Perform comprehensive testing to ensure the auto-logon and kiosk configuration work correctly on target devices.
Check the Windows registry for auto-logon configuration:
# Verify registry settings
$registryPath = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
Get-ItemProperty -Path $registryPath | Select-Object AutoAdminLogon, DefaultUserName, DefaultDomainName, DefaultPassword
Expected output should show:
AutoAdminLogon : 1
DefaultUserName : kioskuser@yourdomain.com
DefaultDomainName : AzureAD
DefaultPassword : [encrypted]
Test the auto-logon functionality:
- Restart the kiosk device
- Observe automatic sign-in without user interaction
- Verify the kiosk environment loads correctly
- Check that only allowed applications are accessible
Monitor AssignedAccess events in Event Viewer:
# Check AssignedAccess logs
Get-WinEvent -LogName "Microsoft-Windows-AssignedAccessManager/Admin" -MaxEvents 50 |
Where-Object {$_.TimeCreated -gt (Get-Date).AddHours(-24)} |
Select-Object TimeCreated, Id, LevelDisplayName, Message
Verify Entra ID sign-in logs:
- Navigate to Entra admin center > Sign-in logs
- Filter by the kiosk user account
- Confirm successful automatic sign-ins
- Check for any authentication errors or warnings
Test kiosk breakout prevention:
# Verify shell replacement
$shellValue = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" -Name "Shell" -ErrorAction SilentlyContinue
Write-Output "Current shell: $($shellValue.Shell)"
Warning: Always have a break-glass recovery method available, such as a local administrator account or safe mode access, in case the kiosk configuration prevents normal access.
Verification: Document successful auto-logon, kiosk app launch, and user session establishment. Test device restart cycles to ensure consistency.