Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Automatically deploy Windows 365 boot devices
    Intune

    Automatically deploy Windows 365 boot devices

    Peter KlapwijkBy Peter KlapwijkOctober 4, 2024Updated:October 4, 20244 Mins Read

    Some time ago Microsoft released a new feature called Windows 365 Boot.

    Windows 365 Boot allows users to sign in to Windows 365 and immediately connect to their Cloud PCs when they sign in to their local device.

    This is some sort of kiosk-like device which allows the user to connect to their Windows 365 machine immediately.

    Intune and Windows 365 folks of Microsoft made it very easy to deploy a complete set of Intune profiles to set up a Windows 365 boot machine with a guided deployment. In this guided deployment, we only need to make a few choices on settings we want, assign the deployment to an Entra group and we’re ready to enroll our first physical device in a couple of minutes.

    But what surprised me was that we need to start enrolling these devices by authenticating with a user account! Microsoft, why!?

    Kiosks and shared desktops can be automatically enrolled using Windows Autopilot self-deploying mode! So why wouldn’t we use that deployment mode for our Windows 365 boot device?
    Besides that, when an user starts the enrollment, this user is assigned as primary user of a device. Something you don’t want when you setup these devices in shared PC mode.

    I have no idea why we shouldn’t, thus let’s have a look at this implementation.

    Set up Windows 365 boot self-deploying devices

    We need to sign in to the Microsoft Intune admin center. We browse to Devices, Windows 365. Here we find Windows 365 boot under Windows 365 Guides.

    On the Instructions tab we can read what Windows 365 boot is and what we need to continue the setup.

    On the Basics tab set a check mark if we want to use a Device name template. We need to enter a Resource prefix name (this name will be used in all the configurations automatically created) and select which type of Windows 365 boot mode we want to configure.

    At the bottom of this tab is described which resources are created when we have finished this guided setup.

    On the Endpoint updates tab, we need to select a couple of settings related to our Windows Update settings.

    On the Settings tab, we can select our preferred language and max connection time out.
    And we can also enter a company name, and URLs to a logo and lock screen picture.

    As last, we select an existing Entra group or create a new group to add our physical devices.

    An overview of the setup is shown.

    When we finish the guided setup, the resources are all created in a few minutes.

    And we are ready to enroll our first device, by authenticating with user credentials :(.
    That is what we don’t want. Let’s change that part of our configuration.

    In the Intune portal, browse to Devices, Enrollment (under Device onboarding).

    On the Windows tab, select Deployment Profiles.

    Here you will find a deployment profile from which the name should start with the resource prefix name previously entered.

    As you can see the Deployment mode on this profile is set to User-Driven.
    Copy the value behind Enter a name, so you can use this in the new profile we create in the next step.
    Remove the assignment from this profile (and delete the deployment profile).

    We need to create a new deployment profile for Windows PC.
    Make sure to select Self-Deploying as Deployment mode. Switch Apply device name template to Yes. Enter the naming template you copied in the previous step.

    Assign the deployment profile to the Entra group and we are ready to automatically enroll our Windows 365 boot devices!

    Make sure your device meets the requirements for Self-Deployment mode. Connect the device to an ethernet connection and power, and turn it on to start the automatic enrollment!

    In my configuration, I deployed a couple of additional settings. As I didn’t have a security baseline deployed to the boot devices, Windows Spotlight stuff popped up on the lock screen, thus I blocked that with a setting. Besides that, I deployed some settings related to power management, so these devices don’t hibernate after a couple of minutes.

    And these kinds of devices are ideal to use in combination with FIDO2 keys, thus I deployed a configuration that sets the FIDO credential provider as default.

    These settings are all optional.

    Intune Microsoft Endpoint Manager Modern Workplace Windows Windows 365
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Automatically configure the time zone (during Autopilot enrollment)

    February 21, 2025

    How to block Bluetooth file transfer with Microsoft Intune

    February 16, 2024

    Manage Local Users and Groups with Microsoft Intune

    October 18, 2020
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}