mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
9.2 KiB
9.2 KiB
title, ms.reviewer, manager, description, keywords, ms.prod, ms.mktglfcycl, ms.localizationpriority, ms.sitesec, ms.pagetype, audience, author, ms.author, ms.collection, ms.topic
title | ms.reviewer | manager | description | keywords | ms.prod | ms.mktglfcycl | ms.localizationpriority | ms.sitesec | ms.pagetype | audience | author | ms.author | ms.collection | ms.topic |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Windows Autopilot known issues | laurawi | Inform yourself about known issues that may occur during Windows Autopilot deployment. | mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune | w10 | deploy | medium | library | deploy | itpro | greg-lindsay | greglin | M365-modern-desktop | article |
Windows Autopilot - known issues
Applies to
- Windows 10
Issue | More information | ||||||
---|---|---|---|---|---|---|---|
Blocking apps specified in a user-targeted Enrollment Status Profile are ignored during device ESP. | The services responsible for determining the list of apps that should be blocking during device ESP are not able to determine the correct ESP profile containing the list of apps because they do not know the user identity. As a workaround, enable the default ESP profile (which targets all users and devices) and place the blocking app list there. In the future, it will be possible to instead target the ESP profile to device groups to avoid this issue. | ||||||
That username looks like it belongs to another organization. Try signing in again or start over with a different account. | Confirm that all of your information is correct at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Provisioning\Diagnostics\AutoPilot. See Troubleshooting Windows Auto Pilot for more details. | ||||||
Windows Autopilot user-driven Hybrid Azure AD deployments do not grant users Administrator rights even when specified in the Windows Autopilot profile. | This will occur when there is another user on the device that already has Administrator rights. For example, a PowerShell script or policy could create an additional local account that is a member of the Administrators group. To ensure this works properly, do not create an additional account until after the Windows Autopilot process has completed. | ||||||
Windows Autopilot device provisioning can fail with TPM attestation errors or ESP timeouts on devices where the real-time clock is off by a significant amount of time (e.g. several minutes or more). | To fix this issue:
| ||||||
Windows Autopilot for existing devices does not work for Windows 10, version 1903 or 1909; you see screens that you've disabled in your Windows Autopilot profile, such as the Windows 10 License Agreement screen.
This happens because Windows 10, version 1903 and 1909 deletes the AutopilotConfigurationFile.json file. | To fix this issue:
| ||||||
TPM attestation fails on Windows 10 1903 due to missing AKI extension in EK certificate. (An additional validation added in Windows 10 1903 to check that the TPM EK certs had the proper attributes according to the TCG specifications uncovered that a number of them don’t, so that validation will be removed). | Download and install the KB4517211 update. | ||||||
The following known issues are resolved by installing the August 30, 2019 KB4512941 update (OS Build 18362.329):
| Download and install the KB4512941 update. See the section: How to get this update for information on specific release channels you can use to obtain the update. | ||||||
The following known issues are resolved by installing the July 26, 2019 KB4505903 update (OS Build 18362.267):
| Download and install the KB4505903 update. See the section: How to get this update for information on specific release channels you can use to obtain the update. | ||||||
Windows Autopilot self-deploying mode fails with an error code: |
| ||||||
White glove gives a red screen and the Microsoft-Windows-User Device Registration/Admin event log displays HResult error code 0x801C03F3 | This can happen if Azure AD can’t find an AAD device object for the device that you are trying to deploy. This will occur if you manually delete the object. To fix it, remove the device from AAD, Intune, and Autopilot, then re-register it with Autopilot, which will recreate the AAD device object. To obtain troubleshooting logs use: Mdmdiagnosticstool.exe -area Autopilot;TPM -cab c:\autopilot.cab | ||||||
White glove gives a red screen | White glove is not supported on a VM. | ||||||
Error importing Windows Autopilot devices from a .csv file | Ensure that you have not edited the .csv file in Microsoft Excel or an editor other than Notepad. Some of these editors can introduce extra characters causing the file format to be invalid. | ||||||
Windows Autopilot for existing devices does not follow the Autopilot OOBE experience. | Ensure that the JSON profile file is saved in ANSI/ASCII format, not Unicode or UTF-8. | ||||||
Something went wrong is displayed page during OOBE. | The client is likely unable to access all the required AAD/MSA-related URLs. For more information, see Networking requirements. | ||||||
Using a provisioning package in combination with Windows Autopilot can cause issues, especially if the PPKG contains join, enrollment, or device name information. | Using PPKGs in combination with Windows Autopilot is not recommended. |
Related topics
Diagnose MDM failures in Windows 10
Troubleshooting Windows Autopilot