Skip to content

Commit 933c91a

Browse files
authored
Merge pull request #7693 from MicrosoftDocs/release-intune-2205
Release intune 2205
2 parents 2cd3126 + 4fd8b4c commit 933c91a

72 files changed

Lines changed: 1877 additions & 733 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

memdocs/autopilot/add-devices.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Microsoft Endpoint Configuration Manager automatically collects the hardware has
7878

7979
### PowerShell
8080

81-
The hardware hash for an existing device is available through Windows Management Instrumentation (WMI), as long as that device is running a supported version of Windows. You can use a PowerShell script ([Get-WindowsAutoPilotInfo.ps1](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo)) to get a device's hardware hash and serial number. The serial number is useful for quickly seeing which device the hardware hash belongs to.
81+
The hardware hash for an existing device is available through Windows Management Instrumentation (WMI), as long as that device is running a supported version of Windows. You can use a PowerShell script ([Get-WindowsAutopilotInfo.ps1](https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo)) to get a device's hardware hash and serial number. The serial number is useful for quickly seeing which device the hardware hash belongs to.
8282

8383
To use this script, you can use either of the following methods:
8484

@@ -94,8 +94,8 @@ To install the script directly and capture the hardware hash from the local comp
9494
Set-Location -Path "C:\HWID"
9595
$env:Path += ";C:\Program Files\WindowsPowerShell\Scripts"
9696
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
97-
Install-Script -Name Get-WindowsAutoPilotInfo
98-
Get-WindowsAutoPilotInfo -OutputFile AutoPilotHWID.csv
97+
Install-Script -Name Get-WindowsAutopilotInfo
98+
Get-WindowsAutopilotInfo -OutputFile AutopilotHWID.csv
9999
```
100100

101101
You can run the commands remotely if both of the following are true:
@@ -109,7 +109,7 @@ To install the script directly and capture the hardware hash from the local comp
109109
PowerShell.exe -ExecutionPolicy Bypass
110110
Install-Script -name Get-WindowsAutopilotInfo -Force
111111
Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned
112-
Get-WindowsAutoPilotInfo -Online
112+
Get-WindowsAutopilotInfo -Online
113113
```
114114

115115
3. You're prompted to sign in. An account with the Intune Administrator role is sufficient, and the device hash will then be uploaded automatically.
@@ -123,7 +123,7 @@ To install the script directly and capture the hardware hash from the local comp
123123
> [!NOTE]
124124
> Because Intune offers free (or inexpensive) accounts that lack robust vetting, and because 4K hardware hashes contain sensitive information that only device owners should maintain, we recommend registering devices through Microsoft Endpoint Manager via a 4K hardware hash only for testing or other limited scenarios. In most cases, you should instead use the Microsoft Partner Center for Autopilot device registration.
125125
126-
For more information about running the *Get-WindowsAutoPilotInfo.ps1* script, see the script's help by using `Get-Help Get-WindowsAutoPilotInfo`.
126+
For more information about running the *Get-WindowsAutopilotInfo.ps1* script, see the script's help by using `Get-Help Get-WindowsAutopilotInfo`.
127127

128128
### Diagnostics page hash export
129129

memdocs/autopilot/autopilot-faq.yml

Lines changed: 397 additions & 102 deletions
Large diffs are not rendered by default.

memdocs/autopilot/autopilot-mbr.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,14 +138,14 @@ Repair technicians must sign in to the repaired device to capture the new device
138138

139139
Those repair facilities with access to the OA3 Tool (which is part of the ADK) can use the tool to capture the 4K Hardware Hash (4K HH).
140140

141-
Instead, the [WindowsAutoPilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) can be used to capture the 4K HH.
141+
Instead, the [WindowsAutopilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo) can be used to capture the 4K HH.
142142

143143
> [!NOTE]
144144
> Other methods in addition to Windows PowerShell are also available to capture the hardware hash. For more information, see [Collect the hardware hash](add-devices.md#collect-the-hardware-hash).
145145
146-
To use the **WindowsAutoPilotInfo** PowerShell script, follow these steps:
146+
To use the **WindowsAutopilotInfo** PowerShell script, follow these steps:
147147

148-
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) or from the command line (command-line installation is shown below).
148+
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo) or from the command line (command-line installation is shown below).
149149
2. Navigate to the script directory and run it on the device when the device is either in Full OS or Audit Mode. See the following example.
150150

151151
```powershell

memdocs/autopilot/existing-devices.md

Lines changed: 341 additions & 251 deletions
Large diffs are not rendered by default.
6.99 KB
Loading
-223 KB
Binary file not shown.
-230 KB
Binary file not shown.

memdocs/autopilot/known-issues.md

Lines changed: 30 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,14 @@ author: aczechowski
1212
ms.author: aaroncz
1313
ms.reviewer: jubaptis
1414
manager: dougeby
15-
ms.date: 03/28/2022
15+
ms.date: 05/18/2022
1616
ms.collection: M365-modern-desktop
1717
ms.topic: troubleshooting
1818
---
1919

2020
# Windows Autopilot - known issues
2121

22-
**Applies to**
22+
_Applies to_
2323

2424
- Windows 11
2525
- Windows 10
@@ -30,91 +30,96 @@ This article describes known issues that can often be resolved by configuration
3030

3131
### `DefaultuserX` profile not deleted
3232

33-
When using the [EnableWebSignIn CSP](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin), the `defaultuserX` profile may not be deleted. This CSP isn't currently supported. It's in private preview mode only and not recommended for production purposes at this time.
33+
When you use the [EnableWebSignIn CSP](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin), the `defaultuserX` profile may not be deleted. This CSP isn't currently supported. It's in preview mode only and not recommended for production purposes at this time.
3434

3535
### Autopilot reset ran into trouble. Could not find the recovery environment
3636

37-
When attempting an Autopilot reset, an administrator sees the following message: _Autopilot reset ran into trouble. Could not find the recovery environment_. If there isn't an issue with the recovery environment, enter administrator credentials to continue with the reset process.
37+
When you attempt an Autopilot reset, you see the following message: _Autopilot reset ran into trouble. Could not find the recovery environment_. If there isn't an issue with the recovery environment, enter administrator credentials to continue with the reset process.
3838

3939
### Device-based Conditional Access policies
4040

41-
1. The Intune Enrollment app must be excluded from any Conditional Access policy requiring **Terms of Use** because it isnt supported. See [Per-device terms of use](/azure/active-directory/conditional-access/terms-of-use#per-device-terms-of-use).
41+
1. The Intune Enrollment app must be excluded from any Conditional Access policy requiring **Terms of Use** because it isn't supported. See [Per-device terms of use](/azure/active-directory/conditional-access/terms-of-use#per-device-terms-of-use).
4242

4343
2. Exceptions to Conditional Access policies to exclude **Microsoft Intune Enrollment** and **Microsoft Intune** cloud apps are needed to complete Autopilot enrollment in cases where restrictive polices are present such as:
4444
- Conditional Access policy 1: Block all apps except those on an exclusion list.
4545
- Conditional Access policy 2: Require a compliant device for the apps on the exclusion list.
46-
46+
4747
In this case, Microsoft Intune Enrollment and Microsoft Intune should be included in that exclusion list of policy 1.
4848

49-
If a policy is in place such that **all cloud apps** require a compliant device (there is no exclusion list), Microsoft Intune Enrollment will already be excluded by default, so that the device can register with Azure AD and enroll with Intune and avoid a circular dependency.
49+
If a policy is in place such that **all cloud apps** require a compliant device (there's no exclusion list), Microsoft Intune Enrollment will already be excluded by default, so that the device can register with Azure AD and enroll with Intune and avoid a circular dependency.
5050

51-
3. **Hybrid Azure AD devices**: When Hybrid Azure AD devices are deployed with Autopilot, 2 device IDs are initially associated with the same device one Azure AD and one hybrid. The hybrid compliance state will display as **N/A** when viewed from the devices list in the Azure portal until a user signs in. Intune only syncs with the Hybrid device ID after a successful user sign-in.
51+
3. **Hybrid Azure AD devices**: When Hybrid Azure AD devices are deployed with Autopilot, two device IDs are initially associated with the same device - one Azure AD and one hybrid. The hybrid compliance state will display as **N/A** when viewed from the devices list in the Azure portal until a user signs in. Intune only syncs with the Hybrid device ID after a successful user sign-in.
5252

5353
The temporary **N/A** compliance state can cause issues with device based Conditional Access polices that block access based on compliance. In this case, Conditional Access is behaving as intended. To resolve the conflict, a user must to sign in to the device, or the device-based policy must be modified. For more information, see [Conditional Access: Require compliant or hybrid Azure AD joined device](/azure/active-directory/conditional-access/howto-conditional-access-policy-compliant-device).
5454

55-
4. Conditional Access policies such as BitLocker compliance require a grace period for Autopilot devices, because until the device has been rebooted the status of BitLocker and Secure Boot have not been captured, and cannot be used as part of the Compliance Policy. The grace period can be as short as 0.25 days.
55+
4. Conditional Access policies such as BitLocker compliance require a grace period for Autopilot devices, because until the device has been rebooted the status of BitLocker and Secure Boot haven't been captured, and can't be used as part of the Compliance Policy. The grace period can be as short as 0.25 days.
5656

5757
### Device goes through Autopilot deployment without an assigned profile
5858

59-
When a device is registered in Autopilot and no profile is assigned, it will take the default Autopilot profile. This is by design to ensure that all devices registered with Autopilot, goes through the Autopilot experience. If you do not want the device to go through an Autopilot deployment, you must remove the Autopilot registration.
59+
When a device is registered in Autopilot and no profile is assigned, it will take the default Autopilot profile. This behavior is by design. It makes sure that all devices that you register with Autopilot go through the Autopilot experience. If you don't want the device to go through an Autopilot deployment, remove the Autopilot registration.
6060

6161
### White screen during HAADJ deployment
6262

63-
There is a UI bug on Autopilot HAADJ deployments where the Enrollment Status page is displayed as a white screen. This issue is limited to the UI and should not impact the deployment process.
63+
There's a UI bug on Autopilot HAADJ deployments where the Enrollment Status page is displayed as a white screen. This issue is limited to the UI and shouldn't affect the deployment process.
6464

65-
### Virtual machine failing at Preparing your device for mobile management
65+
### Virtual machine failing at "Preparing your device for mobile management"
6666

67-
This error can be resolved by configuring your virtual machine with a minimum of 2 processers and 4GB of memory.
67+
This error can be resolved by configuring your virtual machine with a minimum of two processors and 4 GB of memory.
6868

6969
### ODJConnectorSvc.exe leaks memory
7070

71-
When using a proxy server with the ODJConnector service, the memory file can get too large when processing requests resulting in impacts to performance. The current workaround for this issue is to restart the ODJConnectSvc.exe service.
71+
When you use a proxy server with the ODJConnector service, the memory file can get too large when processing requests resulting in impacts to performance. The current workaround for this issue is to restart the ODJConnectSvc.exe service.
7272

7373
### Reset button causes pre-provisioning to fail on retry
7474

75-
When ESP fails during the pre-provisioning flow and the user selects the reset button, TPM attestation may fail during the retry.
75+
When ESP fails during the pre-provisioning flow and the user selects the reset button, TPM attestation may fail during the retry.
7676

7777
### TPM attestation failure on Windows 11 error code 0x81039023
7878

79-
Some devices may fail TPM attestation on Windows 11 during the pre-provisioning technician flow or self-deployment mode with the error code 0x81039023. There is no workaround currently for this error code, we are working to resolve this issue.
79+
Some devices may fail TPM attestation on Windows 11 during the pre-provisioning technician flow or self-deployment mode with the error code 0x81039023. There's no workaround currently for this error code, we're working to resolve this issue.
8080

81-
### Duplicate device objects with hybrid Azure AD deployments
81+
### Duplicate device objects with hybrid Azure AD deployments
8282

83-
A device object is pre-created in Azure AD once a device is registered in Autopilot. If a device goes through a hybrid Azure AD deployment, by design, another device object is created resulting in duplicate entries.
83+
A device object is pre-created in Azure AD once a device is registered in Autopilot. If a device goes through a hybrid Azure AD deployment, by design, another device object is created resulting in duplicate entries.
8484

8585
### TPM attestation failure on Windows 11 error code 0x81039024
8686

87-
Some devices may fail TPM attestation on Windows 11 during the pre-provisioning technician flow or self-deployment mode with the error code 0x81039024. This error code indicates that there are known vulnerabilities detected with the TPM and as a result will fail attestation. If you receive this error, please visit your PC manufacturers website to update the TPM firmware.
87+
Some devices may fail TPM attestation on Windows 11 during the pre-provisioning technician flow or self-deployment mode with the error code 0x81039024. This error code indicates that there are known vulnerabilities detected with the TPM and as a result will fail attestation. If you receive this error, visit your PC manufacturer's website to update the TPM firmware.
8888

8989
### Delete device record in Intune before reusing devices in self-deployment mode or Pre-Provisioning mode
9090

91-
You have devices enrolled using Autopilot self-deployment mode or pre-provisioning mode. If you redeploy an Autopilot profile, it fails with a `0x80180014` error code. To resolve this error, delete the device record in Intune, and then redeploy the profile.
91+
You have devices enrolled using Autopilot self-deployment mode or pre-provisioning mode. If you redeploy an Autopilot profile, it fails with a `0x80180014` error code.
92+
93+
To resolve this error, use one of the following work around methods:
94+
95+
- Delete the device record in Intune, and then redeploy the profile.
96+
- Remove the device enrollment restriction for **Windows (MDM)** personally owned devices. For more information, see [Set enrollment restrictions in Microsoft Intune](../intune/enrollment/enrollment-restrictions-set.md).<!-- MEMDocs #2748 -->
9297

9398
For more information on this issue, see [Troubleshoot Autopilot device import and enrollment](troubleshoot-device-enrollment.md).
9499

95100
### A non-assigned user can sign in when using user-driven mode with Active Directory Federation Services (ADFS)
96101

97-
In a Windows Autopilot user-driven Azure Active Directory (Azure AD) joined environment, administrators can pre-assign a user to a device. If the user is a cloud-native Azure AD account, the username is enforced and the user is only asked for their password; there is no way to sign in with another user ID. However, when ADFS is used, the username assignment is not enforced. A different user than the one assigned can sign in on the device.
102+
In a Windows Autopilot user-driven Azure Active Directory (Azure AD) joined environment, you can pre-assign a user to a device. If the user is a cloud-native Azure AD account, the username is enforced and the user is only asked for their password. There's no way to sign in with another user ID. However, when ADFS is used, the username assignment isn't enforced. A different user than the one assigned can sign in on the device.
98103

99104
### Intune connector is inactive but still appears in the Intune Connectors
100105

101106
Inactive Intune connectors will be automatically cleaned up after 30 days of inactivity without admin interaction.
102107

103108
### Autopilot sign-in page displays HTML tags from company branding settings
104109

105-
When [customizations are applied to the company branding settings](/azure/active-directory/fundamentals/customize-branding#to-customize-your-branding) the HTML tags may be visible and not rendered correctly on the update password page. This issue should be fixed in future versions of Windows.
110+
When [customizations are applied to the company branding settings](/azure/active-directory/fundamentals/customize-branding#to-customize-your-branding), the HTML tags may be visible and not rendered correctly on the update password page. This issue should be fixed in future versions of Windows.
106111

107-
### TPM attestation is not working on Intel Tiger Lake platforms
112+
### TPM attestation isn't working on Intel Tiger Lake platforms
108113

109-
TPM attestation support for Intel firmware TPM Tiger Lake platforms are only supported on devices with Windows 10 version 21H2 or higher. This issue should be resolved by applying the November 2021 LCU.
114+
TPM attestation support for Intel firmware TPM Tiger Lake platforms is only supported on devices with Windows 10 version 21H2 or later. This issue should be resolved by applying the November 2021 LCU.
110115

111116
### Blocking apps specified in a user-targeted Enrollment Status Profile are ignored during device ESP
112117

113118
The services responsible for determining the list of apps that should be blocking during device ESP aren't able to determine the correct ESP profile containing the list of apps because they don't know the user identity. As a workaround, enable the default ESP profile (which targets all users and devices) and place the blocking app list there. To avoid this issue, target the ESP profile to [device groups](enrollment-autopilot.md).
114119

115120
### That username looks like it belongs to another organization. Try signing in again or start over with a different account
116121

117-
Confirm that all of your information is correct at `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Provisioning\Diagnostics\AutoPilot`. For more information, see [Troubleshoot OOBE issues](troubleshoot-oobe.md#windows-10-version-1709-and-above).
122+
Confirm that all of your information is correct at `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Provisioning\Diagnostics\Autopilot`. For more information, see [Troubleshoot OOBE issues](troubleshoot-oobe.md#windows-10-version-1709-and-above).
118123

119124
### Windows Autopilot user-driven hybrid Azure AD deployments don't grant users Administrator rights even when specified in the Windows Autopilot profile
120125

memdocs/autopilot/manual-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ After the hardware hashes have been captured from existing devices, they can be
5050
- [Microsoft Intune](add-devices.md). This is the preferred mechanism for all customers.
5151
- The Microsoft Endpoint Manager admin center is used for Intune device enrollment.
5252
- [Partner Center](https://msdn.microsoft.com/partner-center/autopilot). This is used by CSP partners to register devices on behalf of customers.
53-
- [Microsoft 365 Business & Office 365 Admin](https://support.office.com/article/Create-and-edit-AutoPilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa). This is typically used by small and medium businesses (SMBs) who manage their devices using Microsoft 365 Business.
53+
- [Microsoft 365 Business & Office 365 Admin](https://support.office.com/article/Create-and-edit-Autopilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa). This is typically used by small and medium businesses (SMBs) who manage their devices using Microsoft 365 Business.
5454
- [Microsoft Store for Business](/microsoft-store/add-profile-to-devices#manage-autopilot-deployment-profiles). You might already be using MSfB to manage your apps and settings.
5555

5656
>[!IMPORTANT]

0 commit comments

Comments
 (0)