← Back to Microsoft Intune
📱 Blog Post · Microsoft Intune

Corporate & BYOD Device Enrollment in Microsoft Intune

Step-by-step enrollment guides for Windows, iOS/macOS, and Android — covering both corporate-owned (Autopilot / DEP / Android Enterprise) and personal BYOD devices, plus best practices for each.

📅 May 15, 2025
10 min read
📱 Microsoft Intune
ℹ️
Corporate Device Enrollment gives IT full management control over company-owned devices. Devices are enrolled via Autopilot (Windows), Apple Business Manager / DEP (iOS/macOS), or Android Enterprise (Android) — all without requiring end-user involvement in the IT setup process.
Before You Start
Prerequisites — Corporate
📋
Required Before Enrolling Corporate Devices
→ Microsoft Intune license assigned to each user
→ Azure Active Directory configured
→ Devices should be factory reset (required for Autopilot / DEP)
→ Admin permissions to configure Intune (Intune Administrator or Global Administrator role)
Windows 10 / 11
Autopilot + Azure AD Join
Zero-touch provisioning for corporate Windows devices — devices set themselves up on first boot.
01
Enable Auto Enrollment in Azure AD
In the Azure Portal → Azure Active Directory → Mobility (MDM and MAM) → Microsoft Intune.
Set MDM user scope to All (or a specific group). This allows devices that join Azure AD to auto-enroll into Intune.
02
Import Device Hardware Hash into Intune
Obtain the hardware hash from each device (either via OEM export or by running the script below on the device before setup). Upload the generated CSV to Intune → Devices → Windows → Windows Enrollment → Autopilot → Devices → Import.
Install-Script -Name Get-WindowsAutopilotInfo Get-WindowsAutopilotInfo -OutputFile C:\HWID\DeviceID.csv
03
Create and Assign a Windows Autopilot Deployment Profile
Intune → Devices → Windows → Windows Enrollment → Deployment Profiles → Create Profile.

→ Platform: Windows PC · Type: User-Driven
→ Convert all targeted devices to Autopilot: Yes
→ Optionally skip privacy settings, EULA, and rename device on OOBE

Assign the profile to your Autopilot device group.
04
Device Auto-Enrolls on First Boot
Ship the device to the end user. On first power-on with internet access, the device detects the Autopilot profile, joins Azure AD, auto-enrolls into Intune, and applies all assigned apps and policies — with no IT involvement needed on-site.
iOS & macOS
Apple Business Manager / DEP
Automated Device Enrollment via Apple Business Manager — devices enroll silently on first setup.
01
Set Up Apple MDM Push Certificate in Intune
Intune → Devices → iOS/iPadOS → iOS/iPadOS enrollment → Apple MDM Push certificate.
Download the CSR, upload to Apple Push Certificates Portal, download the resulting .pem, then upload back to Intune. This certificate is required for all Apple device management and must be renewed annually.
02
Connect Apple Business Manager to Intune
In Apple Business Manager (business.apple.com) → Settings → MDM Servers → Add MDM Server → enter your Intune MDM server URL.
In Intune → Devices → iOS/iPadOS → Enrollment program tokens → Add token → download and upload the Apple token file.
03
Assign Devices to the MDM Server in ABM
In Apple Business Manager → Devices → select target devices → Assign to MDM → choose your Intune MDM server. Devices purchased through Apple or authorised resellers can be auto-assigned using your ABM organisation ID.
04
Create iOS/macOS Enrollment Profile in Intune
Intune → Devices → iOS/iPadOS → Enrollment program tokens → select your token → Profiles → Create profile.

Configure: department name, support phone, supervision mode (Supervised recommended for corporate), lock enrollment to prevent removal, and set the setup assistant steps to skip.
05
Device Auto-Enrolls on Setup
Factory-reset the device (or unbox a new one). During the iOS/macOS Setup Assistant, the device checks in with Apple, receives the DEP profile from Intune, and silently enrolls — applying all assigned configuration profiles, restrictions, and apps.
Android
Android Enterprise — Corporate
Fully managed or dedicated device enrollment using Android Enterprise and Managed Google Play.
01
Connect Managed Google Play to Intune
Intune → Devices → Android → Android enrollment → Managed Google Play → Connect.
Sign in with a corporate Google account and approve the connection. This links your Intune tenant to Google's enterprise management infrastructure.
02
Choose Enrollment Type
Select the appropriate management mode for your use case:

Fully Managed — Single-user corporate device. IT has full control. Best for office or field workers with dedicated company phones.
Dedicated Device — Single-purpose kiosk device (e.g. warehouse scanner, digital signage). No user account required.
03
Create an Enrollment Profile with Security Settings
Intune → Devices → Android → Android enrollment → Corporate-owned, fully managed user devices → Create profile.
Configure token name, device name template, Wi-Fi settings, and security requirements. Intune generates a QR code and an enrollment token.
04
Factory Reset Device and Scan QR Code
Factory reset the Android device. On the Welcome screen, tap 6 times to enter provisioning mode, connect to Wi-Fi, then scan the QR code generated by Intune.
The device downloads the management agent, enrolls into Intune, and applies all assigned apps and policies automatically.
💡
Best Practices — Corporate Enrollment:
→ Use Dynamic Groups in Azure AD for automatic policy assignment (e.g. all Autopilot devices, all iOS supervised)
→ Combine Compliance Policies with Conditional Access — non-compliant devices lose access to corporate resources automatically
→ Configure Company Branding in Azure AD for a professional OOBE experience that shows your company logo and name during enrollment