Window Autopilot is answer to the question, how can we get a Windows 10 device corporate ready with all configurations, policies, applications without connecting the device to corporate network? Internet based client management and cloud management gateways has been there for quite many years, but it only allows management of the device over the internet, not provisioning of device over internet.
Windows Autopilot simplifies lifecycle of a device (from delivery to retirement of device) as this moves administrators away from the efforts of creating, deploying and managing custom images for various scenarios like wipe-reload, refresh etc. Once a device enters Windows Autopilot lifecycle, the device can be repurposed or assigned to other user with very little efforts from administrators.
Autopilot configured devices can be shipped to the users directly by OEMs, user just has to power on the device -> connect to WiFi -> Â Enter Azure AD credentials to initiate Autopilot deployment. Rest all configuration tasks are automated. Autopilot devices are deployed and managed with speed and ease of cloud MDM solution i.e. Intune (or any other MDM service), enhancing user experience for Windows 10 deployments.
In this article I will describe how to implement Windows Autopilot and how to provision Windows 10 devices with Autopilot, for User-driven Azure AD joined scenario.
Contents of this article
- Â Prerequisites
- Licensing requirements
- Software Requirement
- Network Requirement
- Configuration Steps
- Configure who can join device to Azure AD
- Configure Azure Active Directory automatic enrollment (MDM User Scope)
- Assign User with Intune License
- Configure Azure Active Directory custom branding (Optional)
- Configure Enrollment Status Page (Optional)
- Create Windows Autopilot deployment profile
- Registering device for Autopilot
- Assign Windows Autopilot Deployment profile
- Assign user to an Autopilot device (Optional)
- Windows Autopilot deployment in action
Prerequisites
Licensing requirements
At the time of writing this post, these are the licenses required to implement Windows Autopilot
- Microsoft Intune Subscription (or an alternative MDM service subscription/license)
- Azure Active Directory Premium Subscription (For Windows 10 automatic enrollment)
At the time of writing this post, following subscriptions include above mentioned Intune and Azure AD licenses:
- Microsoft 365 Business Premium subscription
- Microsoft 365 F1 or F3 subscription
- Microsoft 365 Academic A1, A3, or A5 subscription
- Microsoft 365 Enterprise E3 or E5 subscription, which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune).
- Enterprise Mobility + Security E3 or E5 subscription, which include all needed Azure AD and Intune features.
- Intune for Education subscription, which include all needed Azure AD and Intune features.
- Azure Active Directory Premium P1 or P2 and Microsoft Intune subscription (or an alternative MDM service)
Software Requirement
At the time of writing this post, Supported version of Windows 10 (1703 or later), following editions are supported
- Windows 10 Pro
- Windows 10 Pro Education
- Windows 10 Pro for Workstations
- Windows 10 Enterprise
- Windows 10 Education
- Windows 10 Enterprise 2019 LTSC
Network Requirement
In general, a good Internet connection is all that is needed. However, it is highly recommended to refer this Microsoft article for the network requirement if internet access is restricted by firewall.
Configuration Steps
Configure who can join device to Azure AD
Configure Azure Active Directory automatic enrollment (MDM User Scope)
Assign User with Intune License
Azure Portal -> Azure Active Directory -> Users
Microsoft Intune now has its own separate portal, https://devicemanagement.microsoft.com. Intune license assignment can be managed for here as well.
Configure Azure Active Directory custom branding (Optional)
Branding is configured from Azure Active Directory -> Company Branding. A default blank branding profile is already created, you can modify the same or create a new one.
Configure Enrollment Status Page (Optional)
When user sign is to an Autopilot provisioned device for the first time in OOBE phase they are present with a status page that show progress of device enrollment. Though this is an optional step because a default ESP exists but its configured to not show configuration progress during the enrollment. It is recommended to configure existing one to show progress or create new one to provide a better user experience. Enrollment status page (ESP) if configured properly, also ensures device is properly configured before user can access the desktop for the first time. Further details of ESP and benefits of configuring the same are document here.
Sign into Microsoft Endpoint Manager admin center -> Devices -> Windows
Select Windows Enrollment -> Enrollment Status Page
Default ESP exists here however its not configured to show configuration progress to the end user. Click Create.
Give it descriptive Name -> Next
In the setting section, configure Yes to Show app and profile configuration progress. Enabling this setting, provides many configurable settings on you wish to show the users during enrollment.
By configuring following settings is can ensured that device has all minimum required configurations before use can access the desktop for the first time.
- Block device use until all apps and profiles are installed
- Block device use until these required apps are installed if they are assigned to the user/device
Enable Allow users to reset device if installation error occurs, a Reset Device button is displayed in case of installation failure. Using this option use can re-initiate the OOBE experience, i.e. Autopilot process.
Click Next. Assign this ESP page to a group -> Next
Review the settings and click Create
Create Windows Autopilot deployment profile
Deployment profiles are used to customize deployment behavior during out-of-box experience (OOBE) phase of Autopilot devices. We can have multiple deployment profiles with different settings targeted to different device groups. Here is the list of all configurable options available.
Deployment profile can be created via Endpoint Manager admin center as well as Microsoft Store for Business portal. Deployment profiles created using Endpoint Manager admin center gets synced with Microsoft Store for Business.
In this article I will show how to create profile using Endpoint Manager admin center.
To create a deployment profile:
Sign into Microsoft Endpoint Manager admin center. Navigate to Devices -> Windows -> Windows enrollment -> Select Deployment Profiles
Click Create Profile
Enter a descriptive name -> click Next
At this stage by enabling Convert all targeted devices to Autopilot, All corporate owned, non-Autopilot devices of assigned group can be registered as Autopilot device and deployment profile will be applicable to them as well. It may take up to 48 hours for the registration to be processed.
By default, devices manually uploaded as Autopilot devices via Endpoint Manager admin center or Microsoft Store for Business will get this profile applied.
By enabling Apply device name template (requires Windows 10, version 1809 or later), unique names for the devices can be created. During Autopilot device enrollment this template will be used to naming a device. if this setting is not configured device name starts with DESKTOP-
Please take a look at this blog post I have written on various ways a computer name can be set during user-driven Azure AD joined Autopilot deployment.
Â
Configure OOBE as desired and click Next.
Assign deployment profile to a group –> click Next
Review the setting and click Create
Registering device for Autopilot
Devices which are registered with Windows Autopilot deployment service qualify for Autopilot deployment. Deployment profiles created in Endpoint Manager admin center are applicable to registered device only. Ideally, device registration is performed by the OEM, reseller, or distributor. But before they can register devices, organization must grant permission them permission for the same.
Organizations can also register device to Autopilot service by collecting hardware ID and uploading them manually either via Microsoft Store for Business or Endpoint Manager admin center. Alternatively, while creating an Autopilot deployment configure Convert all targeted devices to Autopilot to Yes and target this to a group, all corporate owned non-Autopilot devices member of this group will be registered to Windows Autopilot Deployment Service.
Following are the steps to manually extract Hardware IDs from devices and Register the same to Windows Autopilot:
Launch elevated PowerShell and run following script, this will extract Hardware ID to a csv file and save it C:\HWID with name AutoPilotHWID.csv
md c:\\HWID
Set-Location c:\\HWID
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Unrestricted
Install-Script -Name Get-WindowsAutoPilotInfo
Get-WindowsAutoPilotInfo.ps1 -OutputFile AutoPilotHWID.csv
Following are the steps to Upload Hardware IDs to Windows Autopilot Service:
- Sign into Endpoint Manager admin center -> Navigate to Devices -> Windows -> Windows Enrollment -> click Devices
- Click Import -> Browse for csv file containing hardware ID -> click It may take up to 15 minutes for imported devices to be visible here
Here is how it will look after import is successful.
Microsoft Store for Business and Endpoint Manager admin center remain in sync, therefore device Hardware IDs can be uploaded from Microsoft Store for Business as well and device Hardware IDs uploaded from Endpoint Manager admin center will be visible Microsoft Store for Business.
Sign into Microsoft Store for Business -> Manage -> Devices. Here all Autopilot registered device will be listed. Also, device hardware ID can be uploaded here as well.
Using Autopilot deployment option Autopilot Deployment profile can be assigned from Microsoft Store for Business as well.
Assign Windows Autopilot Deployment profile
After device has been registered with Window Autopilot Deployment Service, next step is to assign devices with Deployment profile.
When a device hardware ID is registered to Autopilot service, corresponding Azure AD computer account is created in Azure AD.
To assign deployment profile to an Autopilot registered device, add this computer Azure AD group where Autopilot deployment profile is targeted.
Here is how it will once profile has been assigned:
Alternatively, Profile can be assigned from Microsoft Store for Business as well. Sign in Microsoft Store for Business -> Manage -> Devices.Â
Select the device from the list -> click Autopilot deployment -> Select Deployment Profile
Profile status will appear as Assigned Externally if deployment profile not assigned via Azure AD group membership.
Assign user to an Autopilot device (Optional)
This is optional, however it I would recommend assigning user to an autopilot device as this provides user with more personalized Autopilot deployment experience. Configuring this pre-fills a user from Azure Active Directory during the OOBE phase of Windows setup. Only Intune licensed users can be assigned an Autopilot device from Microsoft Endpoint Manager admin center.
Note:
- Windows 10, version 1809 or later is required for this feature
- Assigning a user to a specific Autopilot device does not work in case of ADFS
Windows Autopilot deployment in action
Based on all the configurations we did, here is how end user experience is going be when user powers on the device:
User selects Keyboard layout
User connects device to Internet
Because we have assigned this Autopilot device to a user, user will get a personal welcome message. User enters the password -> clicks Next
This is how enrollment status page looks, user will see this only ESP is configured to show this progress to the user:
When all assigned policies, configuration and apps are installed user can access the desktop.
Device is joined to Azure AD
Â
I hope this post has been helpful for you. Please feel free to reach out if you have any further questions/comments/feedback.
Thank you.