Skip to content

Commit a56bb25

Browse files
author
Angela Fleischmann
authored
Merge pull request #7628 from MicrosoftDocs/lenewsad-patch-3
Update windows-enrollment-status.md
2 parents 1f576f4 + 12ea4fc commit a56bb25

1 file changed

Lines changed: 102 additions & 68 deletions

File tree

memdocs/intune/enrollment/windows-enrollment-status.md

Lines changed: 102 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Set up the Enrollment Status Page
4+
title: Set up the Enrollment Status Page in the admin center
55
titleSuffix: Microsoft Intune
66
description: Set up a greeting page for users signing in and enrolling Windows devices.
77
keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 03/02/2022
11+
ms.date: 06/02/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -41,19 +41,21 @@ ms.collection:
4141

4242
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
4343

44-
The Enrollment Status Page (ESP) displays provisioning progress after a new device is enrolled, and also when new users sign in to the device. The ESP provides a user interface so that the device user can monitor and track setup and enrollment progress. It locks the device during setup and doesn't let the user progress beyond the screen until provisioning is complete.
44+
The enrollment status page (ESP) displays the provisioning status to people enrolling Windows devices and signing in for the first time. You can configure the ESP to block device use until all required policies and applications are installed. Device users can look at the ESP to track how far along their device is in the setup process.
4545

46-
You can show the enrollment status page during the default out-of-box experience (OOBE) for Azure AD Join, any [Windows Autopilot](../../autopilot/index.yml) provisioning scenario, or when new users sign into the device for the first time.
46+
The ESP can be deployed during the default out-of-box experience (OOBE) for Azure Active Directory (Azure AD) Join, and any [Windows Autopilot](../../autopilot/index.yml) provisioning scenario.
4747

48-
To deploy the enrollment status page, you have to create an enrollment status page profile in Microsoft Intune. Within a profile, you can configure:
48+
To deploy the ESP to devices, you have to create an ESP profile in Microsoft Intune. Within the profile, you can configure the ESP settings that control:
4949

50-
- The visibility of installation progress
51-
- Blocking device access until the provisioning process is completed
52-
- Time limits
53-
- Allowed troubleshooting operations
50+
- Visibility of installation progress indicators
51+
- Device access during provisioning
52+
- Time limits
53+
- Allowed troubleshooting operations
5454

55-
This article describes how to create and edit a profile, and describes the information that the enrollment status page tracks.
55+
This article describes the information that the enrollment status page tracks and how to create an ESP profile.
5656

57+
## Windows CSP
58+
ESP uses the [EnrollmentStatusTracking configuration service provider (CSP)](/windows/client-management/mdm/enrollmentstatustracking-csp) and [FirstSyncStatus CSP](/windows/client-management/mdm/dmclient-csp) to track app installation.
5759

5860
## Create new profile
5961

@@ -114,10 +116,12 @@ This article describes how to create and edit a profile, and describes the infor
114116
8. Select **Next**.
115117

116118
9. Optionally, in **Scope tags**, assign a tag to limit profile management to specific IT groups, such as `US-NC IT Team` or `JohnGlenn_ITDepartment`. Then select **Next**.
119+
120+
> [!NOTE]
121+
> Scope tags limit who can see and reprioritize ESP profiles in the admin center. A scoped user can tell the relative priority of their profile even if they can't see all of the other profiles in Intune. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
117122
118-
10. In **Review + create**, review your settings. After you select **Create**, your changes are saved, and the profile is assigned. You can access the profile from your profiles list.
123+
10. In **Review + create**, review your settings. After you select **Create**, your changes are saved, and the profile is assigned. Once deployed, the profile will be applied the next time the devices check in. You can access the profile from your profiles list.
119124

120-
The next time each device checks in, the profile is applied.
121125

122126
## Edit default profile
123127

@@ -146,19 +150,14 @@ If you assign a user or device more than one ESP profile, the profile with the h
146150
2. If no profiles are targeted at the device, Intune applies the highest-priority profile assigned to the user. This only works in scenarios where there is a user. In white glove and self-deploying scenarios, only profiles targeted at devices can be applied.
147151
3. If no profiles are assigned to the device or user, Intune applies the default ESP profile.
148152

149-
### Set priority
150153
To prioritize your profiles:
151154

152155
1. Hover over the profile in the list with your cursor until you see three vertical dots.
153-
2. Drag the profile to the desired position in the list.
154-
155-
### Scope tags
156-
157-
Scope tags limit who can see and reprioritize an ESP profile. A scoped user can tell the relative priority of their profile even if they can't see all the other profiles in Intune. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
156+
2. Drag the profile to the desired position in the list.
158157

159158
## Block access to a device until a specific application is installed
160159

161-
You can specify which apps must be installed before the Enrollment Status Page (ESP) completes.
160+
Specify the apps that must be installed before the user can exit the ESP. You can choose up to 100 apps.
162161

163162
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
164163
2. Choose a profile > **Settings**.
@@ -167,75 +166,110 @@ You can specify which apps must be installed before the Enrollment Status Page (
167166
5. Choose **Selected** for **Block device use until these required apps are installed if they're assigned to the user/device**.
168167
6. Choose **Select apps** > choose the apps > **Select** > **Save**.
169168

170-
The apps that are included in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include "App 1," "App 2," and "App 3" and "App 3" and "App 4" are targeted to the device or user, the Enrollment Status Page will track only "App 3." "App 4" will still be installed, but the Enrollment Status Page will not wait for it to complete.
169+
The apps that are included in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include "App 1," "App 2," and "App 3" and "App 3" and "App 4" are targeted to the device or user, the ESP will track only "App 3." "App 4" will still be installed, but the ESP will not wait for it to complete.
171170

172-
A maximum of 100 apps can be specified.
171+
## ESP tracking
173172

174-
## Enrollment Status Page tracking information
173+
The enrollment status page tracks these phases of provisioning:
175174

176-
There are three phases where the Enrollment Status Page tracks information for; device preparation, device setup, and account setup.
175+
* Device preparation
176+
* Device setup
177+
* Account setup
178+
179+
This section describes the types of information, apps, and policies tracked during each phase.
177180

178181
### Device preparation
179182

180-
For device preparation, the enrollment status page tracks:
183+
During device preparation, the enrollment status page tracks these tasks for the device user:
184+
185+
* Secure your hardware
186+
* Join your organization's network
187+
* Register your device for mobile management
188+
189+
#### Secure your hardware
190+
This task ensures that the device completes the Trusted Platform Module (TPM) key attestation and validates its identity with Azure AD. Azure AD sends a token to the device, which is used during Azure AD join.
181191

182-
- Trusted Platform Module (TPM) key attestation (when applicable)
183-
- Azure Active Directory join process
184-
- Intune (MDM) enrollment
185-
- Installation of the Intune Management Extensions (used to install Win32 apps)
192+
This step is required for self-deploying mode and white glove deployment. It isn't needed for Windows Autopilot scenarios in user-driven mode.
193+
194+
#### Join your organization's network
195+
The device uses the token received in the previous step to join Azure AD. This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this task by time they open the ESP.
196+
197+
### Register your device for mobile management
198+
The device enrolls in Microsoft Intune for mobile device management (MDM).
199+
200+
This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this step by time they open the ESP.
201+
202+
After enrollment, the device calculates the policies and apps required to track in the next phase. For Windows 10, version 1903 and later versions, the device also creates the tracking policy for the SideCar agent, and installs the Intune Management Extension that's used to install Win32 apps.
186203

187204
### Device setup
188205

189-
The Enrollment Status Page tracks the following device setup items:
206+
The enrollment status page tracks these items during the device setup phase:
207+
208+
* Security policies
209+
* Certificate profiles
210+
* Network connection
211+
* Apps
212+
213+
#### Security policies
214+
ESP doesn't track security policies, such as device restrictions, but these policies are installed in the background. The ESP does track Microsoft Edge, Assigned Access, and Kiosk Browser policies.
190215

191-
- Security policies
192-
- Microsoft Edge, Assigned Access, and Kiosk Browser policies are presently tracked.
193-
- Other policies aren't tracked.
194-
- Applications
195-
- Per machine Line-of-business (LoB) MSI apps.
196-
- LoB store apps with installation context = Device.
197-
- Offline store apps with installation context = Device.
198-
- Win32 applications (Windows 11 and Windows 10 version 1903 and later only)
216+
> [!TIP]
217+
> When complete, the status for security policies appears on the ESP as **(1 of 1) completed**.
199218
200-
> [!NOTE]
201-
> It's preferable to deploy the offline-licensed Microsoft Store for Business apps. Don't mix LOB and Win32 apps. Both LOB (MSI) and Win32 installers use TrustedInstaller, which doesn't allow simultaneous installations. If the OMA DM agent starts an MSI installation, the Intune Management Extension plugin starts a Win32 app installation by using the same TrustedInstaller. In this situation, Win32 app installation fails and returns an **Another installation is in progress, please try again later** error message. In this situation, ESP fails. Therefore, don't mix LOB and Win32 apps in any type of Autopilot enrollment.
202-
>
219+
#### Certificates
220+
The ESP tracks the installation of SCEP certificate profiles targeted at devices.
203221

204-
- Connectivity profiles
205-
- VPN or Wi-Fi profiles that are assigned to **All Devices** or a device group in which the enrolling device is a member, but only for Autopilot devices
206-
- Certificate profiles that are assigned to **All Devices** or a device group in which the enrolling device is a member, but only for Autopilot devices
222+
#### Network connections
223+
The ESP tracks VPN and Wi-Fi profiles targeted at devices.
224+
225+
#### Apps
226+
The ESP tracks the installation of apps deployed in a device context, and includes:
227+
228+
- Per machine line-of-business (LoB) MSI apps
229+
- LoB store apps where installation context = device
230+
- Offline store apps where installation context = device
231+
- Win32 applications for Windows 10, version 1903 and later, and Windows 11.
207232

208233
### Account setup
209234

210-
For account setup, the Enrollment Status Page tracks the following items if they're assigned to the current logged in user:
211-
212-
- Security policies
213-
- Microsoft Edge, Assigned Access, and Kiosk Browser policies are presently tracked.
214-
- Other policies aren't tracked.
215-
- Applications
216-
- Per user LoB MSI apps that are assigned to All Devices, All Users, or a user group in which the user enrolling the device is a member.
217-
- Per machine LoB MSI apps that are assigned to All Users or a user group in which the user enrolling device is a member.
218-
- LoB store apps, online store apps, and offline store apps that are assigned to any of the following objects:
219-
- All Devices
220-
- All Users
221-
- A user group in which the user enrolling the device is a member with installation context set to User.
222-
- Win32 applications (Windows 10 version 1903 and newer only)
223-
- Connectivity profiles
224-
- VPN or Wi-Fi profiles that are assigned to All Users or a user group in which the user enrolling the device is a member.
225-
- Certificates
226-
- Certificate profiles that are assigned to All Users or a user group in which the user enrolling the device is a member.
235+
During the account setup phase, the ESP tracks apps and policies targeted at users, including:
236+
237+
* Security policies
238+
* Certificates
239+
* Network connections
240+
* Apps
241+
242+
> [!TIP]
243+
> Before installation begins, the device creates a tracking policy and calculates all apps and policies that need to be tracked. While that's happening, the ESP shows subtasks in an **Identifying** state.
244+
245+
#### Security policies
246+
ESP doesn't track security policies, such as device restrictions, but these policies are installed in the background. The ESP does track Microsoft Edge, Assigned Access, and Kiosk Browser policies.
247+
248+
#### Certificates
249+
The ESP tracks the installation of SCEP certificate profiles assigned to users.
250+
251+
#### Network connections
252+
The ESP tracks Wi-Fi profiles assigned to users.
253+
254+
#### Apps
255+
During this phase, the ESP tracks the installation of apps assigned to the user. The ESP tracks Win32 apps for Windows 10, version 1903 and later.
256+
257+
It also tracks the following types of apps when they're assigned to all devices, all users, or a user group that includes the enrolling device user:
258+
259+
- Per user LoB MSI apps
260+
- Per machine LoB MSI apps
261+
- LoB store apps, online store apps, and offline store apps
227262

228263
### Known issues
229264

230-
The following are known issues related to the Enrollment Status Page.
265+
This section lists the known issues for the enrollment status page.
266+
231267
- When creating apps that will be deployed during ESP, any reboots that are packaged within the app may cause ESP to hang and fail the deployment. We recommend specifying the reboot behavior in Intune instead of triggering the reboot within the package.
232268
- Disabling the ESP profile doesn't remove ESP policy from devices and users still get ESP when they log in to device for first time. The policy isn't removed when the ESP profile is disabled.
233-
- A reboot during Device setup will force the user to enter their credentials before transitioning to Account setup phase. User credentials aren't preserved during reboot. Have the user enter their credentials then the Enrollment Status Page can continue.
234-
- Enrollment Status Page will always time out during an Add work and school account enrollment on Windows 10 versions earlier than 1903. The Enrollment Status Page waits for Azure AD registration to complete. The issue is fixed on Windows 10 version 1903 and newer.
235-
- Hybrid Azure AD Autopilot deployment with ESP takes longer than the timeout duration entered in the ESP profile. On Hybrid Azure AD Autopilot deployments, the ESP will take 40 minutes longer than the value set in the ESP profile. For example, you set the timeout duration to 30 minutes in the profile. The ESP can take 30 minutes + 40 minutes.
236-
237-
This delay gives time for the on-prem AD connector to create the new device record to Azure AD.
238-
269+
- A reboot during device setup forces the user to enter their credentials before the account setup phase. User credentials aren't preserved during reboot. Instruct the device users to enter their credentials to continue to the account setup phase.
270+
- The ESP always times out on devices running Windows 10, version 1903 and earlier, and
271+
enrolled via the *Add work and school account* option. The ESP waits for Azure AD registration to complete. The issue is fixed on Windows 10 version 1903 and later.
272+
- Hybrid Azure AD Autopilot deployment with ESP takes longer than the timeout duration entered in the ESP profile. On Hybrid Azure AD Autopilot deployments, the ESP takes 40 minutes longer than the value set in the ESP profile. For example, you set the timeout duration to 30 minutes in the profile. The ESP can take 30 minutes + 40 minutes. This delay gives the on-prem AD connector time to create the new device record to Azure AD.
239273
- Windows logon page isn't pre-populated with the username in Autopilot User Driven Mode. If there's a reboot during the Device Setup phase of ESP:
240274
- the user credentials aren't preserved
241275
- the user must enter the credentials again before proceeding from Device Setup phase to the Account setup phase
@@ -249,4 +283,4 @@ The following are known issues related to the Enrollment Status Page.
249283

250284
## Troubleshooting
251285

252-
For troubleshooting help, including how to disable an already-enabled ESP, see [Troubleshoot the Windows Enrollment Status page](/troubleshoot/mem/intune/understand-troubleshoot-esp#troubleshooting).
286+
For help with errors or messages related to the ESP, including how to disable an already-enabled ESP, see [Troubleshoot the Windows Enrollment Status page](/troubleshoot/mem/intune/understand-troubleshoot-esp#troubleshooting).

0 commit comments

Comments
 (0)