You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: autopilot/device-preparation/known-issues.md
+41-3Lines changed: 41 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: frankroj
8
8
ms.author: frankroj
9
9
ms.reviewer: jubaptis
10
10
manager: aaroncz
11
-
ms.date: 08/07/2024
11
+
ms.date: 10/18/2024
12
12
ms.collection:
13
13
- M365-modern-desktop
14
14
- highpri
@@ -40,6 +40,46 @@ This article describes known issues that can often be resolved with:
40
40
41
41
## Known issues
42
42
43
+
## Deployments fail when Managed installer policy is enabled for the tenant
44
+
45
+
Date added: *October 10, 2024*<br>
46
+
Date updated: *October 18, 2024*
47
+
48
+
When the [Managed installer policy](/mem/intune/protect/endpoint-security-app-control-policy#managed-installer) is **Active** for a tenant and Win32 apps are selected in the Windows Autopilot device preparation policy, Windows Autopilot device preparation deployments fails. The issue is being investigated.
49
+
50
+
As a workaround, remove Win32 applications from the list of selected apps in all device preparation policies.
51
+
52
+
For more information, see [Known issue: Windows Autopilot device preparation with Win32 apps and managed installer policy](https://techcommunity.microsoft.com/t5/intune-customer-success/known-issue-windows-autopilot-device-preparation-with-win32-apps/ba-p/4273286).
53
+
54
+
## Security group membership update failures might lead to non-compliant devices
55
+
56
+
Date added: *September 27, 2024*
57
+
58
+
If security groups aren't properly configured in Microsoft Intune, devices might lose compliance and be left in an unsecured state. The following are potential reasons for security group membership failures:
59
+
60
+
- **Retry failures**: Security group membership updates might not succeed during retry windows, leading to delays in group updates.
61
+
62
+
- **Static to dynamic group changes**: After the Windows Autopilot device preparation profiles are configured, changing a security group from static to dynamic could cause failures.
63
+
64
+
- **Owner removal**: If the **Intune Provisioning Client** service principal is removed as an owner of a configured security group, updates might fail.
65
+
66
+
- **Group deletion**: If a configured security group is deleted and devices are deployed before Microsoft Intune detects the deletion, security configurations might fail to apply.
67
+
68
+
To mitigate the issue, follow these steps:
69
+
70
+
1. **Validate security group configuration before provisioning**:
71
+
72
+
- Ensure the correct security group is selected within the Microsoft Intune admin center or the Microsoft Entra admin center.
73
+
- The security group should be configured within the Windows Autopilot device preparation profile.
74
+
- The group shouldn't be assignable to other groups.
75
+
- The **Intune Provisioning Client** service principal should be an owner of the group.
76
+
77
+
1. **Manually fix the provisioned devices**:
78
+
79
+
- If devices are already deployed or the security group isn't applicable, manually add the affected devices to the correct security group.
80
+
81
+
Security group membership failures can be prevented by following these steps, ensuring devices remain compliant and secure.
82
+
43
83
## Deployment fails for devices not in the Coordinated Universal Time (UTC) time zone
44
84
45
85
Date added: *July 8, 2024* <br>
@@ -92,9 +132,7 @@ The issue is being investigated. As a workaround, add the following additional r
92
132
For more information, see [Required RBAC permissions](requirements.md?tabs=rbac#required-rbac-permissions).
93
133
94
134
> [!NOTE]
95
-
>
96
135
> The [Required RBAC permissions](requirements.md?tabs=rbac#required-rbac-permissions) article doesn't list the **Device configurations** - **Assign** permission. This permission requirement is only temporary until the issue is resolved. However, the article can be used as a guide on how to properly add this permission.
97
-
98
136
**This issue was resolved in July 2024.**
99
137
100
138
### Device is stuck at 100% during the out-of-box experience (OOBE)
@@ -200,7 +200,7 @@ To provide needed Microsoft Entra ID and MDM functionality, including automatic
200
200
201
201
> [!NOTE]
202
202
>
203
-
> When a Microsoft 365 subscription is used, licenses still need to be assigned to users so they can enroll device in Intune. For more information, see [assign licenses to users so they can enroll devices in Intune](/intune/fundamentals/licenses-assign).
203
+
> When a Microsoft 365 subscription is used, licenses still need to be assigned to users so they can enroll device in Intune. For more information, see [assign licenses to users so they can enroll devices in Intune](/mem/intune/fundamentals/licenses-assign).
204
204
205
205
Additionally, the following are also recommended, but not required:
Copy file name to clipboardExpand all lines: autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: frankroj
7
7
ms.author: frankroj
8
8
ms.reviewer: jubaptis
9
9
manager: aaroncz
10
-
ms.date: 06/19/2024
10
+
ms.date: 09/13/2024
11
11
ms.topic: tutorial
12
12
ms.collection:
13
13
- tier1
@@ -23,7 +23,7 @@ This step by step tutorial guides through using Intune to perform a Windows Auto
23
23
24
24
The purpose of this tutorial is a step by step guide for all the configuration steps required for a successful Windows Autopilot device preparation user-driven Microsoft Entra join deployment using Intune. The tutorial is also designed as a walkthrough in a lab or testing scenario, but can be expanded for use in a production environment.
25
25
26
-
Before beginning, refer to the [How to: Plan your Microsoft Entra join implementation](/azure/active-directory/devices/azureadjoin-plan) to make sure all prerequisites are met for joining devices to Microsoft Entra ID.
26
+
Before beginning, refer to the [How to: Plan your Microsoft Entra join implementation](/azure/active-directory/devices/azureadjoin-plan) to make sure all requirements are met for joining devices to Microsoft Entra ID.
27
27
28
28
## Windows Autopilot device preparation user-driven Microsoft Entra join overview
Copy file name to clipboardExpand all lines: autopilot/device-preparation/whats-new.md
+21-1Lines changed: 21 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: frankroj
8
8
ms.author: frankroj
9
9
manager: aaroncz
10
10
ms.reviewer: jubaptis
11
-
ms.date: 08/21/2024
11
+
ms.date: 10/15/2024
12
12
ms.collection:
13
13
- M365-modern-desktop
14
14
- tier2
@@ -31,6 +31,26 @@ appliesto:
31
31
>
32
32
> For more information on using RSS for notifications, see [How to use the docs](/mem/use-docs#notifications) in the Intune documentation.
33
33
34
+
## Diagnostics logs automatically available in Windows Autopilot device preparation deployment status report
35
+
36
+
Date added: *October 9, 2024*
37
+
38
+
Admins can now download diagnostics logs for failed Autopilot device preparation deployments directly from the **Windows Autopilot device preparation deployment status** report. Logs are available for download in the **Device deployment details** when you select a failed deployment under the **Device** tab. Logs are automatically collected when an error occurs during deployment.
39
+
40
+
## Windows Autopilot Device Preparation Support in Intune operated by 21Vianet in China
41
+
42
+
Date added: *September 18, 2024*
43
+
44
+
As part of the 2409 Intune release, we're announcing support for Windows Autopilot Device Preparation policy in [Intune operated by 21Vianet in China](/mem/intune/fundamentals/china) cloud. Customers with tenants located in China can now provision devices and manage through Microsoft Intune. For an overview, see [Overview of Windows Autopilot device preparation](overview.md). For a tutorial on how to set up Windows Autopilot device preparation, see [Windows Autopilot device preparation scenarios](tutorial/scenarios.md).
45
+
46
+
<!-- MAXADO-9313795 / INADO-28687730 -->
47
+
48
+
## enrollmentProfileName property is now populated with the Device preparation policy name
49
+
50
+
Date added: *September 13, 2024*
51
+
52
+
As part of the 2409 Intune release, the **enrollmentProfileName** property is now populated with the Device preparation policy name during Autopilot device preparation deployments. The Enrollment profile property of Intune and Microsoft Entra device objects are automatically populated with the name of the Device preparation policy that was applied to the device during provisioning. The **enrollmentProfileName** property enables admins to configure assignment filters and dynamic groups based on the **enrollmentProfileName** property for configurations post-enrollment.
53
+
34
54
<!-- INADO-28533819 -->
35
55
36
56
## Windows Autopilot device preparation deployment status report available in the Monitor tab under Enrollment
Copy file name to clipboardExpand all lines: autopilot/dfci-management.md
+15-6Lines changed: 15 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: frankroj
8
8
ms.author: frankroj
9
9
ms.reviewer: jubaptis
10
10
manager: aaroncz
11
-
ms.date: 06/11/2024
11
+
ms.date: 10/09/2024
12
12
ms.collection:
13
13
- M365-modern-desktop
14
14
- tier2
@@ -24,7 +24,7 @@ With Windows Autopilot Deployment and Intune, Unified Extensible Firmware Interf
24
24
25
25
If a user reinstalls a previous Windows version, installs a separate OS, or formats the hard drive, they can't override DFCI management. This feature can also prevent malware from communicating with OS processes, including elevated OS processes. DFCI's trust chain uses public key cryptography, and doesn't depend on local UEFI password security. This layer of security blocks local users from accessing managed settings from the device's UEFI menus.
26
26
27
-
For an overview of DFCI benefits, scenarios, and prerequisites, see [Device Firmware Configuration Interface (DFCI) Introduction](https://microsoft.github.io/mu/dyn/mu_feature_dfci/DfciPkg/Docs/Dfci_Feature/).
27
+
For an overview of DFCI benefits, scenarios, and requirements, see [Device Firmware Configuration Interface (DFCI) Introduction](https://microsoft.github.io/mu/dyn/mu_feature_dfci/DfciPkg/Docs/Dfci_Feature/).
28
28
29
29
> [!IMPORTANT]
30
30
>
@@ -55,12 +55,12 @@ See the following figure:
55
55
56
56
- A currently supported version of Windows and a supported UEFI is required.
57
57
- The device manufacturer must have DFCI added to their UEFI firmware in the manufacturing process, or as a firmware update that can be installed. Work with the device vendors to determine the [manufacturers that support DFCI](#oems-that-support-dfci), or the firmware version needed to use DFCI.
58
-
- The device must be managed with Microsoft Intune. For more information, see [Enroll Windows devices in Intune using Windows Autopilot](/intune/enrollment/enrollment-autopilot).
58
+
- The device must be managed with Microsoft Intune. For more information, see [Enroll Windows devices in Intune using Windows Autopilot](/mem/intune/enrollment/enrollment-autopilot).
59
59
- The device must be registered for Windows Autopilot by a [Microsoft Cloud Solution Provider (CSP) partner](https://partner.microsoft.com/membership/cloud-solution-provider), or registered directly by the OEM. For Surface devices, Microsoft registration support is available at [Microsoft Devices Autopilot Support](https://prod.support.services.microsoft.com/supportrequestform/0d8bf192-cab7-6d39-143d-5a17840b9f5f).
60
60
61
61
> [!IMPORTANT]
62
62
>
63
-
> Devices manually registered for Autopilot (such as by [importing from a CSV file](/intune/enrollment/enrollment-autopilot#add-devices)) aren't allowed to use DFCI. By design, DFCI management requires external attestation of the device's commercial acquisition through an OEM or a Microsoft CSP partner registration to Windows Autopilot. When the device is registered, its serial number is displayed in the list of Windows Autopilot devices.
63
+
> Devices manually registered for Autopilot (such as by [importing from a CSV file](/mem/intune/enrollment/enrollment-autopilot#add-devices)) aren't allowed to use DFCI. By design, DFCI management requires external attestation of the device's commercial acquisition through an OEM or a Microsoft CSP partner registration to Windows Autopilot. When the device is registered, its serial number is displayed in the list of Windows Autopilot devices.
64
64
65
65
## Managing DFCI profile with Windows Autopilot
66
66
@@ -71,9 +71,9 @@ There are four basic steps in managing DFCI profile with Windows Autopilot:
71
71
1. Create a DFCI profile
72
72
1. Assign the profiles
73
73
74
-
See [Create the profiles](/intune/configuration/device-firmware-configuration-interface-windows#create-the-profiles) and [Assign the profiles, and reboot](/intune/configuration/device-firmware-configuration-interface-windows#assign-the-profiles-and-reboot) for details.
74
+
See [Create the profiles](/mem/intune/configuration/device-firmware-configuration-interface-windows#create-the-profiles) and [Assign the profiles, and reboot](/mem/intune/configuration/device-firmware-configuration-interface-windows#assign-the-profiles-and-reboot) for details.
75
75
76
-
The existing [DFCI settings](/intune/configuration/device-firmware-configuration-interface-windows#update-existing-dfci-settings) can also be changed on devices that are in use. In the existing DFCI profile, change the settings and save the changes. Since the profile is already assigned, the new DFCI settings take effect when next time the device syncs or the device reboots.
76
+
The existing [DFCI settings](/mem/intune/configuration/device-firmware-configuration-interface-windows#update-existing-dfci-settings) can also be changed on devices that are in use. In the existing DFCI profile, change the settings and save the changes. Since the profile is already assigned, the new DFCI settings take effect when next time the device syncs or the device reboots.
77
77
78
78
To identify whether a device is DFCI ready, the following Intune Graph API call can be used:
79
79
@@ -89,9 +89,18 @@ For more information, see [Intune devices and apps API overview](/graph/intune-c
### DFCI enrollment fails for Professional editions of Windows 11, version 24H2
99
+
100
+
Date added: *October 9, 2024*
101
+
102
+
DFCI can't currently be used on devices with Professional editions of Windows 11, version 24H2. The issue is being investigated. As a workaround, ensure the device is upgraded to the Enterprise edition of Windows 11, version 24H2 during or after OOBE onboarding. After upgrading to the Enterprise edition of Windows 11, version 24H2, sync the device. Once the device is synced, reboot it to get it enrolled in DFCI.
Copy file name to clipboardExpand all lines: autopilot/enrollment-autopilot.md
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: frankroj
5
5
ms.author: frankroj
6
6
ms.reviewer: jubaptis
7
7
manager: aaroncz
8
-
ms.date: 06/28/2024
8
+
ms.date: 09/13/2024
9
9
ms.topic: how-to
10
10
ms.localizationpriority: high
11
11
ms.service: windows-client
@@ -93,10 +93,6 @@ For more information including a list of supported OEMs, see [Return of key func
93
93
>
94
94
> Assigning a licensed user to a specific Autopilot device only affects pre-populating the UPN and setting of a custom greeting name. It doesn't affect assigned policies and applications that are deployed to the device or to the user. The assigned policies and applications are still deployed regardless of the OEM. For more information, see [Windows Autopilot for pre-provisioned deployment](pre-provision.md#preparation).
95
95
96
-
Prerequisites:
97
-
98
-
- Microsoft Entra ID [Company Branding](/azure/active-directory/fundamentals/customize-branding) is configured.
99
-
100
96
> [!IMPORTANT]
101
97
>
102
98
> Assigning a user to a specific Autopilot device doesn't work if using Active Directory Federation Services (ADFS).
0 commit comments