windows-itpro-docs/windows/client-management/mdm/mdm-enrollment-of-windows-devices.md
Gary Moore 17262985e6 Add periods to alt text
No other changes
2021-08-21 13:08:01 -07:00

24 KiB
Raw Blame History

title, description, MS-HAID, ms.assetid, ms.reviewer, manager, ms.author, ms.topic, ms.prod, ms.technology, author
title description MS-HAID ms.assetid ms.reviewer manager ms.author ms.topic ms.prod ms.technology author
MDM enrollment of Windows 10-based devices Learn about mobile device management (MDM) enrollment of Windows 10-based devices to simplify access to your organizations resources.
p_phdevicemgmt.enrollment_ui
p_phDeviceMgmt.mdm_enrollment_of_windows_devices
4651C81B-D2D6-446A-AA24-04D01C1D0883 dansimp dansimp article w10 windows dansimp

MDM enrollment of Windows 10-based devices

In todays cloud-first world, enterprise IT departments increasingly want to let employees use their own devices, or even choose and purchase corporate-owned devices. Connecting your devices to work makes it easy for you to access your organizations resources, such as apps, the corporate network, and email.

Note

When you connect your device using mobile device management (MDM) enrollment, your organization may enforce certain policies on your device.

Connect corporate-owned Windows 10-based devices

You can connect corporate-owned devices to work by either joining the device to an Active Directory domain, or to an Azure Active Directory (Azure AD) domain. Windows 10 does not require a personal Microsoft account on devices joined to Azure AD or an on-premises Active Directory domain.

active directory azure ad signin.

Connect your device to an Active Directory domain (join a domain)

Devices running Windows 10 Pro, Windows 10 Enterprise, or Windows 10 Education can be connected to an Active Directory domain using the Settings app.

Note

Mobile devices cannot be connected to an Active Directory domain.

Out-of-box-experience

Joining your device to an Active Directory domain during the out-of-box-experience (OOBE) is not supported. To join a domain:

  1. On the Who Owns this PC? page, select My work or school owns it.

    oobe local account creation.

  2. Next, select Join a domain.

    select domain or azure ad.

  3. You'll see a prompt to set up a local account on the device. Enter your local account details, and then select Next to continue.

    create pc account.

Use the Settings app

To create a local account and connect the device:

  1. Launch the Settings app.

    windows settings page.

  2. Next, select Accounts.

    windows settings accounts select.

  3. Navigate to Access work or school.

    select access work or school.

  4. Select Connect.

    connect to work or school.

  5. Under Alternate actions, select Join this device to a local Active Directory domain.

    join account to active directory domain.

  6. Type in your domain name, follow the instructions, and then select Next to continue. After you complete the flow and restart your device, it should be connected to your Active Directory domain. You can now sign in to the device using your domain credentials.

    type in domain name.

Help with connecting to an Active Directory domain

There are a few instances where your device cannot be connected to an Active Directory domain.

Connection issue Description
Your device is already connected to an Active Directory domain. Your device can only be connected to a single Active Directory domain at a time.
Your device is connected to an Azure AD domain. Your device can either be connected to an Azure AD domain or an Active Directory domain. You cannot connect to both simultaneously.
You are logged in as a standard user. Your device can only be connected to an Azure AD domain if you are logged in as an administrative user. Youll need to switch to an administrator account to continue.
Your device is running Windows 10 Home. This feature is not available on Windows 10 Home, so you will be unable to connect to an Active Directory domain. You will need to upgrade to Windows 10 Pro, Windows 10 Enterprise, or Windows 10 Education to continue.

Connect your device to an Azure AD domain (join Azure AD)

All Windows devices can be connected to an Azure AD domain. These devices can be connected during OOBE. Additionally, desktop devices can be connected to an Azure AD domain using the Settings app.

Out-of-box-experience

To join a domain:

  1. Select My work or school owns it, then select Next.

    oobe local account creation.

  2. Select Join Azure AD, and then select Next.

    select domain or azure ad.

  3. Type in your Azure AD username. This is the email address you use to log into Microsoft Office 365 and similar services.

    If the tenant is a cloud-only, password hash sync, or pass-through authentication tenant, this page will change to show the organization's custom branding, and you will be able to enter your password directly on this page. If the tenant is part of a federated domain, you will be redirected to the organization's on-premises federation server, such as Active Directory Federation Services (AD FS) for authentication.

    Based on IT policy, you may also be prompted to provide a second factor of authentication at this point. If your Azure AD tenant has auto-enrollment configured, your device will also be enrolled into MDM during this flow. For more information, see these steps. If your tenant is not configured for auto-enrollment, you will have to go through the enrollment flow a second time to connect your device to MDM. After you complete the flow, your device will be connected to your organizations Azure AD domain.

    azure ad signin.

Use the Settings app

To create a local account and connect the device:

  1. Launch the Settings app.

    windows settings page.

  2. Next, navigate to Accounts.

    windows settings accounts select.

  3. Navigate to Access work or school.

    select access work or school.

  4. Select Connect.

    connect to work or school.

  5. Under Alternate Actions, selct Join this device to Azure Active Directory.

    join work or school account to azure ad.

  6. Type in your Azure AD username. This is the email address you use to log into Office 365 and similar services.

    azure ad sign in.

  7. If the tenant is a cloud-only, password hash sync, or pass-through authentication tenant, this page changes to show the organization's custom branding, and you can enter your password directly on this page. If the tenant is part of a federated domain, you are redirected to the organization's on-premises federation server, such as AD FS, for authentication.

    Based on IT policy, you may also be prompted to provide a second factor of authentication at this point.

    If your Azure AD tenant has auto-enrollment configured, your device will also be enrolled into MDM during this flow. For more information, see this blog post. If your tenant is not configured for auto-enrollment, you will have to go through the enrollment flow a second time to connect your device to MDM.

    After you reach the end of the flow, your device should be connected to your organizations Azure AD domain. You may now log out of your current account and sign in using your Azure AD username.

    corporate sign in.

Help with connecting to an Azure AD domain

There are a few instances where your device cannot be connected to an Azure AD domain.

Connection issue Description
Your device is connected to an Azure AD domain. Your device can only be connected to a single Azure AD domain at a time.
Your device is already connected to an Active Directory domain. Your device can either be connected to an Azure AD domain or an Active Directory domain. You cannot connect to both simultaneously.
Your device already has a user connected to a work account. You can either connect to an Azure AD domain or connect to a work or school account. You cannot connect to both simultaneously.
You are logged in as a standard user. Your device can only be connected to an Azure AD domain if you are logged in as an administrative user. Youll need to switch to an administrator account to continue.
Your device is already managed by MDM. The connect to Azure AD flow will attempt to enroll your device into MDM if your Azure AD tenant has a preconfigured MDM endpoint. Your device must be unenrolled from MDM to be able to connect to Azure AD in this case.
Your device is running Windows 10 Home. This feature is not available on Windows 10 Home, so you will be unable to connect to an Azure AD domain. You will need to upgrade to Windows 10 Pro, Windows 10 Enterprise, or Windows 10 Education to continue.

Connect personally owned devices

Personally owned devices, also known as bring your own device (BYOD), can be connected to a work or school account, or to MDM. Windows 10 does not require a personal Microsoft account on devices to connect to work or school.

Connect to a work or school account

All Windows 10-based devices can be connected to a work or school account. You can connect to a work or school account either through the Settings app or through any of the numerous Universal Windows Platform (UWP) apps, such as the universal Office apps.

Use the Settings app

To create a local account and connect the device:

  1. Launch the Settings app, and then select Accounts >Start > Settings > Accounts.

    windows settings page.

  2. Navigate to Access work or school.

    select access work or school.

  3. Select Connect.

    connect to work or school.

  4. Type in your Azure AD username. This is the email address you use to log into Office 365 and similar services.

    join work or school account to azure ad.

  5. If the tenant is a cloud-only, password hash sync, or pass-through authentication tenant, this page changes to show the organization's custom branding, and can enter your password directly into the page. If the tenant is part of a federated domain, you are redirected to the organization's on-premises federation server, such as AD FS, for authentication.

    Based on IT policy, you may also be prompted to provide a second factor of authentication at this point.

    If your Azure AD tenant has auto-enrollment configured, your device will also be enrolled into MDM during this flow. For more information, see this blog post. If your tenant is not configured for auto-enrollment, you will have to go through the enrollment flow a second time to connect your device to MDM.

    Starting in Windows 10, version 1709, you will see the status page that shows the progress of your device being set up.

    corporate sign in.

  6. After you complete the flow, your Microsoft account will be connected to your work or school account.

    account successfully added.

Connect to MDM on a desktop (enrolling in device management)

All Windows 10-based devices can be connected to MDM. You can connect to an MDM through the Settings app.

Use the Settings app

To create a local account and connect the device:

  1. Launch the Settings app.

    windows settings page.

  2. Next, navigate to Accounts.

    windows settings accounts page.

  3. Navigate to Access work or school.

    access work or school.

  4. Select the Enroll only in device management link (available in servicing build 14393.82, KB3176934). For older builds, see Connect your Windows 10-based device to work using a deep link.

    connect to work or school.

  5. Type in your work email address.

    set up work or school account.

  6. If the device finds an endpoint that only supports on-premises authentication, this page will change and ask you for your password. If the device finds an MDM endpoint that supports federated authentication, youll be presented with a new window that will ask you for additional authentication information.

    Based on IT policy, you may also be prompted to provide a second factor of authentication at this point. Starting in Windows 10, version 1709, you will see the enrollment progress on screen.

    corporate sign in.

    After you complete the flow, your device will be connected to your organizations MDM.

Help with connecting personally owned devices

There are a few instances where your device may not be able to connect to work.

Error Message Description
Your device is already connected to your organizations cloud. Your device is already connected to either Azure AD, a work or school account, or an AD domain.
We could not find your identity in your organizations cloud. The username you entered was not found on your Azure AD tenant.
Your device is already being managed by an organization. Your device is either already managed by MDM or Microsoft Endpoint Configuration Manager.
You dont have the right privileges to perform this operation. Please talk to your admin. You cannot enroll your device into MDM as a standard user. You must be on an administrator account.
We couldnt auto-discover a management endpoint matching the username entered. Please check your username and try again. If you know the URL to your management endpoint, please enter it. You need to provide the server URL for your MDM or check the spelling of the username you entered.

Windows 10-based devices may be connected to work using a deep link. Users will be able to select or open a link in a particular format from anywhere in Windows 10, and be directed to the new enrollment experience.

In Windows 10, version 1607, deep linking will only be supported for connecting devices to MDM. It will not support adding a work or school account, joining a device to Azure AD, and joining a device to Active Directory.

The deep link used for connecting your device to work will always use the following format.

ms-device-enrollment:?mode={mode_name}

Parameter Description Supported Value for Windows 10
mode Describes which mode will be executed in the enrollment app. Added in Windows 10, version 1607 Mobile Device Management (MDM), Adding Work Account (AWA), and Azure Active Directory Joined (AADJ).
username Specifies the email address or UPN of the user who should be enrolled into MDM. Added in Windows 10, version 1703. string
servername Specifies the MDM server URL that will be used to enroll the device. Added in Windows 10, version 1703. string
accesstoken Custom parameter for MDM servers to use as they see fit. Typically, this can be used as a token to validate the enrollment request. Added in Windows 10, version 1703. string
deviceidentifier Custom parameter for MDM servers to use as they see fit. Typically, this can be used to pass in a unique device identifier. Added in Windows 10, version 1703. GUID
tenantidentifier Custom parameter for MDM servers to use as they see fit. Typically, this can be used to identify which tenant the device or user belongs to. Added in Windows 10, version 1703. GUID or string
ownership Custom parameter for MDM servers to use as they see fit. Typically, this can be used to determine whether the device is BYOD or Corp Owned. Added in Windows 10, version 1703. 1, 2, or 3. Where "1" means ownership is unknown, "2" means the device is personally owned, and "3" means the device is corporate-owned

Note

AWA and AADJ values for mode are only supported on Windows 10, version 1709 and later.

Note

Deep links only work with Internet Explorer or Microsoft Edge browsers. When connecting to MDM using a deep link, the URI you should use is: ms-device-enrollment:?mode=mdm ms-device-enrollment:?mode=mdm&username=someone@example.com&servername=https://example.server.com

To connect your devices to MDM using deep links:

  1. Starting with Windows 10, version 1607, create a link to launch the built-in enrollment app using the URI ms-device-enrollment:?mode=mdm, and user-friendly display text, such as Click here to connect Windows to work:

    (Be aware that this will launch the flow equivalent to the Enroll into the device management option in Windows 10, version 1511.)

    • IT admins can add this link to a welcome email that users can select to enroll into MDM.

      using enrollment deeplink in email.

    • IT admins can also add this link to an internal web page that users refer to enrollment instructions.

  2. After you select the link or run it, Windows 10 launches the enrollment app in a special mode that only allows MDM enrollments (similar to the Enroll into device management option in Windows 10, version 1511).

    Type in your work email address.

    set up work or school account.

  3. If the device finds an endpoint that only supports on-premises authentication, this page will change and ask you for your password. If the device finds an MDM endpoint that supports federated authentication, youll be presented with a new window that will ask you for additional authentication information. Based on IT policy, you may also be prompted to provide a second factor of authentication at this point.

    After you complete the flow, your device will be connected to your organization's MDM.

    corporate sign in.

Manage connections

To manage your work or school connections, select Settings > Accounts > Access work or school. Your connections will show on this page and selecting one will expand options for that connection.

managing work or school account.

Info

The Info button can be found on work or school connections involving MDM. This includes the following scenarios:

  • Connecting your device to an Azure AD domain that has auto-enroll into MDM configured.
  • Connecting your device to a work or school account that has auto-enroll into MDM configured.
  • Connecting your device to MDM.

Selecting the Info button will open a new page in the Settings app that provides details about your MDM connection. Youll be able to view your organizations support information (if configured) on this page. Youll also be able to start a sync session which forces your device to communicate to the MDM server and fetch any updates to policies if needed.

Starting in Windows 10, version 1709, selecting the Info button will show a list of policies and line-of-business apps installed by your organization. Here is an example screenshot.

work or school info.

Note

Starting in Windows 10, version 1709, the Manage button is no longer available.

Disconnect

The Disconnect button can be found on all work connections. Generally, selecting the Disconnect button will remove the connection from the device. There are a few exceptions to this:

  • Devices that enforce the AllowManualMDMUnenrollment policy will not allow users to remove MDM enrollments. These connections must be removed by a server-initiated unenroll command.
  • On mobile devices, you cannot disconnect from Azure AD. These connections can only be removed by wiping the device.

Warning

Disconnecting might result in the loss of data on the device.

Collecting diagnostic logs

You can collect diagnostic logs around your work connections by going to Settings > Accounts > Access work or school, and then selecting the Export your management logs link under Related Settings. Next, select Export, and follow the path displayed to retrieve your management log files.

Starting in Windows 10, version 1709, you can get the advanced diagnostic report by going to Settings > Accounts > Access work or school, and selecting the Info button. At the bottom of the Settings page, you will see the button to create a report, as shown here.

collecting enrollment management log files.