ANAVEM
Languagefr
How to Set Up Windows Autopilot in Microsoft Intune from Scratch

How to Set Up Windows Autopilot in Microsoft Intune from Scratch

Configure Windows Autopilot for automated device deployment and management with Microsoft Intune. Complete setup from hardware ID capture to deployment profiles.

Evan MaelEvan Mael
March 27, 2026 15 min
mediumautopilot 9 steps 15 min

Why Configure Windows Autopilot for Your Organization?

Windows Autopilot transforms the traditional device deployment process from a manual, time-intensive task into an automated, scalable solution. Instead of IT staff spending hours imaging each device, configuring settings, and installing applications, Autopilot enables zero-touch deployment where devices configure themselves based on predefined profiles.

This Microsoft technology integrates seamlessly with Intune and Entra ID (formerly Azure AD) to provide a cloud-native approach to device management. When a user receives a new device, they simply connect to the internet and sign in with their corporate credentials. The device automatically joins your organization, applies security policies, installs required applications, and configures settings—all without IT intervention.

What Makes Autopilot Essential in 2026?

The shift to hybrid work has made traditional imaging labs obsolete. Organizations need to deploy devices directly to remote employees, often shipping them straight from manufacturers. Autopilot addresses this challenge by enabling devices to be pre-configured in the cloud and automatically provisioned regardless of location.

Recent enhancements in 2026 include improved support for Windows 11 SE devices through OEM registration, mandatory Enrollment Status Pages for better user experience, and enhanced integration with Microsoft's zero-trust security model. The technology now supports automatic Intune enrollment prerequisites and provides better visibility into deployment progress.

What Will You Accomplish with This Tutorial?

By following this comprehensive guide, you'll establish a complete Autopilot infrastructure that can scale from pilot deployments to enterprise-wide rollouts. You'll learn to capture device hardware IDs, create deployment profiles that define the user experience, configure enrollment status pages for deployment visibility, and implement monitoring systems to ensure ongoing success. The result is a streamlined device deployment process that reduces IT overhead while improving security and user satisfaction.

Implementation Guide

Full Procedure

01

Configure Microsoft Entra ID Prerequisites

Before registering devices, you need to configure Entra ID for automatic enrollment. This ensures devices can join your organization and enroll in Intune automatically.

Sign into the Microsoft Intune admin center at endpoint.microsoft.com with your administrator account. Navigate to Devices > Enrollment > Windows > Automatic Enrollment.

Set the MDM user scope to either:

  • All - All users can enroll devices automatically
  • Some - Only specified groups can enroll (recommended for pilot deployments)

If you choose "Some", click Select groups and add your target user groups. Configure the MAM user scope similarly if you plan to use mobile application management.

Pro tip: Start with "Some" and a pilot group of 10-20 users to test your configuration before rolling out to all users.

Verification: Navigate to Devices > Enrollment > Windows > Automatic Enrollment and confirm your MDM user scope is configured correctly. The status should show "Configured" with your selected scope.

02

Create Dynamic Device Groups in Entra ID

Dynamic groups automatically assign devices to Autopilot profiles based on device properties. This eliminates manual group management as you scale your deployment.

In the Intune admin center, navigate to Groups > All groups > New group. Configure the following settings:

  • Group type: Security
  • Group name: Autopilot Devices
  • Membership type: Dynamic Device

Click Add dynamic query and create a rule. For devices registered through Autopilot, use this query:

(device.devicePhysicalIDs -any (_ -contains "[ZTDId]"))

This rule automatically includes any device with a Zero Touch Deployment ID, which is assigned during Autopilot registration.

For more specific targeting, you can create groups based on device models or serial numbers:

(device.deviceModel -eq "Surface Laptop 5") or (device.serialNumber -startsWith "ABC")

Verification: After creating the group, click Validate Rules to test your dynamic query. The group will populate with devices once they're registered in Autopilot.

03

Register Devices and Capture Hardware IDs

Device registration is the foundation of Autopilot. You have two main options: OEM/partner registration (automatic) or manual registration using PowerShell.

Option A: OEM/Partner Registration (Recommended)

If you purchased devices from Dell, HP, Lenovo, or Microsoft Surface, request Autopilot registration during purchase. Provide your Entra ID tenant ID (found in Entra ID > Overview) to your vendor. Devices will appear in Intune within 24-48 hours.

Option B: Manual Registration with PowerShell

For existing devices or non-OEM purchases, capture the hardware hash manually. On the target device, open PowerShell as Administrator and run:

Install-Script -Name Get-WindowsAutoPilotInfo -Force
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
Get-WindowsAutoPilotInfo -Online

When prompted, sign in with your Intune administrator credentials. The script uploads the device hash directly to your tenant.

Warning: The PowerShell method doesn't work on Windows 11 SE devices. These must be registered through OEM partners only.

For bulk registration, export to CSV first:

Get-WindowsAutoPilotInfo -OutputFile C:\AutopilotHashes.csv

Then import the CSV in Intune: Devices > Windows > Windows enrollment > Devices > Import.

Verification: Navigate to Devices > Windows > Windows enrollment > Devices in Intune. Your registered devices should appear with status "Unassigned" within 15 minutes of registration.

04

Create Windows Autopilot Deployment Profile

The deployment profile defines how devices behave during the out-of-box experience (OOBE) and what settings are applied automatically.

In the Intune admin center, navigate to Devices > Windows > Windows enrollment > Deployment Profiles. Click Create profile > Windows PC.

Configure the Basics tab:

  • Name: Standard Autopilot Profile
  • Description: User-driven Entra ID joined deployment

On the Out-of-box experience (OOBE) tab, configure these critical settings:

  • Deployment mode: User-driven
  • Join to Microsoft Entra ID as: Microsoft Entra ID joined
  • Microsoft Software License Terms: Hide
  • Privacy settings: Hide
  • Hide change account options: Hide
  • User account type: Standard (not Administrator)
  • Allow White Glove OOBE: No (unless you need pre-provisioning)

Configure the device naming template:

CORP-%SERIAL%

This creates device names like "CORP-ABC123456". Available variables include %SERIAL%, %RAND:x% (random digits), and static text.

Enable Convert all targeted devices to Autopilot to automatically register devices that join your domain.

Verification: After saving, the profile appears in your deployment profiles list with status "Not assigned". The profile is ready for device assignment.

05

Configure Enrollment Status Page (ESP)

The Enrollment Status Page shows users the progress of device setup and prevents them from using the device before all policies and apps are installed.

Navigate to Devices > Windows > Windows enrollment > Enrollment Status Page. Click Create profile.

Configure the Settings tab:

  • Show app and profile installation progress: Yes
  • Show an error when installation takes longer than specified number of minutes: 60
  • Show custom message when time limit error occurs: "Setup is taking longer than expected. Please contact IT support."
  • Allow users to collect logs about installation errors: Yes
  • Only show page to devices provisioned by out-of-box experience (OOBE): Yes

Configure Device setup requirements:

  • Block device use until all apps and profiles are installed: Yes
  • Allow users to reset device if installation error occurs: Yes
  • Allow users to use device if installation error occurs: No
  • Block device use until these required apps are installed if they are assigned to the user/device: Select critical apps

Set User setup requirements similarly, focusing on user-assigned apps and policies.

Pro tip: Set realistic timeouts. Complex app installations can take 30-45 minutes. Monitor your deployment times and adjust accordingly.

Verification: The ESP profile appears in your list. You'll assign it to groups in the next step along with your deployment profile.

06

Assign Profiles to Device Groups

Profile assignment determines which devices receive your Autopilot configuration. Proper assignment ensures consistent deployment across your organization.

Return to your deployment profile: Devices > Windows > Windows enrollment > Deployment Profiles. Select your profile and click Assignments.

Click Add groups and select your "Autopilot Devices" dynamic group created earlier. Set the assignment type to Include.

For the Enrollment Status Page, navigate to Devices > Windows > Windows enrollment > Enrollment Status Page. Select your ESP profile and assign it to the same device group.

You can also assign ESP profiles to user groups if you want different experiences based on user roles:

  • IT Staff: Shorter timeouts, more technical error messages
  • Standard Users: Longer timeouts, simplified messages
  • Executives: Priority app installation, minimal blocking
Warning: Profile changes only apply to devices that are reset or newly deployed. Existing enrolled devices won't receive profile updates until they're reset.

Verification: Check the assignment status shows "Success" and displays the number of targeted devices. The dynamic group should populate with your registered Autopilot devices within 30 minutes.

07

Configure Essential Device Policies and Apps

Before deploying devices, configure the core policies and applications that should be installed during Autopilot. This ensures devices are fully configured when users receive them.

Create Configuration Profiles:

Navigate to Devices > Configuration profiles > Create profile. Create these essential profiles:

1. Wi-Fi Profile (if needed):

  • Platform: Windows 10 and later
  • Profile type: Wi-Fi
  • Configure your corporate Wi-Fi settings including SSID, security type, and certificates

2. BitLocker Encryption:

  • Platform: Windows 10 and later
  • Profile type: Endpoint protection
  • Configure BitLocker settings under Windows Encryption

3. Windows Update Ring:

  • Navigate to Devices > Windows > Windows 10 and later updates > Update rings
  • Create a ring with your preferred update schedule (e.g., defer feature updates by 30 days)

Deploy Essential Applications:

Navigate to Apps > All apps > Add. Add these critical apps:

  • Microsoft 365 Apps: Use the built-in app suite
  • Company Portal: Required for user self-service
  • Security software: Microsoft Defender or third-party antivirus

For each app, set the assignment to Required for your Autopilot device group. This ensures apps install during ESP.

Verification: Check that all profiles and apps show "Assignment successful" status. Test with a pilot device to confirm installation order and timing.

08

Test Autopilot Deployment with Pilot Device

Testing validates your configuration before full deployment. A proper test catches configuration issues that could affect hundreds of devices.

Prepare Test Device:

Reset a registered Autopilot device to factory settings. On Windows 11, go to Settings > System > Recovery > Reset this PC > Remove everything. Choose "Remove files and clean the drive" for a complete reset.

Monitor the OOBE Process:

Boot the device and connect to the internet. The Autopilot process should begin automatically:

  1. Initial Setup: Device downloads and applies updates
  2. Autopilot Detection: "Setting up for work or school" appears
  3. Device Rename: Device renames according to your template and reboots
  4. User Sign-in: User enters Entra ID credentials
  5. ESP Phase: Enrollment Status Page shows progress
  6. Desktop: User reaches desktop with all apps and policies applied

Verify Deployment Success:

After deployment completes, verify these items on the device:

# Check Entra ID join status
dsregcmd /status

# Verify Intune enrollment
Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Enrollments"

# Check installed apps
Get-AppxPackage | Where-Object {$_.Name -like "*Microsoft.Office*"}

# Verify BitLocker status
manage-bde -status

In the Intune admin center, check Devices > All devices to confirm the device appears with correct compliance status.

Pro tip: Document the exact timing of each phase during your test. This helps set realistic expectations for users and troubleshoot slow deployments.

Verification: The test device should complete deployment in 15-45 minutes depending on app complexity. All assigned policies and apps should be installed and functional.

09

Monitor and Troubleshoot Deployments

Ongoing monitoring ensures successful deployments and helps identify issues before they affect multiple devices.

Monitor Autopilot Deployments:

In the Intune admin center, use these monitoring locations:

  • Devices > Monitor > Enrollment failures: Shows devices that failed during enrollment
  • Devices > Windows > Windows enrollment > Devices: Lists all Autopilot devices and their assignment status
  • Reports > Device enrollment: Provides detailed enrollment analytics

Common Issues and Solutions:

1. Device Not Detecting Autopilot Profile:

  • Verify device is registered: Check hardware hash in device list
  • Confirm profile assignment: Ensure device is in assigned group
  • Check internet connectivity during OOBE

2. ESP Timeout Errors:

  • Increase timeout values in ESP profile
  • Remove non-critical apps from required installation list
  • Check app deployment logs for specific failures

3. Profile Changes Not Applying:

  • Reset device completely - profile changes require fresh deployment
  • Verify group membership and assignment scope
  • Check for conflicting profiles

Collect Diagnostic Information:

For failed deployments, collect these logs:

# Export Autopilot diagnostics
mdmdiagnosticstool.exe -area Autopilot -cab C:\AutopilotDiag.cab

# Check event logs
Get-WinEvent -LogName "Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin" | Where-Object {$_.TimeCreated -gt (Get-Date).AddHours(-2)}

Verification: Establish baseline metrics for successful deployments (target: 95% success rate, average deployment time under 30 minutes). Monitor these metrics weekly and investigate trends.

Frequently Asked Questions

What's the difference between Windows Autopilot user-driven and self-deploying modes?+
User-driven mode requires the end user to sign in with their Entra ID credentials during setup, making it ideal for personal work devices. Self-deploying mode automatically configures devices without user interaction, perfect for shared devices, kiosks, or devices that will be assigned later. User-driven mode is more common and provides better security through user authentication, while self-deploying mode offers true zero-touch deployment for specific scenarios.
Can I use Windows Autopilot with existing devices that are already domain-joined?+
Yes, but existing domain-joined devices must be reset to factory settings and removed from the on-premises domain before Autopilot can take effect. The device needs to go through the out-of-box experience (OOBE) to detect and apply the Autopilot profile. You can capture the hardware hash before resetting, register it in Intune, then reset the device to begin the Autopilot process. This makes it suitable for device refresh scenarios.
How long does a typical Windows Autopilot deployment take from start to finish?+
A standard Autopilot deployment typically takes 15-45 minutes depending on several factors: internet connection speed, number of applications being installed, complexity of configuration policies, and device hardware performance. The initial Windows updates and Autopilot profile detection usually take 5-10 minutes, user sign-in and Entra ID join another 2-3 minutes, and the Enrollment Status Page phase can range from 10-30 minutes based on your app and policy requirements.
What happens if a device loses internet connection during Autopilot deployment?+
If internet connectivity is lost during deployment, the Autopilot process will pause and wait for connection to resume. The device will display a network troubleshooting page allowing users to reconnect to Wi-Fi or use Ethernet. Once connectivity is restored, the deployment continues from where it left off. However, if the connection is lost during critical phases like Entra ID join or initial policy download, the device may need to be reset and restarted through the process.
Do I need different Autopilot profiles for different device types or user roles?+
While you can use a single profile for all devices, creating multiple profiles provides better control and user experience. Consider separate profiles for different scenarios: executives might need faster deployment with fewer restrictions, IT staff could have administrative rights enabled, and shared devices might use self-deploying mode. You can also create profiles based on device types (laptops vs tablets) or departments (sales vs engineering) to apply role-specific applications and policies during deployment.
Evan Mael
Written by

Evan Mael

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

Sign in to join the discussion