Skip to content

Commit d01cd01

Browse files
author
Angela Fleischmann
authored
Merge pull request #6978 from MicrosoftDocs/main
Publish 03/08/2022 3:30 PM PT
2 parents 9122295 + cf10540 commit d01cd01

6 files changed

Lines changed: 38 additions & 8 deletions

File tree

memdocs/autopilot/add-devices.md

Lines changed: 28 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.collection:
2828
- Windows 10
2929
- Windows Holographic, version 2004
3030

31-
You can do Windows Autopilot device registration within your organization by manually collecting the hardware identity of devices (hardware hashes) and uploading this information in a comma-separated-values (CSV) file. Capturing the hardware hash for manual registration requires booting the device into Windows. So, this process is primarily for testing and evaluation scenarios.
31+
You can perform Windows Autopilot device registration within your organization by manually collecting the hardware identity of devices (hardware hashes) and uploading this information in a comma-separated-values (CSV) file. Capturing the hardware hash for manual registration requires booting the device into Windows. So, this process is primarily for testing and evaluation scenarios.
3232

3333
Device owners can only register their devices with a hardware hash. Other methods (PKID, tuple) are available through OEMs or CSP partners.
3434

@@ -50,7 +50,14 @@ Device enrollment requires *Intune Administrator* or *Policy and Profile Manager
5050

5151
## Collect the hardware hash
5252

53-
You can use either Microsoft Endpoint Configuration Manager or Windows PowerShell to collect the hardware hash from existing devices.
53+
The following methods are available to harvest a hardware hash from existing devices:
54+
55+
1. Using [Microsoft Endpoint Configuration Manager](#configuration-manager)
56+
2. Using [Windows PowerShell](#powershell)
57+
3. During OOBE by using the [Diagnostics Page](#diagnostics-page-hash-export) (Windows 11 only)
58+
4. From the Desktop using [Settings > Accounts](#desktop-hash-export)
59+
60+
Each of these methods is described below.
5461

5562
In *Windows 10 version 1809 and earlier*, it's important to capture the hardware hash and create an Autopilot device profile before you connect a device to the internet. Those steps include collecting the hardware hash, uploading the CSV file into Microsoft Store for Business (MSfB) or Intune, assigning the profile, and confirming the profile assignment.
5663

@@ -118,6 +125,25 @@ To install the script directly and capture the hardware hash from the local comp
118125
119126
For more information about running the *Get-WindowsAutoPilotInfo.ps1* script, see the script's help by using `Get-Help Get-WindowsAutoPilotInfo`.
120127

128+
### Diagnostics page hash export
129+
130+
To export a hardware hash using the [Windows Autopilot Diagnostics Page](windows-autopilot-whats-new.md#windows-autopilot-diagnostics-page), the device must be running Windows 11.
131+
132+
Windows Autopilot Diagnostics are available in OOBE.
133+
134+
During OOBE, press **Ctrl-Shift-D** to bring up the Diagnostics Page. From this page, you can export logs to a thumb drive. The logs will include a CSV file with the hardware hash.
135+
136+
### Desktop hash export
137+
138+
1. From the Windows 10 or Windows 11 Desktop, click **Settings** > **Accounts** > **Access work or school**.
139+
2. Export log files. The logs will include a CSV file with the hardware hash.
140+
- Windows 11: In the **Export your management log files** tile, click **Export**.
141+
- Windows 10: Click the **Export your management log files** link.
142+
143+
Log files are exported to the Users\Public\Documents\MDMDiagnostics directory.
144+
145+
For more information, see [Diagnose MDM failures in Windows 10](/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10)
146+
121147
## Ensure that the CSV file meets requirements
122148

123149
Device information in the CSV file where you capture hardware hashes should include:

memdocs/autopilot/autopilot-mbr.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,12 @@ Repair technicians must sign in to the repaired device to capture the new device
138138

139139
Those repair facilities with access to the OA3 Tool (which is part of the ADK) can use the tool to capture the 4K Hardware Hash (4K HH).
140140

141-
Instead, the [WindowsAutoPilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) can be used to capture the 4K HH by following these steps:
141+
Instead, the [WindowsAutoPilotInfo PowerShell script](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) can be used to capture the 4K HH.
142+
143+
> [!NOTE]
144+
> Other methods in addition to Windows PowerShell are also available to capture the hardware hash. For more information, see [Collect the hardware hash](add-devices.md#collect-the-hardware-hash).
145+
146+
To use the **WindowsAutoPilotInfo** PowerShell script, follow these steps:
142147

143148
1. Install the script from the [PowerShell Gallery](https://www.powershellgallery.com/packages/Get-WindowsAutoPilotInfo) or from the command line (command-line installation is shown below).
144149
2. Navigate to the script directory and run it on the device when the device is either in Full OS or Audit Mode. See the following example.
@@ -160,7 +165,6 @@ The script creates a .csv file that contains the device information, including t
160165
> [!NOTE]
161166
> If the repair facility can't run the OA3 tool or PowerShell script to capture the new 4K HH, then the CSP (or OEM) partners must do it for them. Without some entity capturing the new 4K HH, there's no way to reregister this device as an Autopilot device.
162167
163-
164168
## Reregister the repaired device using the new device ID
165169

166170
If an OEM can't reregister the device, you have two options:

memdocs/autopilot/troubleshoot-oobe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.topic: troubleshooting
2828
When the out-of-box-experience (OOBE) includes unexpected Autopilot behavior, it's useful to check if the device received an Autopilot profile. If so, check the settings that the profile contained. Depending on the Windows client release, there are different mechanisms available to do that.
2929

3030
> [!NOTE]
31-
> **[Preview]** With Windows 11, you can enable users to view additional detailed troubleshooting information about the Autopilot provisioning process. The [Windows Autopilot diagnostics page](windows-autopilot-whats-new.md#preview-windows-autopilot-diagnostics-page) provides IT admins and end users with a user-friendly view to troubleshoot Windows Autopilot failures. This feature can be enabled by going to the [ESP profile](../intune/enrollment/windows-enrollment-status.md) and selecting **Yes** to **Allow users to collect logs about installation errors**. This feature is currently supported for commercial OOBE, and Autopilot user-driven mode.
31+
> With Windows 11, you can enable users to view additional detailed troubleshooting information about the Autopilot provisioning process. The [Windows Autopilot diagnostics page](windows-autopilot-whats-new.md#windows-autopilot-diagnostics-page) provides IT admins and end users with a user-friendly view to troubleshoot Windows Autopilot failures. This feature can be enabled by going to the [ESP profile](../intune/enrollment/windows-enrollment-status.md) and selecting **Yes** to **Allow users to collect logs about installation errors**. This feature is currently supported for commercial OOBE, and Autopilot user-driven mode.
3232
3333
## Can't connect to MDM terms of use error
3434

memdocs/autopilot/windows-autopilot-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Users must enter their credentials at initial sign-in during enrollment. We no l
5555

5656
To improve the baseline security for Azure Active Directory (Azure AD), we changed Azure AD behavior for multi-factor authentication (MFA) during device registration. Previously, if a user completed MFA as part of their device registration, the MFA claim was carried over to the user state after registration was complete. Going forward, the MFA claim is not preserved after registration and users will be prompted to redo MFA for any apps that require MFA by policy. For more information, see [Windows Autopilot MFA changes to enrollment flow](https://techcommunity.microsoft.com/t5/intune-customer-success/windows-autopilot-mfa-changes-to-enrollment-flow/ba-p/2774687).
5757

58-
## [Preview] Windows Autopilot diagnostics page
58+
## Windows Autopilot diagnostics page
5959

6060
When you deploy Windows 11 with Autopilot, you can enable users to view additional detailed troubleshooting information about the Autopilot provisioning process. A new **Windows Autopilot diagnostics** page is available to provide IT admins and end users with a user-friendly view to troubleshoot Windows Autopilot failures.
6161

memdocs/intune/enrollment/corporate-identifiers-add.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ At the time of enrollment, Intune automatically assigns corporate-owned status t
3838

3939
- Enrolled with a [device enrollment manager](device-enrollment-manager-enroll.md) account (all platforms)
4040
- Enrolled with the Apple [Device Enrollment Program](device-enrollment-program-enroll-ios.md), [Apple School Manager](apple-school-manager-set-up-ios.md), or [Apple Configurator](apple-configurator-enroll-ios.md) (iOS/iPadOS only)
41-
- [Identified as corporate-owned before enrollment](#identify-corporate-owned-devices-with-imei-or-serial-number) with an international mobile equipment identifier (IMEI) numbers (all platforms with IMEI numbers) or serial number (iOS/iPadOS and Android)
41+
- [Identified as corporate-owned before enrollment](#identify-corporate-owned-devices-with-imei-or-serial-number) with a serial number (iOS/iPadOS and Android)
4242
- Joined to Azure Active Directory with work or school credentials. [Devices that are Azure Active Directory registered](/azure/active-directory/devices/overview) will be marked as personal.
4343
- Set as corporate in the [device's properties list](#change-device-ownership)
4444

memdocs/intune/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1317,7 +1317,7 @@ The previous connectors remain in support but are no longer available for downlo
13171317

13181318
#### Windows Autopilot diagnostics page (public preview)
13191319

1320-
[Available settings](../enrollment/windows-enrollment-status.md) on the Enrollment Status Page are updated from **Allow users to collect logs about installation errors** to **Turn on log collection and diagnostics page for end users** to support the Windows Autopilot diagnostics page, available in Windows 11. For more information, see [Windows Autopilot: What's new](../../autopilot/windows-autopilot-whats-new.md#preview-windows-autopilot-diagnostics-page).
1320+
[Available settings](../enrollment/windows-enrollment-status.md) on the Enrollment Status Page are updated from **Allow users to collect logs about installation errors** to **Turn on log collection and diagnostics page for end users** to support the Windows Autopilot diagnostics page, available in Windows 11. For more information, see [Windows Autopilot: What's new](../../autopilot/windows-autopilot-whats-new.md#windows-autopilot-diagnostics-page).
13211321

13221322
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
13231323
### Device management

0 commit comments

Comments
 (0)