ANAVEM
Languagefr
How to Hide EULA During Windows Autopilot Deployment in Intune

How to Hide EULA During Windows Autopilot Deployment in Intune

Configure Microsoft Intune deployment profiles to automatically hide the End User License Agreement during Windows Autopilot device provisioning, streamlining user onboarding.

Evan MaelEvan Mael
March 28, 2026 15 min
mediumautopilot 9 steps 15 min

Why Hide the EULA During Windows Autopilot Deployment?

Windows Autopilot revolutionizes device deployment by enabling zero-touch provisioning, but the default Out-of-Box Experience (OOBE) still presents users with several screens including the End User License Agreement (EULA). For organizations seeking to minimize user interaction during device setup, hiding the EULA creates a more streamlined onboarding experience.

The Microsoft Software License Terms screen typically appears early in the OOBE process, requiring users to scroll through and accept the agreement before proceeding. While this ensures legal compliance in consumer scenarios, enterprise environments often prefer to handle license acceptance through organizational policies and user training rather than individual device setup.

What Does Hiding the EULA Accomplish in Enterprise Deployments?

By configuring Intune deployment profiles to hide the EULA, organizations achieve several benefits. First, it reduces the time users spend on device setup, allowing them to reach productivity faster. Second, it eliminates potential confusion for non-technical users who might hesitate at legal language during their first device experience. Third, it provides IT administrators with greater control over the deployment process, ensuring consistent experiences across all devices.

This configuration works seamlessly with other OOBE customizations, such as hiding privacy settings and automatically configuring regional preferences. The result is a deployment process that can progress from power-on to user desktop with minimal interaction, particularly valuable for remote deployments or bulk device provisioning scenarios.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center

Open your web browser and navigate to the Microsoft Intune admin center. Sign in with your administrator credentials that have the necessary permissions to manage Autopilot profiles.

https://endpoint.microsoft.com

Once logged in, you'll see the main dashboard. The interface has been reorganized in recent updates, so we'll navigate to the correct location for Autopilot deployment profiles.

Pro tip: Bookmark the direct URL to save time during future configurations. The Intune admin center receives monthly updates, so interface locations may shift slightly over time.

Verification: Confirm you can see the main Intune dashboard with options for Devices, Apps, and Security in the left navigation panel.

02

Navigate to Windows Autopilot Deployment Profiles

From the main dashboard, navigate to the Autopilot deployment profiles section. Microsoft has reorganized this location in recent updates.

Follow this navigation path:

  1. Click Devices in the left navigation panel
  2. Select Windows from the submenu
  3. Choose Device onboarding
  4. Click Enrollment
  5. Select Windows Autopilot Deployment Profiles

This section displays all existing Autopilot deployment profiles in your tenant. You'll see columns for profile name, platform, enrollment type, and assignment status.

Warning: If you don't see any profiles listed, you may need to create your first Autopilot deployment profile. Ensure your devices are properly registered in Windows Autopilot before proceeding.

Verification: You should see the Windows Autopilot Deployment Profiles page with options to create new profiles or modify existing ones.

03

Create or Select an Autopilot Deployment Profile

You can either modify an existing deployment profile or create a new one specifically for hiding the EULA. For this tutorial, we'll create a new profile to demonstrate the complete process.

Click Create profile and select the appropriate deployment type:

  • User-driven: Most common for standard deployments
  • Pre-provisioning: For White Glove scenarios
  • Self-deploying: For kiosk or shared devices

For this example, select User-driven as it's the most commonly used deployment type.

Fill in the basic profile information:

Name: Hide EULA Autopilot Profile
Description: Autopilot profile configured to hide EULA during OOBE
Convert all targeted devices to Autopilot: Yes (recommended)
Pro tip: Use descriptive names for your profiles that clearly indicate their purpose. This helps with management when you have multiple profiles for different scenarios.

Verification: The profile creation wizard should advance to the next step showing Out-of-box experience (OOBE) settings.

04

Configure OOBE Settings to Hide EULA

This is the critical step where we configure the profile to hide the End User License Agreement. On the Out-of-box experience (OOBE) settings page, locate the Microsoft Software License Terms setting.

Configure the following OOBE settings:

Microsoft Software License Terms: Hide
Privacy settings: Hide (optional but recommended)
Hide change account options: Yes
User account type: Standard
Language (Region): Operating system default
Automatically configure keyboard: Yes
Apply device name template: No (or configure as needed)

The key setting is Microsoft Software License Terms: Hide. This setting has two options:

  • Show: Users will see the EULA during OOBE (default behavior)
  • Hide: EULA is automatically accepted and hidden from users

Additional recommended settings for a streamlined experience:

  • Set Privacy settings to Hide to skip privacy configuration screens
  • Enable Hide change account options to prevent users from switching account types during setup
Warning: Hiding the EULA means users automatically accept Microsoft's software license terms. Ensure this aligns with your organization's compliance requirements and inform users through other channels if necessary.

Verification: Confirm that "Microsoft Software License Terms" is set to "Hide" before proceeding to the next step.

05

Configure Device Join Settings

Configure how devices will join your organization's directory. This setting determines the authentication and management method for deployed devices.

On the device join settings page, configure:

Join to Microsoft Entra ID as: Microsoft Entra joined
(Alternative options: Microsoft Entra hybrid joined, Microsoft Entra registered)

Choose the appropriate join type based on your environment:

Join TypeUse CaseRequirements
Microsoft Entra joinedCloud-first organizationsInternet connectivity, cloud identity
Microsoft Entra hybrid joinedOrganizations with on-premises ADDomain connectivity, AD Connect sync
Microsoft Entra registeredBYOD scenariosPersonal devices with work access

For most modern deployments, Microsoft Entra joined is the recommended option as it provides full cloud-based management without requiring on-premises domain controllers.

Pro tip: If you're unsure about the join type, start with Microsoft Entra joined for new deployments. You can always create additional profiles for different scenarios later.

Verification: Ensure the join type matches your organization's identity infrastructure and security requirements.

06

Review and Create the Deployment Profile

Review all the configuration settings before creating the profile. This is your opportunity to verify that all settings align with your deployment requirements.

The review page should show:

Profile name: Hide EULA Autopilot Profile
Deployment mode: User-driven
Join type: Microsoft Entra joined
Microsoft Software License Terms: Hide
Privacy settings: Hide
Other OOBE settings: As configured

If everything looks correct, click Create to save the deployment profile. The profile will be created and added to your list of available Autopilot deployment profiles.

After creation, you'll see the profile in the main list with a status indicating it's ready for assignment.

Warning: Once created, some profile settings cannot be modified. If you need to change critical settings like join type, you may need to create a new profile and reassign devices.

Verification: The new profile should appear in your Windows Autopilot Deployment Profiles list with a status of "Not assigned" or "Ready for assignment".

07

Assign the Profile to Device Groups

Now assign the newly created profile to the appropriate device groups. This determines which devices will receive the EULA-hidden experience during Autopilot deployment.

From the deployment profiles list, select your newly created profile and click Assignments. You have several assignment options:

  • All devices: Applies to all Autopilot-registered devices
  • Selected groups: Applies to specific Microsoft Entra device groups
  • All users: Applies based on user group membership

For targeted deployment, create or select a device group:

Assignment type: Selected groups
Included groups: Autopilot Devices - EULA Hidden
Excluded groups: (none or specify exceptions)

To create a dynamic device group for Autopilot devices, use this membership rule:

(device.devicePhysicalIDs -any (_ -contains "[ZTDId]"))

This rule automatically includes all devices registered in Windows Autopilot.

Pro tip: Use dynamic groups for Autopilot devices to automatically include new devices as they're registered. This reduces manual assignment overhead.

Verification: Check the Assignments tab to confirm your device groups are properly assigned and no conflicts exist with other profiles.

08

Test the Deployment Profile

Test the configuration with a device to ensure the EULA is properly hidden during the Autopilot deployment process. This verification step is crucial before rolling out to production devices.

To test the deployment:

  1. Ensure you have a test device registered in Windows Autopilot
  2. Reset the device to factory settings or boot a new device
  3. Connect to a network with internet access
  4. Proceed through the initial setup screens

During the OOBE process, monitor for these behaviors:

Expected behavior:
- No EULA/License Agreement screen appears
- Privacy settings screen is hidden (if configured)
- Device automatically proceeds to sign-in
- Autopilot profile downloads and applies automatically

If the EULA still appears, check these common issues:

  • Profile assignment: Verify the device is in the assigned group
  • Network connectivity: Ensure internet access during OOBE
  • Profile sync: Allow 15-30 minutes for profile propagation
  • Device registration: Confirm the device is properly registered in Autopilot
Warning: If the device doesn't have internet connectivity during initial setup, the EULA may appear until the Autopilot profile downloads. This is expected behavior.

Verification: Complete a full test deployment and confirm the EULA screen is skipped while other OOBE functionality works as expected.

09

Monitor and Troubleshoot Deployment Issues

After deploying the profile, monitor device deployments and address any issues that arise. Proper monitoring ensures consistent user experiences across all Autopilot deployments.

Monitor deployment status through multiple channels:

Intune Admin Center:
Devices > Windows > Windows enrollment > Devices

Autopilot deployment reports:
Reports > Windows Autopilot deployments

Device-specific logs:
Event Viewer > Applications and Services Logs > Microsoft > Windows > Provisioning-Diagnostics-Provider

Common troubleshooting scenarios and solutions:

IssueCauseSolution
EULA still appearsProfile not downloadedCheck network connectivity and wait for sync
Profile assignment errorsDevice not in assigned groupVerify group membership and assignment
Hybrid join failuresDomain connectivity issuesCheck network routing and domain controllers

For advanced troubleshooting, collect Autopilot logs using:

Get-AutopilotDiagnostics -OutputPath C:\AutopilotLogs
Pro tip: Set up automated monitoring alerts in Intune to notify you of deployment failures. This helps you address issues quickly before they impact multiple users.

Verification: Review deployment reports to confirm successful EULA hiding across multiple device deployments and address any recurring issues.

Frequently Asked Questions

Does hiding the EULA during Autopilot deployment affect legal compliance?+
Hiding the EULA automatically accepts Microsoft's software license terms on behalf of users. Organizations should ensure this aligns with their compliance requirements and communicate license terms through other channels such as employee handbooks or training materials. The legal acceptance is still valid, but users don't explicitly interact with the agreement during device setup.
Can I hide the EULA for some devices but not others in the same tenant?+
Yes, you can create multiple Autopilot deployment profiles with different OOBE settings and assign them to different device groups. For example, you might hide the EULA for standard corporate devices but show it for executive or BYOD devices. Use Microsoft Entra device groups to control which devices receive each profile configuration.
What happens if a device doesn't have internet connectivity during OOBE?+
If the device lacks internet connectivity during initial setup, the EULA may appear until the Autopilot profile downloads. This is expected behavior since the device cannot retrieve the deployment profile settings without network access. Once connectivity is established, subsequent OOBE screens will follow the profile configuration.
Will hiding the EULA work with hybrid Azure AD joined devices?+
Yes, the EULA hiding functionality works with all Autopilot join types including Microsoft Entra joined, hybrid joined, and registered devices. The OOBE customization settings apply regardless of the join method, though hybrid joined devices may require additional network connectivity to domain controllers during the deployment process.
How long does it take for EULA hiding changes to take effect on devices?+
Autopilot deployment profile changes typically propagate within 15-30 minutes, but devices only download the profile during OOBE or when reset to factory settings. Existing deployed devices won't be affected by profile changes unless they go through the Autopilot deployment process again. For immediate testing, reset a device or use a freshly imaged device.
Evan Mael
Written by

Evan Mael

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

Sign in to join the discussion