You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/windows-enrollment-status.md
+10-13Lines changed: 10 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ The enrollment status page (ESP) displays the provisioning status to people enro
45
45
46
46
The ESP can be deployed during the default out-of-box experience (OOBE) for Azure Active Directory (Azure AD) Join, and any [Windows Autopilot](../../autopilot/index.yml) provisioning scenario.
47
47
48
-
To deploy the enrollment status page to devices, you have to create an enrollment status page profile in Microsoft Intune. Within the profile, you can configure the ESP settings that control:
48
+
To deploy the ESP to devices, you have to create an ESP profile in Microsoft Intune. Within the profile, you can configure the ESP settings that control:
49
49
50
50
- Visibility of installation progress indicators
51
51
- Device access during provisioning
@@ -157,7 +157,7 @@ To prioritize your profiles:
157
157
158
158
## Block access to a device until a specific application is installed
159
159
160
-
Specify the apps that must be installed before the user can exit the enrollment status page (ESP). You can choose up to 100 apps.
160
+
Specify the apps that must be installed before the user can exit the ESP. You can choose up to 100 apps.
161
161
162
162
1. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Devices** > **Windows** > **Windows enrollment** > **Enrollment Status Page**.
163
163
2. Choose a profile > **Settings**.
@@ -166,7 +166,7 @@ Specify the apps that must be installed before the user can exit the enrollment
166
166
5. Choose **Selected** for **Block device use until these required apps are installed if they're assigned to the user/device**.
The apps that are included in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include "App 1," "App 2," and "App 3" and "App 3" and "App 4" are targeted to the device or user, the Enrollment Status Page will track only "App 3." "App 4" will still be installed, but the Enrollment Status Page will not wait for it to complete.
169
+
The apps that are included in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include "App 1," "App 2," and "App 3" and "App 3" and "App 4" are targeted to the device or user, the ESP will track only "App 3." "App 4" will still be installed, but the ESP will not wait for it to complete.
170
170
171
171
## ESP tracking
172
172
@@ -184,25 +184,22 @@ During device preparation, the enrollment status page tracks these tasks for the
184
184
185
185
* Secure your hardware
186
186
* Join your organization's network
187
-
* Register your device for mobile management
188
-
189
-
This section describes each task and what they accomplish.
187
+
* Register your device for mobile management
190
188
191
189
#### Secure your hardware
192
-
The device completes the Trusted Platform Module (TPM) key attestation and validates its identity with Azure AD. Azure AD sends a token to the device, which is used during Azure AD join.
190
+
This task ensures that the device completes the Trusted Platform Module (TPM) key attestation and validates its identity with Azure AD. Azure AD sends a token to the device, which is used during Azure AD join.
193
191
194
192
This step is required for self-deploying mode and white glove deployment. It isn't needed for Windows Autopilot scenarios in user-driven mode.
195
193
196
194
#### Join your organization's network
197
-
The device joins Azure AD by using the token received in the previous step.
198
-
199
-
This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this step by time they open the ESP.
195
+
The device uses the token received in the previous step to join Azure AD. This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this task by time they open the ESP.
200
196
201
-
4. Register your device for mobile management: The device enrolls in Microsoft Intune for mobile device management (MDM).
197
+
### Register your device for mobile management
198
+
The device enrolls in Microsoft Intune for mobile device management (MDM).
202
199
203
-
This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this step by time they open the ESP.
200
+
This step is required in self-deploying mode and white glove deployment. Devices in user-driven mode have already completed this step by time they open the ESP.
204
201
205
-
6. Prepare your device for MDM: The device calculates the policies and apps required to track in the next phase. For Windows 10, version 1903 and later versions, the device also creates the tracking policy for the SideCar agent, and installs the Intune Management Extension that's used to install Win32 apps.
202
+
After enrollment, the device calculates the policies and apps required to track in the next phase. For Windows 10, version 1903 and later versions, the device also creates the tracking policy for the SideCar agent, and installs the Intune Management Extension that's used to install Win32 apps.
0 commit comments