Windows Enrollment Strategy in Microsoft
Intune:
Introduction
Enrolling Windows devices into Microsoft Intune is a
critical first step in modern endpoint management. It allows you to configure
policies, deploy applications, and secure corporate data. However, not all
enrollment methods are created equal. The right choice depends on your
organization's specific needs, device ownership models, and existing
infrastructure.
the four primary enrollment methods to help you make an
informed decision. The methods are:
·
Windows Automatic Enrollment: The
foundational method for corporate devices.
·
Windows Autopilot: The modern,
"zero-touch" standard for provisioning new devices.
·
BYOD: User Enrollment: For personal
devices that need access to corporate resources.
·
Co-management with Configuration Manager:
For organizations transitioning from traditional to modern management.
1)Windows Autopilot
Windows Autopilot is designed specifically for this
"zero-touch" deployment scenario. It automates the setup and
pre-configuration of new devices, getting them ready for productive use without
IT intervention.
Why
Autopilot is the right fit:
- OEM
Integration: It leverages device hardware IDs (hashes) that you can
get from your OEM, allowing you to "claim" the device in Intune
before it's even unboxed.
- Excellent
for Remote Workers: Devices can be shipped directly to users. The user
unboxes the device, connects to the internet, enters their work
credentials, and Autopilot handles the rest.
- Custom
OOBE: You control the user experience, including skipping unnecessary
setup screens, enforcing terms, and displaying an Enrollment Status Page
(ESP) to show progress.
- Device
Context: It's ideal for both Entra joined (cloud-native) and Hybrid
Entra joined devices, giving you flexibility.
High-Level
Steps:
- Licensing:
Ensure you have Microsoft Entra Premium P1 or higher.
- Get
Hardware Hashes: Obtain the 4K hardware hash for each device from your
OEM or by manually running a PowerShell script.
- Register
Devices: Upload the hardware hashes to the Intune portal under Devices
> Enrollment > Windows Autopilot Devices.
- Create
a Deployment Profile: Define the OOBE settings (e.g., user-driven vs.
self-deploying, join type, language).
- Assign
Profile: Assign the deployment profile to a device group.
Lab Practice:
Windows Autopilot:
1.
Get hardware hashes from OEM or script.
2. Upload hashes to Intune portal.
3. Create & assign a Deployment Profile.
4. (Optional) Assign an Enrollment Status Page (ESP).
5. User unboxes, connects to internet, and signs in.
In detail Lab practice steps: https://prasadchenikkala.blogspot.com/2025/07/ms-intune-windows-autopilot-deployment.html
2.Enrolling
Existing Corporate Devices or BYOD
Use case: You have existing corporate-owned devices
that are not yet managed, or you have a "Bring Your Own Device"
(BYOD) policy where employees use their personal Windows PCs for work.
Choice A (Corporate-owned): Windows Automatic Enrollment
This is the most straightforward method for enrolling
corporate devices already in use. It's triggered when a user joins their device
to Microsoft Entra ID or registers it with their work account.
Why Automatic Enrollment is a good fit:
- Bulk
Enrollment: It's a scalable way to enroll a large number of existing
devices.
- User-Driven:
The process is simple for the user. They sign in with their organizational
account, and the device automatically enrolls in Intune based on
pre-configured settings.
- Foundation:
It's the underlying mechanism for many other enrollment scenarios,
including Autopilot.
High-Level Steps:
- Licensing:
Ensure you have Microsoft Entra Premium P1 or higher.
- Configure
MDM Scope: In the Intune portal, go to Devices > Enrollment >
Automatic Enrollment. Set the MDM user scope to 'All' or a specific group
of users.
- User
Action: The user goes to Settings > Accounts > Access work or
school > Connect and signs in with their organizational credentials,
choosing to "Join this device to Microsoft Entra ID."
Lab practice “Windows
Automatic Enrollment”:
1. In Intune, go to Devices
> Enrollment > Automatic Enrollment
2. Set MDM user scope
to a user group.
3. User goes to Settings > Accounts > Access work or school.
4. User clicks Connect and
"Joins this device to Microsoft Entra ID."
3)Method B (Personal / BYOD): BYOD User Enrollment
When the device is personally owned by the user, you must
respect their privacy and avoid taking full control. BYOD enrollment (also
known as "work or school account registration") provides a lighter
touch, securing corporate data without managing the entire device.
Why BYOD User Enrollment is the right fit:
- Privacy:
It separates work data from personal data. Management policies (like app
protection) only apply to the work profile and associated apps.
- User
Consent: Users explicitly understand their personal device might be
managed by their organization for work purposes.
- Lightweight:
It doesn't require the device to be fully Entra joined. It's a
registration process.
High-Level Steps:
- No
Entra Premium Required: This is a key advantage if licensing is a
concern.
- Configure
MDM Scope: Similar to automatic enrollment, ensure the MDM user scope
is set.
- User
Action: The user goes to Settings > Accounts > Access work or
school > Connect and enters their work email address. The device is
registered, not joined.
Lab practice: BYOD: User Enrollment
1. User goes to Settings
> Accounts > Access work or school.
2. User clicks Connect and
enters their work email.
3. Follow prompts to register
the device (does not join Entra ID).
4)Managing
Devices with Microsoft Configuration Manager (SCCM)
Use case: Your organization has a mature investment
in Configuration Manager (formerly SCCM) for device management, but you want to
leverage Intune's cloud capabilities like Conditional Access, remote wipe, or
Autopilot.
Best Method:
Co-management with Configuration Manager
Co-management is the bridge between traditional and modern
management. It allows you to manage Windows devices with both ConfigMgr and
Intune simultaneously. You can gradually shift management "workloads"
(like compliance policies or app deployment) from ConfigMgr to Intune at your
own pace.
Why
Co-management is the right fit:
- Phased
Transition: You don't have to go "all-in" on the cloud at
once. Start with one workload (e.g., Compliance Policies) and move others
over time.
- Leverage
Existing Investment: Continue using your powerful ConfigMgr
infrastructure for tasks like OS deployment and detailed software patching
while using Intune for modern, cloud-based policies.
- Path
to Autopilot: You can use co-management to provision existing
ConfigMgr clients, and then use Autopilot for all new devices
moving forward.
- Hybrid
Join Support: It is designed to work seamlessly with Hybrid Entra
joined devices that are domain-joined and registered in Entra ID.
High-Level Steps:
- Prerequisites:
Ensure you have the required versions of ConfigMgr and Windows, proper
licensing (Entra ID P1 + Intune), and devices are Hybrid Entra joined.
- Enable
Cloud Attach: In the ConfigMgr console, configure Cloud Attach to
connect your site to your Intune tenant.
- Configure
Co-management: In the Co-management settings, enable automatic
enrollment in Intune for your clients.
- Shift
Workloads: Use the sliders on the "Workloads" tab to decide
whether ConfigMgr or Intune is the management authority for specific
tasks.
Lab Practice: Co-management:
1. In ConfigMgr, set up Cloud Attach to link to Intune.
2. In the Co-management properties, enable enrollment for a device
collection.
3. Go to the Workloads tab and use sliders to move specific tasks (e.g.,
Compliance) to Intune.
Method |
Best For... |
Primary Use Case |
Key Prerequisite |
Windows Autopilot |
New corporate devices for a zero-touch, modern
provisioning experience. |
OEM/Reseller purchases, remote worker deployments,
kiosk/shared devices. |
Microsoft Entra Premium P1 |
Windows Automatic Enrollment |
Enrolling existing corporate devices at scale. |
Bulk enrollment of current devices, baseline for corporate
enrollment. |
Microsoft Entra Premium P1 |
BYOD: User Enrollment |
Securing corporate data on employees' personal Windows
devices. |
"Bring Your Own Device" (BYOD) scenarios where
privacy is key. |
None (Entra Premium not required) |
Co-management |
Organizations using Configuration Manager (SCCM) and
wanting to adopt cloud features. |
Phased migration from traditional to modern management. |
ConfigMgr, Entra Premium P1 |
Steps to configure above four methos using PowerShell
You can use PowerShell to configure and manage all four
enrollment methods, primarily using the Microsoft Graph PowerShell SDK
for Intune/Entra tasks and the ConfigurationManager module for SCCM.
Prerequisites: Install Necessary Modules
First, you'll need to install the required PowerShell
modules. Run PowerShell as an administrator to execute these commands.
After installing, you'll need to connect to the services.
1. Windows Autopilot
PowerShell is essential for Autopilot, especially for
capturing device information and automating profile management.
Step 1: Capture the Hardware Hash from a Device On a running
Windows device, this script captures the unique hardware hash required for
Autopilot registration.
Step 2: Import the Device and Assign a Profile via
Graph PowerShell This script imports the captured device hash into the
Autopilot service and assigns it to a group.
2.
& 3. Windows Automatic & BYOD Enrollment:
The PowerShell configuration for both Automatic Enrollment
(for corporate devices) and BYOD User Enrollment is identical because it
involves setting the MDM (Mobile Device Management) user scope policy in
Microsoft Entra ID. The difference is in the action the user takes on the
device.
This script checks and sets the MDM user scope to
"All" users.
4.
Co-management with Configuration Manager
Co-management is configured within Configuration Manager,
which has its own PowerShell module. This is performed on the SCCM site server.
This script enables co-management, points it to a pilot
collection, and moves the Compliance Policies workload to Intune.
General
Interview Question on Windows Device Management:
Question 1: Can you briefly explain the primary
purpose of the four main Windows enrollment methods?
There are four methods to enroll windows devices 1)
Autopilot 2) Automatic Enrollment 3) BYOD User Enrollment 4) Co-management
(hybrid method)
Autopilot: For
new devices, zero-touch deployment, customizing the Out-of-Box Experience
(OOBE).
Automatic Enrollment: For existing corporate devices,
triggered by a user joining Microsoft Entra ID.
BYOD: For
personal devices, focusing on app/data protection rather than full device
management.
Co-management:
For organizations with Configuration Manager (SCCM), bridging traditional and
modern management.
Question 2: What is the key difference between a
device that is Microsoft Entra joined and one that is Microsoft Entra
registered? Which enrollment method corresponds to each state?
Joined: The device is owned by the organization and
the primary identity on the device is an organizational account. Corresponds to
Autopilot and Automatic Enrollment.
Registered: The device is personal (BYOD), and the
user is simply adding their work/school account for access to resources. The
device's primary identity remains personal. Corresponds to BYOD User
Enrollment.
Question 3: "What is a 'hardware hash' and why
is it critical for the Windows Autopilot process?"
- the
hardware hash (4K HH) is a unique identifier for a device's hardware
components. It's critical because it allows an organization to
"claim" a device in their Intune tenant before it's ever
powered on, associating it with their Autopilot deployment profile.
Question 4: "A client is a cloud-first
startup with 150 employees, all working remotely. They just purchased a fleet
of new laptops to be shipped directly to their employees' homes. They have
Microsoft 365 E5 licenses. Which enrollment method would you recommend, and
why? Walk me through the high-level steps you'd take to set it up."
- Recommendation:
Unquestionably Windows Autopilot.
- Reasoning:
Mention "zero-touch," "remote workers,"
"shipping direct from OEM," and "custom OOBE."
- Steps:
They should mention obtaining hardware hashes from the OEM, uploading
them to Intune, creating and assigning a deployment profile, and
assigning an Enrollment Status Page (ESP).
Question 5: "An established company has 2,000
existing, domain-joined desktops that are managed solely by Group Policy. They
now want to manage them with Intune to enforce compliance policies for
Conditional Access. They do not use SCCM. What is their most efficient path to
getting these devices enrolled in Intune?"
- Recommendation:
The path is Hybrid Entra Join followed by Windows Automatic
Enrollment.
- Process:
They should describe setting up Entra ID Connect to sync device objects,
configuring the GPO or client setting to trigger device registration, and
then setting the MDM User Scope in Intune to auto-enroll devices once
they become Hybrid Joined.
Question 6: "A large enterprise has a mature
Configuration Manager (SCCM) environment they use for OS imaging, software
updates, and complex application packaging. They are not ready to abandon it,
but they want to use Intune for modern capabilities like remote wipe and
BitLocker key escrow. What do you propose?"
- Recommendation:
The perfect use case for Co-management.
- Explanation:
that co-management allows both SCCM and Intune to manage the device
simultaneously. They should mention the concept of "workloads"
and suggest moving just the "Device Compliance" and
"Endpoint Protection" workloads to Intune initially, while
leaving Application and Update management with SCCM.
Category 3: Troubleshooting & Advanced Questions
Question 7: "A user reports their Autopilot
enrollment is failing and stuck on the Enrollment Status Page (ESP). It's
hanging on the 'Device setup' phase, specifically on an application install.
What are your first three troubleshooting steps?"
- A
logical, systematic approach.
- Check
the ESP Profile: Verify which apps are configured as
"blocking" apps in the ESP settings. Is the failing app one of
them?
- Check
App Assignment: Confirm the failing application is correctly assigned
to the user or device group and that its detection rules are correct.
- Collect
Logs: Instruct the user to press Shift + F10 to open a command prompt
(if enabled in the profile) to access diagnostic tools or, more
practically, guide them through collecting the MDM Diagnostic logs to be
analyzed in the Intune portal or Event Viewer.
Question 8: "You've been asked to design a
strategy for devices that must be treated as kiosks. They will be used in a
public lobby for guest sign-in. Which Autopilot mode would you use, and what
are its key characteristics?"
- Recommendation:
Autopilot Self-Deploying Mode.
- Characteristics:
They must mention that this mode is user-less (no user credentials
required for deployment), requires a physical network connection
(Ethernet) or pre-provisioned Wi-Fi, and requires a device with a TPM 2.0
chip. It joins the device to Entra ID and enrolls it in Intune, after
which a kiosk profile can be applied.
Question 9: "A company is migrating from a
competing MDM solution to Intune. An admin attempts to enroll a device in
Intune that is still managed by the old MDM, and it fails. Why did it fail, and
what is the correct migration procedure?"
- Reason
for Failure: A Windows device can only have one MDM authority
at a time. The device is still "owned" by the old MDM, so
Intune's enrollment request is rejected.
- Correct
Procedure: The candidate must state that the device needs to be fully
unenrolled (retired/wiped) from the previous MDM provider first.
Once it is no longer managed, it can then be enrolled into Intune using
the appropriate method (e.g., Automatic Enrollment or Autopilot Reset).