Streamline Device Provisioning with Intune and Autopilot

A Blueprint for the Design, Deployment, and Operation of Windows Autopilot at Scale 

Audience and Purpose 

This reference is intended for Endpoint Architects, Intune Administrators, Engineering Managers, and Service Owners. Its objective is to deliver a pragmatic, evidence-driven framework, in alignment with Microsoft’s latest recommendations and supported by real-world experience, to guide the design, deployment, and operation of Windows Autopilot at enterprise scale. 

Executive Summary 

Optimal Autopilot implementations should default to cloud-native approaches, leveraging Device Preparation (v2) for Microsoft Entra-joined devices wherever feasible. Classic Autopilot (v1) should be reserved for scenarios necessitating advanced Out-of-Box Experience (OOBE) customisation, pre-provisioning, or hybrid join requirements. The Enrolment Status Page (ESP) serves as a critical readiness checkpoint, emphasising Tier-0 validations such as endpoint detection and response (EDR), network and Wi-Fi configuration, certificate deployment, and essential remediation measures. It is recommended to extend timeouts and enable diagnostics for ESP. Non-essential tasks should be deferred until post-ESP, utilising the Company Portal for user-driven self-service. Security standards should be established early through the adoption of the latest Intune Security Baselines, further refined by the Settings Catalog, while avoiding the deployment of conflicting or obsolete baselines. Hybrid join configurations should be implemented only where strictly necessary, ensuring deployment of the current Intune Connector for Active Directory (MSA), verification of organisational unit permissions and domain controller connectivity, and planning for potentially extended ESP durations in these environments. 

1. Architectural Considerations: Classic (v1) vs. Device Preparation (v2) 

Selecting the most suitable Autopilot solution for each use case is crucial, as it significantly influences reliability, operational complexity, and time-to-productivity. 

1.1 Comparative Overview 

Adopting Entra join with Device Preparation (v2) streamlines the Out-of-Box Experience and provides a faster, more consistent onboarding process, facilitated by enrolment-time grouping and enhanced reporting capabilities. Classic (v1) remains essential for instances requiring extensive OOBE customisation, pre-provisioning, and hybrid join support. 

1.2 Design Review: Pros & Cons 

A detailed review should weigh the advantages and disadvantages of each architectural option, factoring in operational requirements, user experience, and deployment complexity. 

Category Autopilot v1 (Classic) Autopilot Device Preparation (v2) 
Pros Full OOBE customization; preprovisioning supported; hybrid join supported. No hardware hash import; cloudfirst reliability; enrollmenttime grouping and near realtime status. 
Cons Requires hardware hash; more OOBE surface → higher ESP stall risk if overconfigured; hybrid adds moving parts. Entra join only; fewer OOBE knobs; still evolving toward full parity. 
Use when… You need hybrid, deep OOBE control, or preprovisioned technician/OEM flow. You want fast, lowfriction cloudnative onboarding and simpler operations. 
2. End-to-End Workflow 

The workflow follows these sequential stages: establishing network connectivity, downloading profiles, authenticating users, Entra joining, enrolling in MDM (Intune), completing ESP (Device Preparation/Setup; optionally Account Setup), and finally reaching the desktop environment. Structure monitoring and troubleshooting activities according to this progression. 

3. Device & Image Integrity (Critical Prerequisites) 
4. Enrolment Strategy and Controls 

Apply policies in order of priority; higher-priority rules override defaults. Note that these controls govern device allocation and are not intended for use as security measures. 

5. ESP (Enrolment Status Page): Intentional Access Control 
ESP Application Checklist 
Recommended Lean ESP App Policy 
Category ESP Post ESP (Intune Required) Company Portal (SelfService) 
Security Agent / EDR ✅ — — 
VPN / ZTNA client ✅ — — 
Certificate / WiFi Config ✅ — — 
BitLocker / Security Baseline enforcement ✅ — — 
Microsoft 365 Apps ❌ Optional → Required after ESP ✔ Recommended 
Teams / OneDrive ❌ Optional → Required after ESP ✔ Recommended 
LOB / Packaging apps ❌ ✔ Required (postESP) ✔ Optional 
Large Win32 apps ❌ ✔ Required (postESP) ✔ Optional 
6. Pre-Provisioning (White Glove) Guidance 
7. Security Baselines: Rapid Deployment and Refinement 
8. Hybrid Join: Exception Management 

Microsoft recommends cloud-native, Entra-joined endpoints for new deployments. If hybrid join is unavoidable: 

9. Application Delivery Best Practices 
10. Monitoring, Telemetry, and Troubleshooting 
11. Implementation Runbook (Abbreviated) 
  1. Select the appropriate model per scenario: prefer Device Preparation; use Classic for pre-provisioning or hybrid cases. 
  1. Ensure device health: TPM 2.0 active, OEM image utilised, drivers maintained via Windows Update. 
  1. Configure and prioritise enrolment restrictions (platform and device limits). 
  1. Define ESP profile: display progress, block desktop for Tier-0, increase timeout, activate diagnostics. 
  1. Curate applications for essential device-phase inclusion; postpone bulk/user apps to post-ESP or Company Portal. 
  1. Deploy current security baselines to pilot groups; mitigate conflicts; refine using Settings Catalog. 
  1. For hybrid scenarios: install updated AD connector (MSA), confirm OU permissions and domain/DC reachability, allow extra time. 
  1. Use pre-provisioning where it notably improves activation time; recognise re-enrolment requirements. 
  1. Adhere to disciplined troubleshooting: follow the established workflow, gather diagnostics, document resolutions. 
12. Operational Metrics 

In conclusion, navigating the complexities of Windows Autopilot deployment requires careful consideration of hardware requirements, configuration options, and security measures. By leveraging the guidance provided in this blog, IT professionals can streamline device provisioning, optimise enrolment processes, and enhance security across their organisation. With the right preparation and best practises in place, your team will be well-equipped to address challenges and maximise the benefits of modern device management solutions.

About the Blog

The Modern Endpoints Brief is a personal, practitioner-led blog focused on the real-world challenges and opportunities of managing modern endpoints and digital workspaces. It covers insights, strategies, and notes from the field on topics such as endpoint management, device security, identity, automation, and user experience across today’s hybrid and cloud-first environments.

Written for IT professionals, the blog blends practical guidance with architectural thinking cutting through vendor noise to share what actually works, what doesn’t, and why. The goal is to provide clear, experience-driven perspectives that help IT teams design, operate, and evolve modern endpoint platforms with confidence.

Newsletter

Subscribe to my email newsletter full of inspiring stories about my journey that continues.