex e-con e-child" data-id="d4c7ac4" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
				<div class="elementor-element elementor-element-42c5d93 elementor-widget elementor-widget-heading" data-id="42c5d93" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">The mysterious S-1-12-1 SIDs
</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-6d946c5 elementor-widget elementor-widget-text-editor" data-id="6d946c5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>If you’ve ever added an Entra group or Intune role to a local Windows group, you probably noticed that instead of a clear name, you were greeted with a cryptic S-1-12-1-xxxx SID.</p><p>While Entra users have been properly resolved for years, Entra groups and built-in roles were simply invisible to the Windows local identity system. Even critical roles like &#8220;Device Administrators&#8221; would just appear as “Unknown Account,” leaving admins guessing who actually had elevated privileges.</p><p>To make sense of those SIDs, admins relied on PowerShell scripts or community tools, since Windows itself couldn’t ask Entra who those identities really were.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-a07da2c elementor-widget elementor-widget-heading" data-id="a07da2c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">What’s new in Windows Insider Build 27881
</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-0e76239 elementor-widget elementor-widget-text-editor" data-id="0e76239" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Microsoft has quietly filled that long-missing gap with a new feature known internally as AADSidToNameV2Support.<br />This enhancement expands the existing SID-to-name lookup process, which previously handled Entra users, to now include groups and roles as well.</p><p>Here´s what that means in practice: when Windows encounters an unfamiliar Entra SID – whether a user, group, or role – it now follows a smarter resolution process.</p><p>Check the local cache: Windows first looks for the SID in the local identity cache.</p><p>Ask Entra if necessary: If it´s not cached, Windows securely queries Entra to identify who that SID belongs to.</p><p>Cache the result: Once resolved, the translated name is stored locally so it appears instantly next time – even offline.</p><p>This entire process happens quietly in the background, using secure authentication between the device and Entra. The translation data lives under the registry path:</p><p><br /><em>HKLM\SOFTWARE\Microsoft\IdentityStore\Cache\&lt;SID&gt;\IdentityCache</em><br /><em>The Entra SID-to-Name Endpoint</em><br /><em>Under the hood, Windows reaches out to a new Entra endpoint:</em><br /><a href="https://login.microsoftonline.com/&lt;tenant&gt;/sidtoname" target="_blank" rel="noopener"><em>https://login.microsoftonline.com/&lt;tenant&gt;/sidtoname </em></a></p><p><br />Windows builds a device-signed JSON Web Token (JWT) proving its identity and includes the unknown SID in the request. Entra responds with the corresponding identity name and display information. If the lookup succeeds, Windows updates its local cache – meaning the SID will appear correctly from that point forward. If the lookup fails, the SID remains as-is until it can be resolved.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-6ee47cc elementor-widget elementor-widget-heading" data-id="6ee47cc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Backward compatibility with NT4-style names
</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-c3eec4c elementor-widget elementor-widget-text-editor" data-id="c3eec4c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Some legacy Windows components still expect the classic DOMAIN\User format. To support these, Windows automatically generates a compatible alias (for example, AzureAD\GroupName) using a background process called GenAndPersistNT4StyleName. This makes sure that Entra identities can be displayed consistently across both modern and legacy Windows interfaces.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-f4b7f28 elementor-widget elementor-widget-heading" data-id="f4b7f28" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Before and after: What you’ll see
</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-236d8a4 elementor-widget elementor-widget-text-editor" data-id="236d8a4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>With the feature disabled, the local Administrators group might show entries like:</p><p><em>S-1-12-1-1234567890-987654321-&#8230;</em></p><p>Once AADSidToNameV2Support is enabled, those same entries appear as:</p><p><em>Device Administrators</em><br /><em>Company Administrators</em><br /><em>apv2_users</em></p><p>In other words, Entra groups and roles now appear exactly as you expect them to – human-readable, accurate, and instantly recognizable.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-9fb0de9 elementor-widget elementor-widget-heading" data-id="9fb0de9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">Why this change matters
</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-c6a74e9 elementor-widget elementor-widget-text-editor" data-id="c6a74e9" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>This improvement isn’t just about aesthetics. It’s about clarity, manageability, and security. Easier administration – No more guessing which SID corresponds to which Entra group. Better policy targeting – Intune and security baselines can now correctly identify and apply settings to named Entra groups. Improved troubleshooting – Admins can instantly see which cloud identities have local privileges, reducing confusion and potential misconfigurations.</p><p>For now, this enhancement is exclusive to Insider builds and hasn’t yet rolled out to the general release versions of Windows 11 (24H2 or 25H2). But it’s a clear signal that Windows is becoming fully Entra-aware, closing the gap between local and cloud identity management.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-067eb67 elementor-widget elementor-widget-heading" data-id="067eb67" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">The bottom line
</h2>				</div>
				</div>
				<div class="elementor-element elementor-element-f01a45e elementor-widget elementor-widget-text-editor" data-id="f01a45e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>After years of seeing unintelligible SIDs in the local Administrators group, Windows finally understands Entra identities natively. With AADSidToNameV2Support, Microsoft is delivering what admins have been asking for all along: a readable and accurate view of who’s who on a device – no scripts or workarounds required.</p><p>Windows is finally learning to speak Entra fluently and that’s a big win for every IT admin managing cloud-connected devices.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-25cf300 elementor-widget elementor-widget-spacer" data-id="25cf300" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
				<div class="elementor-widget-container">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-4d386dd e-con-full e-flex e-con e-child" data-id="4d386dd" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
		<div class="elementor-element elementor-element-ba9e329 e-con-full e-flex e-con e-child" data-id="ba9e329" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;,&quot;jet_parallax_layout_list&quot;:[]}">
		<div class="elementor-element elementor-element-8a4b2cf e-con-full e-flex e-con e-child" data-id="8a4b2cf" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
				<div class="elementor-element elementor-element-329cfa0 elementor-widget__width-inherit elementor-widget elementor-widget-heading" data-id="329cfa0" data-element_type="widget" data-e-type="widget" data-settings="{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_tablet&quot;:&quot;fadeInDown&quot;}" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default"><a href="https://auth.xoap.io/auth/realms/my.xoap.io/protocol/openid-connect/registrations?client_id=portal&#038;response_type=code&#038;scope=openid%20email&#038;redirect_uri=https://my.xoap.io&#038;kc_locale=en&#038;_ga=2.120291981.440170699.1710334465-1088457358.1705491014" target="_blank">Windows 11 25H2 migration with XOAP</a></h2>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-6519c7b e-con-full e-flex e-con e-child" data-id="6519c7b" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
				<div class="elementor-element elementor-element-a2f8591 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button" data-id="a2f8591" data-element_type="widget" data-e-type="widget" data-settings="{&quot;_animation_mobile&quot;:&quot;none&quot;}" title="Get lifetime access" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="https://auth.xoap.io/auth/realms/my.xoap.io/protocol/openid-connect/registrations?client_id=portal&#038;response_type=code&#038;scope=openid%20email&#038;redirect_uri=https://my.xoap.io&#038;kc_locale=en" target="_blank" title="Start for free">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Start for free</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				<div class="elementor-element elementor-element-a2ed454 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-widget elementor-widget-button" data-id="a2ed454" data-element_type="widget" data-e-type="widget" title="Get lifetime access" data-widget_type="button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
					<a class="elementor-button elementor-button-link elementor-size-sm" href="https://calendly.com/xoap/30min" target="_blank" title="Book a demo">
						<span class="elementor-button-content-wrapper">
									<span class="elementor-button-text">Book a demo</span>
					</span>
					</a>
				</div>
								</div>
				</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-336cfeb e-flex e-con-boxed e-con e-parent" data-id="336cfeb" data-element_type="container" data-e-type="container" data-settings="{&quot;jet_parallax_layout_list&quot;:[]}">
					<div class="e-con-inner">
					</div>
				</div>
				</div>
		<p>The post <a href="https://xoap.io/the-end-of-entra-identity-confusion/">From cryptic SIDs to clear names: The end of Entra identity confusion</a> appeared first on <a href="https://xoap.io">XOAP</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
