Home About Tools Projects Guides & Blog ⚡ Hire Me ✦ Websites Contact →
💻 Intune

Windows Autopilot Setup Guide: Deploy Devices Without Imaging

Windows Autopilot is Microsoft's zero-touch deployment solution. Rather than imaging devices and shipping them pre-configured, Autopilot lets you ship a factory-fresh device directly to a user - they power it on, sign in with their Microsoft 365 credentials, and Intune automatically configures it: installs apps, applies policies, joins Entra ID, and gets it ready for work. No imaging. No IT hands-on-keyboard. No shipping devices to the office first.

This guide covers the complete Autopilot setup from start to finish - registering devices, creating a deployment profile, and testing the end-to-end experience.

Prerequisites

📋 Before You Start
  • Microsoft Intune licence (Intune Plan 1 or included in M365 Business Premium / E3+)
  • Devices must be pre-registered with Autopilot (hardware hash uploaded)
  • Entra ID configured as the identity provider
  • Intune set as the MDM authority
  • An Autopilot deployment profile created and assigned
ℹ️
Device eligibility
Autopilot works with Windows 10 1703+ and Windows 11. Devices must be running a genuine OEM installation of Windows. It does not work with custom or cloned images. the device must start from a clean OOBE state.

Step 1: Register Devices

📥 Hardware Hash

Before Autopilot can configure a device, it must be registered - this means uploading the device's hardware hash to Intune. The hardware hash uniquely identifies the device and links it to your tenant.

There are three ways to get the hardware hash:

  • OEM registration: if you buy from a Microsoft partner, they can register devices directly to your tenant before shipping. This is the most scalable option for large deployments.
  • PowerShell script: run on the device during OOBE or after imaging to extract and upload the hash. See the guide: How to Capture Windows Autopilot Hardware Hashes: 4 Fast Methods.
  • Microsoft Store for Business / Partner Center: resellers and IT partners can bulk-upload hashes on your behalf.

Verify Registration

Once uploaded, devices appear in:

It can take up to 15 minutes for a newly uploaded device to appear. You can also assign a Group Tag here, which is used to dynamically group devices for profile assignment.

Step 2: Create a Deployment Profile

⚙️ Profile
⚙️
Deployment Profile: User-Driven
Recommended for most deployments
Deployment modeUser-driven: user signs in and device enrolls. Self-deploying: no user interaction, device enrolls automatically (for shared/kiosk devices).
User-driven
Join to Entra ID as
Entra ID joined
Microsoft Software License Terms
Hide
Privacy settings
Hide
Hide change account options
Yes
User account type
Standard user
Allow pre-provisioned deployment (White Glove)
Yes (if using White Glove)
Language (Region)
English (United Kingdom)
Automatically configure keyboard
Yes

Step 3: Enrolment Status Page

📄 ESP

The Enrolment Status Page (ESP) is the progress screen users see while Autopilot configures their device. It blocks the desktop until apps and policies have applied, preventing users from accessing a partially-configured machine.

📄
Enrolment Status Page
Controls the OOBE progress experience
Show app and profile configuration progress
Yes
Show error when installation takes longer thanIncrease this for large app deployments. default 60 minutes is usually sufficient.
60 minutes
Show custom message when time limit error occurs
Contact IT Support: it@yourcompany.com
Allow users to collect logs about installation errors
Yes
Only show page to devices provisioned by OOBE
Yes
Block device use until all apps and profiles are installed
Yes
Block device use until required apps are installedSelect specific required apps to wait for. Don't include optional or slow-installing apps here.
Selected apps

Step 4: Dynamic Device Group

👥 Groups

Create a dynamic Entra ID group that automatically captures all Autopilot-registered devices using their Group Tag. This group is used to assign the deployment profile and the ESP.

Use a dynamic membership rule targeting the Autopilot Group Tag you assigned during device registration:

(device.devicePhysicalIds -any (_ -eq "[OrderID]:CORP-WIN"))

Replace CORP-WIN with your Group Tag. Devices with that tag will automatically join this group within a few minutes of registration.

Step 5: Assign the Profile

Assign your deployment profile to the dynamic device group created above. Assign the ESP to the same group.

Test with a single device first
Before rolling out to new devices, reset a test machine to factory settings (Settings → System → Recovery → Reset this PC → Remove everything) and run through the full Autopilot experience. Confirm the ESP completes, apps install correctly, and the user lands on a fully configured desktop.

White Glove Pre-Provisioning

🏭 White Glove

White Glove (also called pre-provisioning) lets IT or a reseller run the device-targeted phase of Autopilot in advance - installing apps, applying policies, and enrolling the device - before the user ever touches it. The user then only has to sign in, and the user-targeted phase completes in a few minutes.

To use White Glove, enable it in the deployment profile, then on the device during OOBE press Windows key five times to enter White Glove mode. This is particularly useful for large rollouts where you want to pre-configure batches of devices before shipping to remote users.

Common Issues

🔧 Troubleshooting
  • Device not found during OOBE: hardware hash not yet synced. Wait 15 minutes and retry, or manually trigger a sync in Intune.
  • ESP stuck on "Identifying": the device cannot reach the Intune endpoints. Check network connectivity and check that DNS resolves Microsoft URLs.
  • Apps failing to install during ESP: check the app assignment is targeting the device group, not a user group. Device-context app installs are required during OOBE.
  • User gets admin rights: check the deployment profile is set to Standard User, not Local Admin.
J
Jack Davies
IT Engineer · M365 & Intune Specialist

Jack is an IT Technical Engineer based in the UK, working day-to-day with Microsoft 365, Intune, and Entra ID across a range of businesses. He holds the MS-900 certification and is studying for a BSc in Cyber Security through the Open University. Outside of work he builds and documents home lab projects, writes guides on this site, and takes on M365 consulting work for small businesses.

About Jack → LinkedIn →
// monthly tips

Get M365 tips in your inbox

Practical Intune and Microsoft 365 tips, once a month. No spam, no fluff.