This guide provides step-by-step instructions for configuring Microsoft Intune with Autopilot Device Preparation (formerly Autopilot v2), streamlining Mobile Device Management (MDM) for IT professionals.
To establish a baseline setup, create three security groups in Microsoft Entra ID (formerly Azure AD). These groups enable targeted policies and configurations:
- Standard Users Group: For regular users on Autopilot-prepared devices.
- Local Admins Group: For users requiring local administrator privileges.
- Devices Group: For the devices themselves, to support device-based policies.
These groups form the foundation. You can add more groups later for finer control over users or applications.
- Access to the Microsoft Entra admin center with appropriate permissions (e.g., Global Administrator or User Administrator).
- Microsoft Intune enabled in your Microsoft Entra ID tenant (via Microsoft 365 Business Premium or equivalent licenses).
- The "Intune Provisioning Client" service principal (required for the Devices group).
- Open your web browser and go to https://entra.microsoft.com/.
- Sign in with an account that has the necessary permissions.
- In the left-hand menu, select Groups.
- Click on All groups.
- Click + New group.
- Select Security as the group type.
- Enter the group name:
Autopilot Device Preparation - Devices. - Optionally add a description, e.g., "Group for Autopilot Device Preparation devices".
- Set Entra roles can be assigned to this group: No.
- Set Membership type: Assigned.
- Source: Cloud
- Type: Security
- Under Owners, click Add owners and search for
Intune Provisioning Client(service principal). Select it and click Select. - Leave Members empty — the group will be populated automatically with Autopilot Device Preparation devices later.
- Click Create and verify the group in the Groups list (confirm owners and settings).
- Click + New group.
- Select Security as the group type.
- Enter the group name:
Autopilot Device Preparation - Users. - Optionally add a description: "Security group for Autopilot Device Preparation policies targeting standard users."
- Set Entra roles can be assigned to this group: No.
- Set Membership type: Assigned.
- Source: Cloud
- Type: Security
- Leave Owners unassigned.
- Under Members, add the user accounts that should be standard users (this group is populated manually).
- Click Create.
- Verify the group in the Groups list (confirm members and settings).
- Click + New group.
- Select Security as the group type.
- Enter the group name:
Autopilot Device Preparation - Local Admins. - Optionally add a description: "Security group for Autopilot Device Preparation policies targeting users with local admin privileges."
- Set Entra roles can be assigned to this group: No.
- Set Membership type: Assigned.
- Source: Cloud
- Type: Security
- Leave Owners unassigned.
- Under Members, add the user accounts that should have local administrator privileges (populate manually).
- Click Create.
- Verify the group in the Groups list (confirm members and settings).
Before creating Device Preparation Policies, ensure you have set up any required apps and scripts in Intune.
-
To create Apps, navigate to Home > Apps in the Intune admin center.
-
To create Scripts, navigate to Home > Devices > Scripts and Remediations in the Intune admin center.
Note on OOBE Script: For customizing the Out-of-Box Experience (OOBE), refer to the Skip-OOBEPrivacy-Intune.ps1 script. This can be added to Device Preparation Policies to skip privacy questions and accelerate provisioning.
-
Go to the Microsoft Intune admin center at https://intune.microsoft.com.
-
Navigate to Devices > Enrollment restrictions.
-
Under Mobility (MDM and WIP), remove any other MDM providers except Microsoft Intune.
-
Select Microsoft Intune.
-
Configure the following settings (using Microsoft defaults where applicable):
- MDM user scope: Select Some and choose both
Autopilot Device Preparation - UsersandAutopilot Device Preparation - Local Admins. - MDM terms of use URL: Keep default — https://portal.manage.microsoft.com/TermsofUse.aspx
- MDM discovery URL: Keep default — https://enrollment.manage.microsoft.com/enrollmentserver/discovery.svc
- MDM compliance URL: Keep default — https://portal.manage.microsoft.com/?portalAction=Compliance
- Windows Information Protection (WIP) user scope: Select Some and choose both
Autopilot Device Preparation - UsersandAutopilot Device Preparation - Local Admins. - WIP terms of use URL: Leave empty unless you have a custom URL.
- WIP discovery URL: Keep default — https://wip.mam.manage.microsoft.com/Enroll
- WIP compliance URL: Leave empty unless you have a custom URL.
- MDM user scope: Select Some and choose both
-
In the Intune admin center, go to Devices > Windows > Windows enrollment > Device preparation policies.
-
Click Create policy and select User-driven mode (Automatic mode is in beta and not recommended due to potential issues).
Create two separate policies:
-
One for standard users targeting the
Autopilot Device Preparation - Usersgroup. -
One for local admins targeting the
Autopilot Device Preparation - Local Adminsgroup.
-
Configure Deployment settings and Out-of-box experience (OOBE) based on your needs. Recommended settings:
- Deployment mode: User-driven
- Deployment type: Single user
- Join type: Microsoft Entra joined
- User account type: Standard user (for users policy) or Administrator (for local admins policy)
- Additional options: Skip privacy settings, Skip OneDrive setup, etc.
- Add Apps and Scripts for deployment.
Note: These install during Autopilot provisioning (OOBE or ESPv2). Assign apps via Home > Apps in Intune or directly here. Non-assigned apps install after full enrollment.
-
Assign the policy to the appropriate user group (
Autopilot Device Preparation - UsersorAutopilot Device Preparation - Local Admins).
Scope tags can be added if needed, but are not covered in this guide.
To simplify license management, assign Intune licenses to the user groups created earlier. This eliminates the need to assign licenses individually to each user. By adding a user to one of these groups, they will automatically receive the required license and gain access to Intune and Autopilot functionality.
- Head to the Microsoft 365 admin center: https://admin.microsoft.com.
- Go to License - Subscriptions > Microsoft 365 Business Premium (or the license you use that includes Intune).
- Click on Groups tab.
- Click on Assign licenses and assign the
Autopilot Device Preparation - UsersandAutopilot Device Preparation - Local Adminsgroups to the license.
Finally, ensure users are added to the appropriate groups created earlier. This will ensure they receive the correct policies and permissions when using Autopilot Device Preparation.
-
In the Microsoft 365 admin center or the Microsoft Entra admin center, navigate to Users.
-
Select the user you want to add to a group.
-
Go to the Groups tab and click on + Add memberships.
-
Search for and select either
Autopilot Device Preparation - UsersorAutopilot Device Preparation - Local Adminsbased on the user's role. -
Click Save to confirm the changes.
- If the "Intune Provisioning Client" is not found, ensure Intune is properly set up in your tenant and that you have the necessary licenses.
- Verify group configurations in the Microsoft Entra portal.
- For permission issues, contact your Microsoft Entra administrator.







