Windows Autopilot is a powerful tool for streamlining the
deployment of new Windows devices—automating the configuration process and
reducing IT overhead. But before jumping into testing or production use, it’s
essential to ensure your environment is properly prepared.
✅ 1. Licensing: Don’t Skip This Step
Before anything else, your users must be properly licensed. Autopilot functionality depends on Microsoft 365 licenses such as:
* Microsoft 365 E3 / E5
* Education SKUs (A3/A5)
Create a security group (e.g., `Licensed Users`) and assign
licenses to the group. This simplifies license management at scale.
2. Navigate to Billing > Licenses
3. Select your license (e.g., Microsoft 365 E5)
4. Choose Assign to Groups
5. Select your `Licensed Users` group
Autopilot relies on Microsoft Entra ID (Azure AD) and Intune
for enrollment.
# Entra ID Device Settings:
2. Go to Devices > Device Settings
3. Set Users may join devices to Entra ID → `All`
4. (Optional but Recommended) Enable Require Multi-Factor Auth
1. Go to Devices > Enrollment > Automatic Enrollment
2. Set MDM User Scope to `All`
3. Click Save
๐ 3. Verify CNAME
Validation (For Custom Domains)
If you're using a branded domain (e.g., `yourcompany.com`), a
CNAME DNS record is required for seamless MDM enrollment.
2. Enter your domain and click Test
3. A green check = success
๐ *This
step is typically handled by whoever manages your domain and DNS records.*
๐ 4. Set Platform
Restrictions & Device Limits
2. Edit the default policy under All Users
3. Block personally owned Windows devices
4. Set device limit (e.g., 3–5 devices per user)
๐งญ 5. Create an Autopilot Deployment Profile
2. Click + Create Profile
3. Choose Windows PC and User-Driven Mode
4. Hide OOBE elements (e.g., EULA, privacy settings) for
simplicity
5. Assign to a dynamic device group
Create a group like `Autopilot Devices` with a dynamic
membership rule based on the device's Autopilot tag.
⚙️ 6. Apply Basic Device Configuration
2. Create a policy using Device Restrictions
3. Apply to your Autopilot group
* Block Game DVR
* Prevent adding personal Microsoft accounts
* Block manual unenrollment
* Disable removable storage and internet sharing
๐ฆ 7. Deploy Test
Applications
2. Use WinGet to deploy:
* Visual Studio Code
* Company Portal
๐ก *Company
Portal is key for self-service app access.*
๐ 8. Set Up Windows Update Rings
1. Go to Devices > Windows > Windows Update > Update
Rings
2. Create a profile (e.g., `Lab Update Ring`)
3. Key settings:
* Quality updates
deferral: 7 days
* Disable preview
builds
Apply the ring to your Autopilot group.
๐ 9. Define Device Compliance Policies
Compliance policies help track device health and enforce
Conditional Access.
2. Choose Windows 10/11
3. Set rules like:
* Enforce Secure Boot
* Require storage
encryption
Apply this policy to your Autopilot devices.
๐งช 10. Configure the Enrollment Status Page (ESP)
ESP ensures required policies and apps are installed before
the user reaches the desktop.
1. Navigate to Devices > Enrollment > Windows Autopilot
> Enrollment Status Page
2. Edit the default profile
3. Turn ESP ON
4. Enable block device use until setup completes
5. Select required apps to install before allowing access
* Required: Firefox, Company Portal
* Optional: Visual Studio Code
๐ Wrapping Up: A Solid Foundation