Microsoft Autopilot enables zero-touch deployment of Windows devices. Instead of creating and maintaining custom images, IT can ship factory-sealed devices directly to employees. When powered on, the device automatically configures itself with your organization's settings, apps, and security policies.
Prerequisites
Before setting up Autopilot, ensure your environment meets these requirements:
| Requirement | Details |
|---|---|
| Windows Edition | Windows 10/11 Pro, Enterprise, or Education (Home not supported) |
| Identity | Microsoft Entra ID (Azure AD) - Cloud-only or Hybrid Join |
| MDM | Microsoft Intune or compatible MDM service |
| Network | Internet access to Microsoft services |
| Licensing | M365 Business Premium, F1/F3, E3/E5, or A1/A3/A5 |
Step 1: Collect Hardware Hashes
Autopilot identifies devices by their unique hardware hash. There are two ways to collect these:
Option A: OEM/Reseller (Recommended)
When purchasing from Dell, HP, Lenovo, or CDW:
- Provide your Entra ID Tenant ID to the vendor
- Request they upload hardware hashes directly to your tenant
- Devices will appear in Intune automatically
Option B: Manual Collection (PowerShell)
For existing devices or testing:
- Open PowerShell as Administrator on the target device
- Run these commands:
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Unrestricted Install-Script -Name Get-WindowsAutopilotInfo -Force Get-WindowsAutopilotInfo -OutputFile C:\Autopilot.csv - Import to Intune:
- Go to Intune Admin Center > Devices > Enrollment
- Under Windows Autopilot, select Devices
- Click Import and upload the CSV
- Allow up to 15 minutes for sync
Step 2: Configure Intune Settings
Enable Automatic Enrollment
- Go to Intune Admin Center > Devices > Enrollment > Automatic Enrollment
- Set MDM User Scope to All (or a specific group)
- Leave MAM User Scope as None
Configure Company Branding (Required)
Autopilot requires company branding or users see a generic Microsoft login:
- Go to Entra Admin Center > Company Branding
- Upload your company logo
- Configure sign-in page text
Step 3: Create a Dynamic Device Group
Create a group that automatically includes Autopilot devices:
- Go to Intune Admin Center > Groups > New Group
- Group Type: Security
- Membership Type: Dynamic Device
- Dynamic Query:
(device.devicePhysicalIds -any _ -contains "[ZTDId]") - Save the group
This query automatically captures any device imported into Autopilot.
Step 4: Create a Deployment Profile
- Go to Devices > Enrollment > Windows Autopilot > Deployment Profiles
- Click Create Profile > Windows PC
- Name: e.g., "Standard User-Driven"
- Configure OOBE settings:
Deployment Mode User-Driven (recommended) Join to Entra ID as Entra ID Joined (or Hybrid) Microsoft License Terms Hide Privacy Settings Hide User account type Standard (security best practice) - Assignments: Assign to the Dynamic Group created in Step 3
Step 5: Configure Enrollment Status Page
The ESP shows deployment progress and can block use until critical apps install:
- Go to Devices > Enrollment > Windows Autopilot > Enrollment Status Page
- Edit the Default profile
- Recommended settings:
- Show app and profile progress: Yes
- Block device use until apps installed: Yes
- Required apps: Select only critical apps (Office, VPN, security agent)
Tip: Don't select all apps or deployment will take hours.
The User Experience
When an employee receives and powers on their device:
- User selects region, keyboard, and connects to Wi-Fi
- Device contacts Microsoft and identifies the tenant
- User sees "Welcome to [Your Company]" with your logo
- User signs in with their work email and password (+ MFA)
- Enrollment Status Page shows "Setting up your device"
- User lands on desktop with apps pre-installed
Troubleshooting
Profile not applying
- Check Profile Status shows "Assigned" in Autopilot Devices
- Wait for dynamic group to update
- Verify company branding is configured
Setup stuck or hanging
- Press
Shift + F10during OOBE to open Command Prompt - Type
eventvwrto check logs
Need to reset a device
Delete from all three locations:
- Intune Devices (managed object)
- Entra ID Devices (identity object)
- Autopilot Devices (hash reservation)