Microsoft Intune provides comprehensive mobile device management (MDM) capabilities for Windows devices, enabling organizations to enforce security policies, deploy applications, and maintain compliance across their device fleet. This guide covers multiple enrollment methods to help you choose the best approach for your organization.
Overview
Windows device enrollment in Intune can be accomplished through several methods, each suited to different scenarios:
| Enrollment Method | Best For | User Involvement | Prerequisites |
|---|---|---|---|
| Automatic Enrollment | Corporate devices, seamless deployment | Minimal | Azure AD Premium P1 |
| User-Driven Enrollment | BYOD scenarios, existing devices | User performs setup | Azure AD account |
| Windows Autopilot | New device provisioning | Minimal | Hardware hash registration |
| Bulk Enrollment | Large deployments, kiosk devices | None | Provisioning package |
| Co-management | Hybrid environments | Varies | Configuration Manager |
Prerequisites
Before enrolling Windows devices, ensure you have the following:
Licensing Requirements:
- Microsoft Intune license (standalone or included with Microsoft 365 E3/E5, Business Premium)
- Azure AD Premium P1 (required for automatic enrollment)
- Appropriate Windows licensing (Pro, Enterprise, or Education)
Administrative Access:
- Global Administrator or Intune Administrator role
- Access to Microsoft Intune admin center (intune.microsoft.com)
Technical Requirements:
- Windows 10 version 1709 or later (Windows 11 recommended)
- Windows Pro, Enterprise, or Education edition
- Internet connectivity for device communication
- Valid Azure AD user accounts
Recommended Preparation:
- Configure MDM authority in Intune
- Set up Azure AD automatic enrollment
- Create device compliance policies
- Prepare configuration profiles
Method 1: Configure Automatic MDM Enrollment
Automatic enrollment enables devices to enroll in Intune when users join or register with Azure AD. This is the recommended approach for corporate environments.
Step 1: Access Azure AD Enrollment Settings
- Sign in to the Microsoft Intune admin center: https://intune.microsoft.com
- Navigate to Devices > Enrollment
- Select Windows > Windows enrollment
- Click Automatic Enrollment
Step 2: Configure MDM User Scope
-
Under MDM user scope, select one of the following:
- None: Disables automatic MDM enrollment
- Some: Enables enrollment for selected Azure AD groups
- All: Enables enrollment for all users
-
If you selected Some:
- Click Select groups
- Search for and select the groups to include
- Click Select
-
Configure MDM terms of use URL (optional):
- Enter:
https://portal.manage.microsoft.com/TermsofUse.aspx - This displays terms during enrollment
- Enter:
-
Leave MDM discovery URL and MDM compliance URL at default values
Step 3: Configure MAM User Scope (Optional)
Mobile Application Management (MAM) without enrollment allows app protection policies on unmanaged devices:
-
Under MAM user scope, select:
- None: No MAM-only users
- Some: Enable MAM for specific groups
- All: Enable MAM for all users
-
If you select Some or All, MAM policies can protect apps without full device enrollment
-
Click Save to apply settings
Step 4: Verify Enrollment Configuration
- Navigate to Devices > Enrollment > Windows > Enrollment Status Page
- Verify the enrollment status page is configured (optional but recommended)
- Check Devices > Windows > Windows devices to confirm enrollment is working
Method 2: User-Driven Enrollment via Settings
This method allows users to enroll their existing Windows devices through the Settings app.
Step 1: Prepare the Device
Ensure the device meets requirements:
- Verify Windows edition (Pro, Enterprise, or Education)
- Check Windows version: Settings > System > About
- Ensure the device is connected to the internet
- Have the user's Azure AD credentials ready
Step 2: Access Work or School Settings
- On the Windows device, open Settings
- Select Accounts
- Click Access work or school
- Click Connect
Step 3: Join Azure AD (Corporate Device)
For corporate-owned devices that should be fully managed:
- In the connection dialog, click Join this device to Azure Active Directory
- Enter the user's work email address
- Click Next
- Enter the user's password
- Complete multi-factor authentication if prompted
- Review the organization information and click Join
- The device will:
- Join Azure AD
- Automatically enroll in Intune (if automatic enrollment is configured)
- Apply assigned policies and configurations
Step 4: Register with Azure AD (BYOD)
For personal devices accessing work resources:
- In the connection dialog, enter the user's work email address
- Click Next
- Enter the user's password
- Complete multi-factor authentication if prompted
- Review and accept any terms of use
- Click Done
The device is now registered with Azure AD and enrolled in Intune for MAM policies.
Step 5: Verify Enrollment
- Return to Settings > Accounts > Access work or school
- Click on the connected account
- Click Info to view enrollment status
- Verify Device sync status shows "Last sync: [recent time]"
Method 3: Windows Autopilot Enrollment
Windows Autopilot provides zero-touch deployment for new devices, transforming an out-of-box experience into a fully configured, managed device.
Step 1: Obtain Device Hardware Hashes
Hardware hashes identify devices for Autopilot. Obtain them through:
Option A: From Device Manufacturer
- Request hardware hashes from your hardware vendor (Dell, HP, Lenovo, etc.)
- Many vendors can upload directly to your Intune tenant
Option B: From Existing Devices Run this PowerShell script as Administrator:
# Install the required script
Install-Script -Name Get-WindowsAutoPilotInfo -Force
# Run the script to capture hardware hash
Get-WindowsAutoPilotInfo -OutputFile C:\Temp\AutopilotHWID.csv
Option C: From Configuration Manager If using SCCM, use the built-in Autopilot device information collection.
Step 2: Import Devices into Autopilot
- Sign in to the Intune admin center
- Navigate to Devices > Enrollment > Windows > Windows enrollment
- Select Devices under Windows Autopilot Deployment Program
- Click Import
- Browse to your CSV file containing hardware hashes
- Click Import
- Wait for the import to complete (may take several minutes)
Step 3: Create an Autopilot Deployment Profile
- Navigate to Devices > Windows > Windows enrollment > Deployment Profiles
- Click Create profile > Windows PC
- Enter a Name (e.g., "Standard User Autopilot Profile")
Configure Out-of-box experience (OOBE) settings:
-
Deployment mode: Select User-Driven or Self-Deploying
- User-Driven: User signs in during setup
- Self-Deploying: No user interaction (for shared/kiosk devices)
-
Join to Azure AD as: Select Azure AD joined or Hybrid Azure AD joined
-
Configure additional OOBE settings:
- Microsoft Software License Terms: Hide
- Privacy settings: Hide
- Hide change account options: Yes
- User account type: Standard or Administrator
- Allow pre-provisioned deployment: Yes (for White Glove)
- Language (Region): Operating system default or specific region
- Automatically configure keyboard: Yes
- Apply device name template: Yes (e.g., "CONTOSO-%SERIAL%")
-
Click Next and configure scope tags if needed
-
Click Next and assign to device groups
-
Click Create
Step 4: Assign Profile to Devices
- Navigate to Devices > Windows > Windows enrollment > Devices
- Select the imported devices
- Click Assign profile
- Select your deployment profile
- Click Assign
Step 5: Deploy the Device
- Ship the device to the user or configure in your IT department
- User turns on the device
- Device connects to the internet
- Autopilot profile is downloaded automatically
- User signs in with their Azure AD credentials
- Device completes enrollment and configuration
Method 4: Bulk Enrollment with Provisioning Packages
Bulk enrollment is ideal for deploying multiple devices without requiring user credentials during setup.
Step 1: Install Windows Configuration Designer
- Download Windows Configuration Designer from the Microsoft Store
- Or install via Windows ADK (Assessment and Deployment Kit)
- Launch the application
Step 2: Create a Provisioning Package
- Click Provision desktop devices
- Enter a project name (e.g., "Intune-Bulk-Enrollment")
- Click Next
Configure device settings:
-
Set up device:
- Device name: Enter a naming pattern (e.g., "WS-%SERIAL%")
- Enter product key if needed
-
Set up network:
- Configure Wi-Fi SSID and password if needed
- Or skip for wired connections
-
Account Management:
- Select Enroll in Azure AD
- Click Get Bulk Token
- Sign in with an account that has enrollment permissions
- The token is valid for 30 days
-
Click Next through remaining sections
-
Click Create to generate the package
Step 3: Export the Provisioning Package
- After creation, note the package location (typically Documents\Windows Imaging and Configuration Designer{Project Name})
- Copy the
.ppkgfile to a USB drive
Step 4: Apply the Package to Devices
During OOBE (Out-of-Box Experience):
- Turn on the new device
- At the first setup screen, insert the USB drive with the
.ppkgfile - Press Windows key + R to run
- Or wait for the package to be detected automatically
- Click Yes, add it when prompted
- The device will:
- Join Azure AD
- Enroll in Intune
- Apply policies automatically
On an Already-Configured Device:
- Copy the
.ppkgfile to the device - Double-click the package file
- Click Yes, add it
- The device will enroll in Intune
Step 5: Verify Bulk Enrollment
- In Intune admin center, go to Devices > Windows > Windows devices
- Verify devices appear with "Enrolled" status
- Check that the enrollment method shows "Bulk enrollment"
Post-Enrollment Configuration
Configure Enrollment Status Page
The Enrollment Status Page (ESP) shows users the enrollment progress and prevents access until setup is complete.
-
Navigate to Devices > Windows > Windows enrollment > Enrollment Status Page
-
Click on Default profile or create a new one
-
Configure settings:
- Show app and profile configuration progress: Yes
- Show an error when installation takes longer than specified minutes: 60
- Show custom message when time limit or error occur: Yes
- Turn on log collection and diagnostics page for end users: Yes
- Only show page to devices provisioned by OOBE: Yes
- Block device use until all apps and profiles are installed: Yes (recommended for Autopilot)
- Allow users to reset device if installation error occurs: Yes
- Allow users to use device if installation error occurs: Yes
- Block device use until required apps are installed: Select required apps
-
Click Save
Verify Device Compliance
- Navigate to Devices > Windows > Windows devices
- Click on an enrolled device
- Check the Compliance status
- Review any non-compliant items
- Address compliance issues as needed
Review Installed Configurations
- On the enrolled device, open Settings
- Go to Accounts > Access work or school
- Click on your organization
- Click Info
- Review:
- Sync status: Should show recent sync
- Areas managed by organization: Lists applied policies
Troubleshooting
Device Not Appearing in Intune
Symptoms: Device shows as enrolled locally but doesn't appear in Intune admin center.
Solutions:
- Wait 15-30 minutes for sync to complete
- On the device, go to Settings > Accounts > Access work or school
- Click the account, then click Info > Sync
- Verify internet connectivity
- Check Windows Firewall allows outbound HTTPS (443)
- Review Event Viewer: Applications and Services Logs > Microsoft > Windows > DeviceManagement-Enterprise-Diagnostics-Provider
Automatic Enrollment Not Working
Symptoms: Users join Azure AD but device doesn't enroll in Intune.
Solutions:
- Verify Azure AD Premium P1 license is assigned to the user
- Check MDM user scope includes the user or their group
- Verify the user has an Intune license
- Run
dsregcmd /statusand verify MDM enrollment shows "YES" - Check if Conditional Access policies are blocking enrollment
Enrollment Error Codes
Common error codes and solutions:
| Error Code | Description | Solution |
|---|---|---|
| 0x80180001 | MDM already enrolled | Unenroll device first, then re-enroll |
| 0x80180002 | MDM enrollment failed | Check user licenses and MDM scope |
| 0x80180003 | MDM user not licensed | Assign Intune license to user |
| 0x80180014 | Device cap reached | Increase device limit in enrollment restrictions |
| 0x80180026 | User not authorized | Verify user is in MDM scope |
Autopilot Profile Not Applying
Symptoms: Device goes through standard OOBE instead of Autopilot experience.
Solutions:
- Verify hardware hash was imported correctly
- Check profile assignment to device group
- Wait 15-30 minutes for profile sync after assignment
- Reset the device to trigger Autopilot again
- Verify internet connectivity during OOBE
Best Practices
Enrollment Recommendations
- Use Autopilot for new devices: Provides the best user experience and security
- Configure Enrollment Status Page: Prevents users from accessing an incomplete setup
- Set device enrollment limits: Prevent users from enrolling too many personal devices
- Use device groups for targeting: Assign policies to device groups, not user groups where possible
- Test with pilot group first: Validate enrollment process before broad deployment
Security Considerations
- Require MFA during enrollment: Add Conditional Access policy for enrollment
- Block personal device enrollment if not needed: Use enrollment restrictions
- Configure compliance policies: Ensure devices meet security requirements before accessing resources
- Use certificate-based authentication: More secure than username/password for device authentication
- Enable BitLocker encryption: Protect data on enrolled devices
Next Steps
After successfully enrolling Windows devices:
- Configure compliance policies: Define security requirements for enrolled devices
- Deploy applications: Push required apps through Intune
- Set up configuration profiles: Configure Wi-Fi, VPN, email, and security settings
- Configure Conditional Access: Require device compliance for resource access
- Monitor device health: Use Intune reports to track compliance and issues
Additional Resources
- Microsoft Intune Windows Enrollment Documentation
- Windows Autopilot Overview
- Intune Troubleshooting Guide
Need help with your Intune deployment? InventiveHQ offers comprehensive Microsoft Endpoint Manager implementation services, from initial setup to ongoing management. Contact us for a free consultation.