Step-by-Step Windows Autopilot Setup Guide

This blog post explains the Windows Autopilot Device Provisioning process. Windows Autopilot enables IT administrators to automate the necessary steps to prepare Windows 10 and Windows 11 devices for business use.

Windows Autopilot offers a modern device lifecycle management service powered by the cloud, providing a seamless, zero-touch experience for deploying both Windows 10 and Windows 11.

In the following sections of this post, we will cover detailed information about Autopilot and demonstrate the step-by-step process of how this process works.

Intune: How to Perform Windows Autopilot Reset [2-Ways].

Fix: Windows Autopilot Reset Error Code 0x80070032.

Autopilot Reset guides

What is Windows Autopilot?

Windows Autopilot comprises technologies designed to set up and pre-configure new devices, preparing them for productive use. It can be used for deploying Windows PCs or HoloLens 2 devices.

There are no Infrastructure requirements for using Autopilot as it’s a Cloud-based service offering that is a part of Microsoft Intune.

Windows Autopilot Setup Process Overview

In the days before Autopilot, IT admins had to maintain various versions of custom Windows Gold images for deploying on organization workstations. However, creating custom Windows images and maintaining drivers for every device model is not required with Windows Autopilot.

Windows Autopilot utilizes an OEM-optimized version of Windows 10/11, usually pre-installed. Instead of reimaging the device, you can leverage the existing Windows installation to make it ‘business-ready.

Below is a high-level Autopilot Process diagram illustrating the Windows Deployment Lifecycle using Autopilot.

  1. Purchase: Customer / Organization Purchases the Laptop.
  2. Device Vendor, OEM, or Reseller then ships the laptop.
  3. Fulfill and Deliver: Laptop shipment to the end user
  4. Deploy: The end User turns on the laptop and logs in using organization credentials.
  5. Ready for Business: Using Self-Service, Out-of-Box Experience (OOBE) laptops, join Entra ID and enroll in Intune. Additionally, apps, device configuration policies, and targeted applications are installed on the device via Intune.
  6. Steady State Usage – The laptop is operational and getting updates from Intune.
  7. End of Life – Laptop is retired and End of Life.

You can Reset the Laptop at any time from the Business ready state, similar to resetting the laptop to its factory default settings. [Break-fix scenario].

Windows Autopilot Setup Process Overview
Windows Autopilot Setup Process Overview

Benefits of Using Windows Autopilot

There are many benefits of using Windows Autopilot to provision Windows devices. Let’s find some of them below:

  • Automatically join devices to Entra ID or Active Directory (Entra Hybrid join).
  • Automatic enrollment of devices in Intune (Requires Microsoft Entra ID P1 or Entra ID P2 Subscription License).
  • Create and auto-assign devices to configuration groups based on a device’s profile.
  • Make the Primary User a Standard User or Administrator User on their device using the Autopilot deployment profile.
  • Customize Out-of-Box Experience (OOBE) content specific to the organization.
  • Utilize the Windows Autopilot Reset feature to quickly reset the laptop to a factory default, business-ready state. Windows Autopilot Reset is commonly used in the below scenarios:
    • Address break/fix scenarios efficiently.
    • Quickly prepare existing devices for new users using the Windows Autopilot reset process.

Windows Autopilot Software Requirements

To leverage Windows Autopilot and unlock its features, ensure you run a supported version of the Windows client. Refer to the list below for the compatible versions:

PlatformSupported Editions
Windows 11Windows 11 Pro
Windows 11 Pro Education
Windows 11 Pro for Workstations
Windows 11 Enterprise
Windows 11 Education
Windows 10Windows 10 Pro
Windows 10 Pro Education
Windows 10 Pro for Workstations
Windows 10 Enterprise
Windows 10 Education

Windows Autopilot Licensing Requirements

In addition to the supported Windows Client operating system requirement discussed in the previous section, ensuring compliance with the necessary licensing requirements to utilize this service is essential. Autopilot capability also necessitates an MDM service, such as Microsoft Intune.

Windows Autopilot requires one of the following subscriptions:

  • Microsoft 365 Business Premium subscription
  • Microsoft 365 F1 or F3 subscription
  • Microsoft 365 Academic A1, A3, or A5 subscription
  • Microsoft 365 Enterprise E3 or E5 subscription includes all Windows clients, Microsoft 365, and EMS features (Microsoft Entra ID and Intune).
  • Enterprise Mobility + Security E3 or E5 subscription includes all needed Microsoft Entra ID and Intune features.
  • Intune for Education subscription includes all needed Microsoft Entra ID and Intune features.
  • Microsoft Entra ID P1 or P2 and Microsoft Intune subscription (or an alternative MDM service).

Windows Autopilot Networking Requirements

When using the Autopilot service, no networking-related actions are usually necessary. Suppose you send a laptop to a user’s home address, and they set it up using their home broadband. In that case, the Autopilot process will typically function without issues, as most broadband providers do not block connections to Microsoft.

If you are configuring a laptop in the office using Autopilot, and your internet traffic passes through a managed firewall, ensure that your network can communicate with the following Autopilot Deployment service URLs:

  • https://ztd.dds.microsoft.com
  • https://cs.dds.microsoft.com
  • https://login.live.com

For complete details, refer to Microsoft documentation: Autopilot Networking requirements.

Steps to Setup Windows Autopilot

I will demonstrate the setup of Autopilot from scratch. If you have already configured any of the settings mentioned in the steps, you can skip it and proceed to the next one. I will use a virtual machine called VMWare Workstation Windows 11 to showcase the Autopilot process. Let’s check the steps:

Step 1 – Assign License to Users

The first step is to ensure users have been assigned an Intune license. You can assign any of the licenses listed in the previous section, Windows Autopilot Licensing Requirements.

Step 2 – Allow Users to Join Devices to Entra ID

If you want the devices enrolled in Intune, they must join Entra ID. Select All to ensure all users can join devices to Entra ID. Alternatively, you can choose the Selected option and use existing Entra security groups containing users who can join devices to Entra ID.

  • Sign in to the Entra admin center.
  • Go to Devices > All devices > Device settings.
  • Set Users may join devices to Microsoft Entra to All.
Allow Users to Join Devices to Entra ID
Step 2 – Allow Users to Join Devices to Entra ID

Step 3 – Enable Automatic Enrollment

After a device joins Entra ID and has Automatic Enrollment enabled, the device will also enroll in Intune. To configure Automatic Enrollment, set the MDM user scope to All and the Windows Information Protection (WIP) user scope to None. For more information about automatic enrollment, refer to the link: Configure automatic enrollment.

Please note that you can also select MDM user scope as Some and use Entra security groups to target a specific list of users who can join devices to Entra ID and enroll their device in Intune.

Step 3 - Enable Automatic Enrollment
Step 3 – Enable Automatic Enrollment

Step 4 – Configure Company Branding

Company branding settings enable you to customize the out-of-box experience (OOBE) for users. You can showcase your company logo and adjust colors to match your organization’s theme. This also ensures that the end user enrolling in the device is connected to the correct organization.

  • Sign in to the Entra admin center.
  • Navigate to User experiences > Company branding.
  • Edit the Default sign-in configuration and review all the tabs to configure the user experience according to your requirements.
Configure Company Branding
Step 4 – Configure Company Branding

Step 5 – Setup Enrollment Status Page (ESP) – Optional

The enrollment status page appears during the initial device setup and the first user sign-in. If enabled, users can view the configuration progress of assigned apps and profiles targeted to their devices.

Most configuration options are self-explanatory; you can use the default configuration options or modify them as per your requirements. Below are the steps to Enable and configure the Enrollment status page (ESP).

  • Sign in to the Intune admin center.
  • Go to Devices > Windows > Windows enrollment > Enrollment Status Page.
  • Click the “All users and all devices” link and go to Properties.
Step 5 - Setup Enrollment Status Page (ESP)  - Optional
Step 5 – Setup Enrollment Status Page (ESP) – Optional

We are going ahead with the default ESP configuration below:

  • Show app and profile configuration progress – Yes
  • Show an error when installation takes longer than specified number of minutes – 60
  • Show custom message when time limit or error occurs – Yes
  • Turn on log collection and diagnostics page for end users – Yes
  • Only show page to devices provisioned by out-of-box experience (OOBE) – Yes
  • Block device use until all apps and profiles are installed – Yes
  • Allow users to reset device if installation error occurs – No
  • Allow users to use device if installation error occurs – No
  • Block device use until required apps are installed if they are assigned to the user/device – All
Step 5 – Setup Enrollment Status Page (ESP) – Optional

Step 6 – Create an Autopilot Devices Group

Create an Entra Dynamic Security group for Autopilot devices. This group is necessary to automatically assign an Autopilot Deployment Profile to devices joined to Entra ID using the Autopilot process.

Follow the steps below to create a new Entra Dynamic Security group for Autopilot. You can also use the Intune admin center to create an Entra dynamic security group.

  • Sign in to the Entra admin center.
  • Click on Groups > All groups > New group.
    • Group type: Security
    • Group name: Provide a group Name, for Example Cloudinfra Autopilot Devices.
    • Group Description: Provide a group description.
    • Microsoft Entra roles can be assigned to the group: No
    • Membership type: Dynamic Device
Step 6 - Create an Autopilot Devices Group
Step 6 – Create an Autopilot Devices Group
  • Under Dynamic device members, click on Add dynamic query. Under the Configure Rules tab, you will find a Rule syntax box. Use the Edit button on the right-hand side and add the below query:
(device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]"))

An autopilot device physicalIDs starts with [ZTDid]. Autopilot devices that meet these rules are automatically added to the group. This group will be used when we will create an autopilot deployment profile.

Note
Step 6 - Create an Autopilot Devices Group
Step 6 – Create an Autopilot Devices Group
  • Add the Rule and click on the OK button.
Step 6 - Create an Autopilot Devices Group
Step 6 – Create an Autopilot Devices Group
  • Click on Save to save the rule.
Step 6 - Create an Autopilot Devices Group
Step 6 – Create an Autopilot Devices Group
  • Finally, click Create to create this Entra dynamic security group for devices.
Step 6 - Create an Autopilot Devices Group
Step 6 – Create an Autopilot Devices Group

Step 7 – Create an Autopilot Deployment Profile

The next step is to create an Autopilot deployment profile, which will customize the Out-of-Box Experience (OOBE) and deployment mode for end users. You can create up to 350 deployment profiles in a single Intune tenant.

To create an Autopilot deployment profile, follow the below steps:

  • Sign in to the Intune admin center.
  • Navigate to Devices > Windows > Windows enrollment > Deployment Profiles > Create Profile > Windows PC.

Basics Tab

Provide a Name and Description of the Autopilot deployment profile. For Example:

  • Name: CloudInfra Autopilot deployment profile
  • Description: Provide a useful description of this profile.
  • Convert all targeted devices to Autopilot: No

If you want to convert all Corporate owned Entra registered devices in Autopilot then you can select Convert all targeted devices to Autopilot: Yes. All corporate owned, non-Autopilot devices in assigned groups register with the Autopilot deployment service within 48 hours.

Convert all targeted devices to Autopilot
Step 7 - Create an Autopilot Deployment Profile
Step 7 – Create an Autopilot Deployment Profile

Out-of-box experience (OOBE) Tab

Configure Out-of-box Experience (OOBE) for Autopilot devices.

  • Deployment Mode: User-Driven
    • Devices configured with this mode are associated with the user who enrolls them. User credentials are required to enroll the device.
    • Alternatively, there is the self-deploying mode, where user credentials are not required to enroll the device. However, the user-driven mode is the most commonly used deployment method.
  • Join to Microsoft Entra ID as: Microsoft Entra joined
    • You also have an option for Microsoft Entra Hybrid Joined. Select it if you have On-prem Active Directory-joined Windows devices.
  • Microsoft Software License Terms: Hide
  • Privacy settings: Hide
  • Hide change account options: Hide
    • This is useful and prevents users from changing account options from corporate to personal accounts, e.g., a Microsoft account. You must configure company branding in Microsoft Entra ID to hide these options.
  • User account type: Standard
    • After completing the Autopilot process, you can choose whether to make the user an Administrator or a Standard user. I will select a Standard user account.
  • Allow pre-provisioned deployment: No.
  • Language (Region): Operating System Default
    • You can configure the specific language settings here or leave them as the Operating system default.
  • Automatically configure keyboard: If you have configured the Language (Region) setting, you can skip this option by selecting Yes.
  • Apply device name template: This setting requires the device’s Microsoft Entra join type status. You can rename the device during autopilot based on the template you provide. The device name must be 15 characters or less. For example, Cloudinfra-W-%RAND:2%. This will create devices with names like Cloudinfra-W-01, Cloudinfra-W-02, etc.
Step 7 - Create an Autopilot Deployment Profile
Step 7 – Create an Autopilot Deployment Profile

Assignments

Assign this Autopilot deployment group to the Entra Dynamic Security Group we created in Step 6. Click on Add groups and select the group to add.

Step 7 - Create an Autopilot Deployment Profile
Step 7 – Create an Autopilot Deployment Profile

Review + create

Review the Autopilot deployment profile summary and click on Create to create the profile.

Step 8 – Capture Hardware Hash of the Device

The device’s hardware identity also called the hardware hash, is required to register the device in Windows Autopilot. We will collect this information from the device and upload it to the Intune admin center to complete the registration process.

Normally, this process is handled by the original equipment manufacturer (OEM) reseller from whom you purchased the device. However, you can also register for Autopilot yourself. Let’s review the steps:

  • Login to the Windows 10 or Windows 11 device that you want to register with autopilot.
  • Open the Powershell console as an administrator and execute the below commands:

Collect Device Hardware Hash in the AutopilotHWID.csv file

[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
New-Item -Type Directory -Path "C:\HWID"
Set-Location -Path "C:\HWID"
$env:Path += ";C:\Program Files\WindowsPowerShell\Scripts"
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
Install-Script -Name Get-WindowsAutopilotInfo
Get-WindowsAutopilotInfo -OutputFile AutopilotHWID.csv
Step 8 - Capture Hardware Hash of the Device
Step 8 – Capture Hardware Hash of the Device

You can directly upload the AutopilotHWID.csv file in Intune. This file contains below Information about the device:

  • Device Serial Number
  • Windows Product ID
  • Hardware Hash
Step 8 - Capture Hardware Hash of the Device
Step 8 – Capture Hardware Hash of the Device

Step 9 – Import Device Hardware Hash CSV in Intune

We will now import the AutopilotHWID.csv file to Intune to complete the Windows Autopilot device registration. Let’s review the steps:

  • Sign in to the Intune admin center.
  • Navigate to Devices > Windows > Windows enrollment > Devices.
Step 9 - Import Device Hardware Hash CSV in Intune
Step 9 – Import Device Hardware Hash CSV in Intune
  • Click Import and then browse the AutopilotHWID.csv file containing the device hardware hash. Click on Import to initiate the import process.
Step 9 - Import Device Hardware Hash CSV in Intune
Step 9 – Import Device Hardware Hash CSV in Intune
  • The device has been imported into Intune, and under the Profile status, it shows as Assigned. This is because we created an Autopilot Entra Dynamic Security Group based on the Autopilot device attribute. Therefore, all Autopilot devices will have the Autopilot Deployment profile assigned automatically.
Step 9 - Import Device Hardware Hash CSV in Intune
Step 9 – Import Device Hardware Hash CSV in Intune

Reset Windows Device

As the Autopilot setup and configuration have been completed, and the device hardware hash is uploaded in Intune, I will now proceed to reset this device and demonstrate the Autopilot process.

  • Log in to the Windows device for which we uploaded the hardware hash in Intune.
  • Press Windows + I to open the Settings App.
  • Navigate to System > Recovery.
  • Click on the Reset PC button.
Reset Windows Device
  • Select the option Remove everything.
Reset Windows Device
  • Select the Local reinstall option, which is faster than the Cloud download option.
Reset Windows Device
  • Click on Next.
Reset Windows Device
  • Click on the Reset button to initiate the reset process for this device. Please note that this process will remove all applications and is equivalent to factory resetting the device to a clean state.
Reset Windows Device

Autopilot in Action after Device Reset

As you initiate a Windows Device Reset, the system restarts and presents you with the Out-of-box experience (OOBE) screens. Depending on the Autopilot deployment profile, you will encounter certain screens, and some may be hidden during the process.

For example, in our Autopilot Deployment profile, we configured it not to show the Privacy terms and Microsoft Software License agreement; therefore, those screens will be hidden. You may notice the company branding, such as the logo and color theme, during the setup process if you have configured it from the Entra admin center.

  • Enter the organization’s email address and password, then click the Sign In button.
Autopilot in Action after Device Reset
  • The Enrollment Status Page (ESP) will be displayed during the Autopilot setup process, showing the device configuration progress. Users won’t be able to access the desktop until all configurations and application deployments are completed. This ensures that the device is business-ready before first use.
  • If you don’t configure or enable the Enrollment Status Page (ESP), the below screen won’t appear, and all the configurations and app deployments will occur after users sign in. This means that users will gain access to the desktop quickly and before completing these processes.
Autopilot in Action after Device Reset
  • If you have configured Windows Hello for Business, you may be prompted to set it up now. Upon receiving the screen confirming that Windows is set up successfully, logging in to the device using the organization-provided credentials is next.
Autopilot in Action after Device Reset
  • Provide organization-provided user credentials to log in to the device.
Autopilot in Action after Device Reset
  • It may take a few minutes to access the desktop. During this time, the system finalizes configurations and applies settings to ensure a seamless and secure setup.
Autopilot in Action after Device Reset
  • Open the command prompt and type the command hostname. This will display the system name configured by the Autopilot device template if it was specified in the Autopilot deployment profile. In this case, the system name is Cloudinfra-W-28, which adheres to the device naming template Cloudinfra-W-%RAND:2%.
Autopilot in Action after Device Reset
  • Sign in to the Intune admin center and navigate to Devices > Windows. You can search for your device in the list. Take note of the compliance status and ownership details of the device. The Primary User UPN will be displayed for the user account used to enroll the device during the Autopilot process.
Autopilot in Action after Device Reset

Further Reading

To read more about Windows Autopilot, you can refer to Autopilot Microsoft documentation, which is available at the link: https://learn.microsoft.com/en-us/autopilot/windows-autopilot.

Leave a Comment