🚀 Windows Autopilot Self-Deploying Mode — Zero-Touch Setup That Feels Like Magic
Just imagine this:
You unwrap a brand-new PC or reinstall Windows 11 from scratch…
and before you even touch the keyboard, the device automatically:
✅ Joins Microsoft Entra ID (Azure AD)
✅ Syncs all Intune apps, settings, and policies
✅ Lands straight on the sign-in screen — ready for the user
No technician. No clicks. No wasted time.
That’s Windows Autopilot Self-Deploying Mode — effortless, hands-free provisioning that just works.
The only prerequisite?
Register the device’s Hardware Hash (HWID) in Intune first.
Here’s the cleanest 10-minute setup guide to make it happen — perfect for brand-new or freshly reinstalled devices.
⚡ Step-by-Step: Configure Windows Autopilot Self-Deploying Mode in Under 10 Minutes
1️⃣ Start Fresh
Use a new PC or perform a clean Windows 11 installation (OOBE stage).
2️⃣ Insert a USB Drive
3️⃣ Identify the Drive Letter
Press Shift + F10, open PowerShell, and run:
Get-Volume
Find your USB drive letter (e.g., E:).
4️⃣ Run the Script
Execute:
.\autopilot.ps1
A file named HWID.csv will appear on your USB drive — that’s your device’s hardware hash.
5️⃣ Upload to Intune
Navigate to Intune Admin Center → Devices → Windows enrollment → Devices → Import
Select your
HWID.csv and click Import.Wait until the status turns green (usually within 5–30 minutes).
6️⃣ Create a Dedicated Group (Avoid Conflicts)
Never mix User-Driven and Self-Deploying devices in the same group.
✅ Best practice:
Create a static security group for self-deploying devices.
Avoid using a dynamic rule like (device.devicePhysicalIds -any _ -contains "[ZTDId]") — it will automatically add all new Autopilot devices and may cause profile assignment conflicts.
7️⃣ Assign the Device
Copy the device name from Intune →
Go to Entra Admin Center → Devices → Search → Add to your group.
Make sure the device is enabled.
8️⃣ Create the Self-Deploying Profile
In Intune:
Devices → Windows enrollment → Deployment Profiles → Create Profile → Self-Deploying
Set the options as follows:
-
Name: Autopilot – Self-Deploying – Standard
-
Convert all targeted devices to Autopilot: Yes
-
Skip EULA and Privacy settings: Yes
Assign this profile to your self-deploying group.
9️⃣ Configure Kiosk Mode
Go to Intune → Configuration Profiles → Windows 10 and later → Custom,
select OMA-URI, and paste your XML configuration.
🔟
💡 Extra tip: Don’t forget the Google Chrome package
Before you start deployment, make sure you already have a Google Chrome Win32 or MSI package uploaded in Intune — and assigned to the same Autopilot group.
This step is essential if you’re using a taskbar XML layout to automatically pin Chrome.
If Chrome isn’t installed first, the XML configuration won’t apply correctly, and the pinning will fail.
✅ In short:
-
Upload your Chrome package in Intune
-
Assign it to the same group as your Self-Deploying profile
-
Then your XML layout will apply perfectly, pinning Chrome to the taskbar every time 🚀
XML:
-------------------------------------------------
<AssignedAccessConfiguration xmlns="http://schemas.microsoft.com/AssignedAccess/2017/config" xmlns:rs5="http://schemas.microsoft.com/AssignedAccess/201810/config" xmlns:v5="http://schemas.microsoft.com/AssignedAccess/2022/config">
<Profiles>
<Profile Id="{7b089ffa-f670-4861-a8b4-0e0e8d45b437}">
<AllAppsList>
<AllowedApps>
<App DesktopAppPath="%ProgramFiles%\Google\Chrome\Application\chrome.exe"/>
</AllowedApps>
</AllAppsList>
<v5:StartPins>
<![CDATA[ { "pinnedList": [ { "desktopAppLink": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Google Chrome.lnk" } ] } ]]>
</v5:StartPins>
<Taskbar ShowTaskbar="true"/>
</Profile>
</Profiles>
<Configs>
<Config>
<AutoLogonAccount rs5:DisplayName="Kiosk"/>
<DefaultProfile Id="{7b089ffa-f670-4861-a8b4-0e0e8d45b437}"/>
</Config>
</Configs>
</AssignedAccessConfiguration>
-------------------------------------------------------
🔟 Experience the Magic
After about 30 minutes, restart the device (allow time for sync).
You’ll see:
Identifying device… → Configuring your device… → Ready for sign-in.
That’s true zero-touch deployment — modern IT at its best. 🚀
💡 Coming Soon: Local Admin Automation via Script Remediation
Soon, a PowerShell script will be released that automatically creates a local administrator account through Intune Script Remediation.
This script allows you to log in and perform additional configuration tasks — without manual intervention.
Perfect for scenarios where you need a secure local admin for troubleshooting, initial setup, or offline access before the device fully syncs with Intune.
Stay tuned — the script is designed for seamless deployment and easy customization. ⚙️










Kommentarer
Skicka en kommentar