You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Enrollment Status Page (ESP) displays provisioning progress after a new device is enrolled, and also when new users sign in to the device. The ESP provides a user interface so that the device user can monitor and track setup and enrollment progress. It locks the device during setup and doesn't let the user progress beyond the screen until provisioning is complete.
44
+
The enrollment status page (ESP) displays the provisioning status to people enrolling Windows devices and signing in for the first time. You can configure the ESP to block device use until all required policies and applications are installed. Device users can look at the ESP to track how far along their device is in the setup process.
45
45
46
-
You can show the enrollment status page during the default out-of-box experience (OOBE) for Azure AD Join, any [Windows Autopilot](../../autopilot/index.yml) provisioning scenario, or when new users sign into the device for the first time.
46
+
The ESP can be deployed during the default out-of-box experience (OOBE) for Azure Active Directory (Azure AD) Join, and any [Windows Autopilot](../../autopilot/index.yml) provisioning scenario.
47
47
48
-
To deploy the enrollment status page, you have to create an enrollment status page profile in Microsoft Intune. Within a profile, you can configure:
48
+
To deploy the ESP to devices, you have to create an ESP profile in Microsoft Intune. Within the profile, you can configure the ESP settings that control:
49
49
50
-
-The visibility of installation progress
51
-
-Blocking device access until the provisioning process is completed
52
-
- Time limits
53
-
- Allowed troubleshooting operations
50
+
-Visibility of installation progress indicators
51
+
-Device access during provisioning
52
+
- Time limits
53
+
- Allowed troubleshooting operations
54
54
55
-
This article describes how to create and edit a profile, and describes the information that the enrollment status page tracks.
55
+
This article describes the information that the enrollment status page tracks and how to create an ESP profile.
56
56
57
+
## Windows CSP
58
+
ESP uses the [EnrollmentStatusTracking configuration service provider (CSP)](/windows/client-management/mdm/enrollmentstatustracking-csp) and [FirstSyncStatus CSP](/windows/client-management/mdm/dmclient-csp) to track app installation.
57
59
58
60
## Create new profile
59
61
@@ -114,10 +116,12 @@ This article describes how to create and edit a profile, and describes the infor
114
116
8. Select **Next**.
115
117
116
118
9. Optionally, in **Scope tags**, assign a tag to limit profile management to specific IT groups, such as `US-NC IT Team` or `JohnGlenn_ITDepartment`. Then select **Next**.
119
+
120
+
> [!NOTE]
121
+
> Scope tags limit who can see and reprioritize ESP profiles in the admin center. A scoped user can tell the relative priority of their profile even if they can't see all of the other profiles in Intune. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
117
122
118
-
10. In **Review + create**, review your settings. After you select **Create**, your changes are saved, and the profile is assigned. You can access the profile from your profiles list.
123
+
10. In **Review + create**, review your settings. After you select **Create**, your changes are saved, and the profile is assigned. Once deployed, the profile will be applied the next time the devices check in. You can access the profile from your profiles list.
119
124
120
-
The next time each device checks in, the profile is applied.
121
125
122
126
## Edit default profile
123
127
@@ -146,19 +150,14 @@ If you assign a user or device more than one ESP profile, the profile with the h
146
150
2. If no profiles are targeted at the device, Intune applies the highest-priority profile assigned to the user. This only works in scenarios where there is a user. In white glove and self-deploying scenarios, only profiles targeted at devices can be applied.
147
151
3. If no profiles are assigned to the device or user, Intune applies the default ESP profile.
148
152
149
-
### Set priority
150
153
To prioritize your profiles:
151
154
152
155
1. Hover over the profile in the list with your cursor until you see three vertical dots.
153
-
2. Drag the profile to the desired position in the list.
154
-
155
-
### Scope tags
156
-
157
-
Scope tags limit who can see and reprioritize an ESP profile. A scoped user can tell the relative priority of their profile even if they can't see all the other profiles in Intune. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
156
+
2. Drag the profile to the desired position in the list.
158
157
159
158
## Block access to a device until a specific application is installed
160
159
161
-
You can specify which apps must be installed before the Enrollment Status Page (ESP) completes.
160
+
Specify the apps that must be installed before the user can exit the ESP. You can choose up to 100 apps.
162
161
163
162
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
164
163
2. Choose a profile > **Settings**.
@@ -167,75 +166,110 @@ You can specify which apps must be installed before the Enrollment Status Page (
167
166
5. Choose **Selected** for **Block device use until these required apps are installed if they're assigned to the user/device**.
The apps that are included in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include "App 1," "App 2," and "App 3" and "App 3" and "App 4" are targeted to the device or user, the Enrollment Status Page will track only "App 3." "App 4" will still be installed, but the Enrollment Status Page will not wait for it to complete.
169
+
The apps that are included in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include "App 1," "App 2," and "App 3" and "App 3" and "App 4" are targeted to the device or user, the ESP will track only "App 3." "App 4" will still be installed, but the ESP will not wait for it to complete.
171
170
172
-
A maximum of 100 apps can be specified.
171
+
## ESP tracking
173
172
174
-
## Enrollment Status Page tracking information
173
+
The enrollment status page tracks these phases of provisioning:
175
174
176
-
There are three phases where the Enrollment Status Page tracks information for; device preparation, device setup, and account setup.
175
+
* Device preparation
176
+
* Device setup
177
+
* Account setup
178
+
179
+
This section describes the types of information, apps, and policies tracked during each phase.
177
180
178
181
### Device preparation
179
182
180
-
For device preparation, the enrollment status page tracks:
183
+
During device preparation, the enrollment status page tracks these tasks for the device user:
184
+
185
+
* Secure your hardware
186
+
* Join your organization's network
187
+
* Register your device for mobile management
188
+
189
+
#### Secure your hardware
190
+
This task ensures that the device completes the Trusted Platform Module (TPM) key attestation and validates its identity with Azure AD. Azure AD sends a token to the device, which is used during Azure AD join.
- Installation of the Intune Management Extensions (used to install Win32 apps)
192
+
This step is required for self-deploying mode and white glove deployment. It isn't needed for Windows Autopilot scenarios in user-driven mode.
193
+
194
+
#### Join your organization's network
195
+
The device uses the token received in the previous step to join Azure AD. This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this task by time they open the ESP.
196
+
197
+
### Register your device for mobile management
198
+
The device enrolls in Microsoft Intune for mobile device management (MDM).
199
+
200
+
This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this step by time they open the ESP.
201
+
202
+
After enrollment, the device calculates the policies and apps required to track in the next phase. For Windows 10, version 1903 and later versions, the device also creates the tracking policy for the SideCar agent, and installs the Intune Management Extension that's used to install Win32 apps.
186
203
187
204
### Device setup
188
205
189
-
The Enrollment Status Page tracks the following device setup items:
206
+
The enrollment status page tracks these items during the device setup phase:
207
+
208
+
* Security policies
209
+
* Certificate profiles
210
+
* Network connection
211
+
* Apps
212
+
213
+
#### Security policies
214
+
ESP doesn't track security policies, such as device restrictions, but these policies are installed in the background. The ESP does track Microsoft Edge, Assigned Access, and Kiosk Browser policies.
190
215
191
-
- Security policies
192
-
- Microsoft Edge, Assigned Access, and Kiosk Browser policies are presently tracked.
193
-
- Other policies aren't tracked.
194
-
- Applications
195
-
- Per machine Line-of-business (LoB) MSI apps.
196
-
- LoB store apps with installation context = Device.
197
-
- Offline store apps with installation context = Device.
198
-
- Win32 applications (Windows 11 and Windows 10 version 1903 and later only)
216
+
> [!TIP]
217
+
> When complete, the status for security policies appears on the ESP as **(1 of 1) completed**.
199
218
200
-
> [!NOTE]
201
-
> It's preferable to deploy the offline-licensed Microsoft Store for Business apps. Don't mix LOB and Win32 apps. Both LOB (MSI) and Win32 installers use TrustedInstaller, which doesn't allow simultaneous installations. If the OMA DM agent starts an MSI installation, the Intune Management Extension plugin starts a Win32 app installation by using the same TrustedInstaller. In this situation, Win32 app installation fails and returns an **Another installation is in progress, please try again later** error message. In this situation, ESP fails. Therefore, don't mix LOB and Win32 apps in any type of Autopilot enrollment.
202
-
>
219
+
#### Certificates
220
+
The ESP tracks the installation of SCEP certificate profiles targeted at devices.
203
221
204
-
- Connectivity profiles
205
-
- VPN or Wi-Fi profiles that are assigned to **All Devices** or a device group in which the enrolling device is a member, but only for Autopilot devices
206
-
- Certificate profiles that are assigned to **All Devices** or a device group in which the enrolling device is a member, but only for Autopilot devices
222
+
#### Network connections
223
+
The ESP tracks VPN and Wi-Fi profiles targeted at devices.
224
+
225
+
#### Apps
226
+
The ESP tracks the installation of apps deployed in a device context, and includes:
227
+
228
+
- Per machine line-of-business (LoB) MSI apps
229
+
- LoB store apps where installation context = device
230
+
- Offline store apps where installation context = device
231
+
- Win32 applications for Windows 10, version 1903 and later, and Windows 11.
207
232
208
233
### Account setup
209
234
210
-
For account setup, the Enrollment Status Page tracks the following items if they're assigned to the current logged in user:
211
-
212
-
- Security policies
213
-
- Microsoft Edge, Assigned Access, and Kiosk Browser policies are presently tracked.
214
-
- Other policies aren't tracked.
215
-
- Applications
216
-
- Per user LoB MSI apps that are assigned to All Devices, All Users, or a user group in which the user enrolling the device is a member.
217
-
- Per machine LoB MSI apps that are assigned to All Users or a user group in which the user enrolling device is a member.
218
-
- LoB store apps, online store apps, and offline store apps that are assigned to any of the following objects:
219
-
- All Devices
220
-
- All Users
221
-
- A user group in which the user enrolling the device is a member with installation context set to User.
222
-
- Win32 applications (Windows 10 version 1903 and newer only)
223
-
- Connectivity profiles
224
-
- VPN or Wi-Fi profiles that are assigned to All Users or a user group in which the user enrolling the device is a member.
225
-
- Certificates
226
-
- Certificate profiles that are assigned to All Users or a user group in which the user enrolling the device is a member.
235
+
During the account setup phase, the ESP tracks apps and policies targeted at users, including:
236
+
237
+
* Security policies
238
+
* Certificates
239
+
* Network connections
240
+
* Apps
241
+
242
+
> [!TIP]
243
+
> Before installation begins, the device creates a tracking policy and calculates all apps and policies that need to be tracked. While that's happening, the ESP shows subtasks in an **Identifying** state.
244
+
245
+
#### Security policies
246
+
ESP doesn't track security policies, such as device restrictions, but these policies are installed in the background. The ESP does track Microsoft Edge, Assigned Access, and Kiosk Browser policies.
247
+
248
+
#### Certificates
249
+
The ESP tracks the installation of SCEP certificate profiles assigned to users.
250
+
251
+
#### Network connections
252
+
The ESP tracks Wi-Fi profiles assigned to users.
253
+
254
+
#### Apps
255
+
During this phase, the ESP tracks the installation of apps assigned to the user. The ESP tracks Win32 apps for Windows 10, version 1903 and later.
256
+
257
+
It also tracks the following types of apps when they're assigned to all devices, all users, or a user group that includes the enrolling device user:
258
+
259
+
- Per user LoB MSI apps
260
+
- Per machine LoB MSI apps
261
+
- LoB store apps, online store apps, and offline store apps
227
262
228
263
### Known issues
229
264
230
-
The following are known issues related to the Enrollment Status Page.
265
+
This section lists the known issues for the enrollment status page.
266
+
231
267
- When creating apps that will be deployed during ESP, any reboots that are packaged within the app may cause ESP to hang and fail the deployment. We recommend specifying the reboot behavior in Intune instead of triggering the reboot within the package.
232
268
- Disabling the ESP profile doesn't remove ESP policy from devices and users still get ESP when they log in to device for first time. The policy isn't removed when the ESP profile is disabled.
233
-
- A reboot during Device setup will force the user to enter their credentials before transitioning to Account setup phase. User credentials aren't preserved during reboot. Have the user enter their credentials then the Enrollment Status Page can continue.
234
-
- Enrollment Status Page will always time out during an Add work and school account enrollment on Windows 10 versions earlier than 1903. The Enrollment Status Page waits for Azure AD registration to complete. The issue is fixed on Windows 10 version 1903 and newer.
235
-
- Hybrid Azure AD Autopilot deployment with ESP takes longer than the timeout duration entered in the ESP profile. On Hybrid Azure AD Autopilot deployments, the ESP will take 40 minutes longer than the value set in the ESP profile. For example, you set the timeout duration to 30 minutes in the profile. The ESP can take 30 minutes + 40 minutes.
236
-
237
-
This delay gives time for the on-prem AD connector to create the new device record to Azure AD.
238
-
269
+
- A reboot during device setup forces the user to enter their credentials before the account setup phase. User credentials aren't preserved during reboot. Instruct the device users to enter their credentials to continue to the account setup phase.
270
+
- The ESP always times out on devices running Windows 10, version 1903 and earlier, and
271
+
enrolled via the *Add work and school account* option. The ESP waits for Azure AD registration to complete. The issue is fixed on Windows 10 version 1903 and later.
272
+
- Hybrid Azure AD Autopilot deployment with ESP takes longer than the timeout duration entered in the ESP profile. On Hybrid Azure AD Autopilot deployments, the ESP takes 40 minutes longer than the value set in the ESP profile. For example, you set the timeout duration to 30 minutes in the profile. The ESP can take 30 minutes + 40 minutes. This delay gives the on-prem AD connector time to create the new device record to Azure AD.
239
273
- Windows logon page isn't pre-populated with the username in Autopilot User Driven Mode. If there's a reboot during the Device Setup phase of ESP:
240
274
- the user credentials aren't preserved
241
275
- the user must enter the credentials again before proceeding from Device Setup phase to the Account setup phase
@@ -249,4 +283,4 @@ The following are known issues related to the Enrollment Status Page.
249
283
250
284
## Troubleshooting
251
285
252
-
For troubleshooting help, including how to disable an already-enabled ESP, see [Troubleshoot the Windows Enrollment Status page](/troubleshoot/mem/intune/understand-troubleshoot-esp#troubleshooting).
286
+
For help with errors or messages related to the ESP, including how to disable an already-enabled ESP, see [Troubleshoot the Windows Enrollment Status page](/troubleshoot/mem/intune/understand-troubleshoot-esp#troubleshooting).
0 commit comments