Icon

Intune Autopilot

Zero-touch Windows 11 provisioning. Ship the device to the user, they sign in, the device configures itself. Your IT never touches the hardware.

Every New Laptop Is a 2-Hour Manual Install


A new hire starts Monday. Somebody unboxes the laptop, boots it, joins it to Entra, installs Office, VPN, the browser bookmarks, applies compliance settings — 2 to 3 hours per device. Times 10 devices a month. Times the inevitable error on device number 7 that nobody notices until the user calls the helpdesk two weeks later.


This is not a failure of your IT team. It is a workflow that Microsoft solved with Windows Autopilot device preparation: the device provisions itself via OOBE, pulls apps and policies from Intune, and is ready before the user finishes their coffee. The license is already in your M365 Business Premium or M365 E3. What is missing: the profile design, the Enrollment Status Page tuning, and a tested pilot flow.


Traditional consulting for an Autopilot setup? Five figures. The consultant configures the profile, writes a handover doc, leaves. Your team inherits defaults they did not pick.

ACTIVITIES IN DETAIL

DELIVERABLES

  • Verify Intune license, Entra automatic MDM enrollment, and Windows 11 Pro or Enterprise readiness

  • Choose the right Autopilot approach: classic user-driven, self-deploying, or Windows Autopilot device preparation (user-driven Entra join)

  • Register device hardware hashes with the Windows Autopilot service — via OEM, CSP partner, or manual upload

  • Create Autopilot profiles with configuration: deployment mode, user account type, OOBE privacy settings, regional preferences

  • Assigned device groups and user groups per rollout wave — dynamic groups where hardware hashes allow

  • Configure the Enrollment Status Page (ESP) — block device use until critical apps and policies have installed

  • Define and assign the core app set: Microsoft 365 Apps, VPN client, endpoint protection, browser extensions — required before first login

  • End-to-end pilot with 3–5 devices: unbox, boot, validate OOBE flow, confirm apps and compliance state

  • Document the OEM shipping process and corporate identifier workflow for future orders

  • Helpdesk runbook: failed OOBE, device re-use, hash removal, troubleshooting the ESP

  • Verify Intune license, Entra automatic MDM enrollment, and Windows 11 Pro or Enterprise readiness

  • Choose the right Autopilot approach: classic user-driven, self-deploying, or Windows Autopilot device preparation (user-driven Entra join)

  • Register device hardware hashes with the Windows Autopilot service — via OEM, CSP partner, or manual upload

  • Create Autopilot profiles with configuration: deployment mode, user account type, OOBE privacy settings, regional preferences

  • Assigned device groups and user groups per rollout wave — dynamic groups where hardware hashes allow

  • Configure the Enrollment Status Page (ESP) — block device use until critical apps and policies have installed

  • Define and assign the core app set: Microsoft 365 Apps, VPN client, endpoint protection, browser extensions — required before first login

  • End-to-end pilot with 3–5 devices: unbox, boot, validate OOBE flow, confirm apps and compliance state

  • Document the OEM shipping process and corporate identifier workflow for future orders

  • Helpdesk runbook: failed OOBE, device re-use, hash removal, troubleshooting the ESP

  • Autopilot Profile Design: Deployment mode, OOBE configuration, group assignments — fully configured and tested

  • Enrollment Status Page: Blocking app list, timeout rules, retry behavior — tuned for your environment

  • Core App Package: Required apps for first login, deployed and validated

  • OEM Onboarding Process: Documented flow for adding devices from your hardware supplier going forward

  • Pilot Test Report: End-to-end validation of 3–5 devices with screenshots and timing

  • Helpdesk Runbook: OOBE failures, hash management, ESP troubleshooting

  • Complete Project Documentation: All configuration decisions documented without gaps

3 steps. From start to finished project

How a typical Microsoft project runs with DAMALO

STEP 1

Choose a blueprint and analyze your environment

Select a proven blueprint. AI agents pull your licenses, current config, and compliance needs into the plan. No generic advice.

STEP 2

Receive your plan and start implementation

Review the plan. AI agents draft architecture, sequence tasks, and map dependencies to Microsoft best practices. Tailored to your tenant.

STEP 3

Guided implementation through to completion

Execute step by step. AI agents provide PowerShell scripts, admin center deep-links, and walkthroughs. Every change auto-documented.

The result: A completed Microsoft project in 1-2 weeks. Documented. Audit-ready. Understood by your team. Adjustable at any time. No change requests. No follow-up engagements.

Next steps after Intune Autopilot

A cleanly configured tenant is the foundation. These blueprints build directly on it

Icon
M365 Tenant Readiness

Microsoft 365

Security

Problem: Misconfigurations in the tenant lead to security gaps, licensing issues, and compliance risks.

Scope: Review global settings in Admin Center and Entra ID - Validate Entra Connect (users/groups/devices/writeback) - Consistent UPN strategy and hardening of admin accounts - Onboard domains, assess DNS and network access

Result: A stable, license-compliant M365 tenant as a reliable foundation for all subsequent projects.

Icon
Conditional Access

Microsoft 365

Security

Problem: Uncontrolled access is a primary risk — MFA and Conditional Access protect identities.

Scope: Gather requirements per user group - Policies for user risk, location, device/platform, and apps - Block legacy authentication, activate session controls - Structured rollout: Report-Only → Pilot → Go-Live

Result: Verifiably secured access with clear policies and high usability.

Icon
Defender for Office 365

Microsoft 365

Security

Problem: Phishing and malware via email are among the most common attack vectors in mid-market companies.

Scope: Safe Links and Safe Attachments including detonation - Configure anti-phishing and impersonation protection - Customize policies per user group - Reporting dashboard and end-user awareness materials

Result: Measurably fewer successful phishing attempts and a well-documented email security architecture.

Icon
M365 Tenant Readiness

Microsoft 365

Security

Problem: Misconfigurations in the tenant lead to security gaps, licensing issues, and compliance risks.

Scope: Review global settings in Admin Center and Entra ID - Validate Entra Connect (users/groups/devices/writeback) - Consistent UPN strategy and hardening of admin accounts - Onboard domains, assess DNS and network access

Result: A stable, license-compliant M365 tenant as a reliable foundation for all subsequent projects.

Icon
Conditional Access

Microsoft 365

Security

Problem: Uncontrolled access is a primary risk — MFA and Conditional Access protect identities.

Scope: Gather requirements per user group - Policies for user risk, location, device/platform, and apps - Block legacy authentication, activate session controls - Structured rollout: Report-Only → Pilot → Go-Live

Result: Verifiably secured access with clear policies and high usability.

Icon
Defender for Office 365

Microsoft 365

Security

Problem: Phishing and malware via email are among the most common attack vectors in mid-market companies.

Scope: Safe Links and Safe Attachments including detonation - Configure anti-phishing and impersonation protection - Customize policies per user group - Reporting dashboard and end-user awareness materials

Result: Measurably fewer successful phishing attempts and a well-documented email security architecture.

Icon
M365 Tenant Readiness

Microsoft 365

Security

Problem: Misconfigurations in the tenant lead to security gaps, licensing issues, and compliance risks.

Scope: Review global settings in Admin Center and Entra ID - Validate Entra Connect (users/groups/devices/writeback) - Consistent UPN strategy and hardening of admin accounts - Onboard domains, assess DNS and network access

Result: A stable, license-compliant M365 tenant as a reliable foundation for all subsequent projects.

Icon
Defender for Office 365

Microsoft 365

Security

Problem: Phishing and malware via email are among the most common attack vectors in mid-market companies.

Scope: Safe Links and Safe Attachments including detonation - Configure anti-phishing and impersonation protection - Customize policies per user group - Reporting dashboard and end-user awareness materials

Result: Measurably fewer successful phishing attempts and a well-documented email security architecture.

Icon
Conditional Access

Microsoft 365

Security

Problem: Uncontrolled access is a primary risk — MFA and Conditional Access protect identities.

Scope: Gather requirements per user group - Policies for user risk, location, device/platform, and apps - Block legacy authentication, activate session controls - Structured rollout: Report-Only → Pilot → Go-Live

Result: Verifiably secured access with clear policies and high usability.

In 30 minutes we will show you the blueprint for your specific use case.

Start a Blueprint.

Logo Image

DAMALO | Agentic AI Platform for Microsoft Consulting & Implementation. Making IT expertise accessible and affordable for mid-market companies.

Brand Logo
Brand Logo
Brand Logo
Brand Logo
Bitkom logo

© 2026 DAMALO GmbH

In 30 minutes we will show you the blueprint for your specific use case.

Start a Blueprint.

Logo Image

DAMALO | Agentic AI Platform for Microsoft Consulting & Implementation. Making IT expertise accessible and affordable for mid-market companies.

Brand Logo
Brand Logo
Brand Logo
Brand Logo
Bitkom logo

© 2026 DAMALO GmbH

In 30 minutes we will show you the blueprint for your specific use case.

Start a Blueprint.

Logo Image

DAMALO | Agentic AI Platform for Microsoft Consulting & Implementation. Making IT expertise accessible and affordable for mid-market companies.

Brand Logo
Brand Logo
Brand Logo
Brand Logo
Bitkom logo

© 2026 DAMALO GmbH

In 30 minutes we will show you the blueprint for your specific use case.

Start a Blueprint.

Logo Image

DAMALO | Agentic AI Platform for Microsoft Consulting & Implementation. Making IT expertise accessible and affordable for mid-market companies.

Brand Logo
Brand Logo
Brand Logo
Brand Logo
Bitkom logo

© 2026 DAMALO GmbH