Noah Talerman
Noah Talerman
To control OS settings, updates, and more on Windows hosts follow the manual enrollment instructions.
To use automatic enrollment (aka zero-touch) features on Windows, follow instructions to connect Fleet to Microsoft Entra ID. You can further customize zero-touch with Windows Autopilot.
Fleet uses a certificate and key pair to authenticate and manage interactions between the Fleet server and a Windows host.
How to generate a certificate and key:
With OpenSSL installed, open your Terminal (macOS) or PowerShell (Windows) and run the following command to create a key: openssl genrsa --traditional -out fleet-mdm-win-wstep.key 4096
.
Create a certificate: openssl req -x509 -new -nodes -key fleet-mdm-win-wstep.key -sha256 -days 3652 -out fleet-mdm-win-wstep.crt -subj '/CN=Fleet Root CA/C=US/O=Fleet.'
.
Note: The default
openssl
binary installed on macOS is actuallyLibreSSL
, which doesn't support the--traditional
flag. To successfully generate these files, make sure you're usingOpenSSL
and notLibreSSL
. You can check what youropenssl
command points to by runningopenssl version
.
In your Fleet server configuration, set the contents of the certificate and key in the following environment variables:
Note: Any environment variable that ends in
_BYTES
expects the file's actual content to be passed in, not a path to the file. If you want to pass in a file path, remove the_BYTES
suffix from the environment variable.
Restart the Fleet server.
Head to the Settings > Integrations > Mobile device management (MDM) page.
Next to Turn on Windows MDM select Turn on to navigate to the Turn on Windows MDM page.
Select Turn on.
With Windows MDM turned on, enroll a Windows host to Fleet by installing Fleet's agent (fleetd).
Available in Fleet Premium
To automatically enroll Windows workstations when they’re first unboxed and set up by your end users, we will connect Fleet to Microsoft Entra ID.
After you connect Fleet to Microsoft Entra ID, you can customize the Windows setup experience with Windows Autopilot.
In order to connect Fleet to Microsoft Entra ID, the IT admin (you) needs a Microsoft Enterprise Mobility + Security E3 license.
Each end user who automatically enrolls needs a Microsoft license
Sign in to Microsoft 365 admin center.
In the left-side bar select Marketplace.
On the Marketplace page, select All products and in the search bar below All products enter "Enterprise Mobility + Security E3".
Find Enterprise Mobility + Security E3 and select Details
On the Enterprise Mobility + Security E3 page, select Buy and follow instructions to purchase the license.
Find and buy a license.
Sign in to Microsoft Entra ID portal.
At the top of the page search "Users" and select Users.
Select or create a test user and select Licenses.
Select + Assignments and assign yourself the Enterprise Mobility + Security E3. Assign the test user the Intune licnese.
For instructions on how to connect Fleet to Microsoft Entra ID, in the Fleet UI, select the avatar on the right side of the top navigation and select Settings > Integrations > Mobile device management (MDM). Then, next to Windows automatic enrollment select Details.
Testing automatic enrollment requires creating a test user in Microsoft Entra ID and a freshly wiped or new Windows workstation.
Sign in to Microsoft Entra ID portal.
At the top of the page search "Users" and select Users.
Select + New user > Create new user, fill out the details for your test user, and select Review + Create > Create.
Go back to Users and refresh the page to confirm that your test user was created.
Open your Windows workstation and follow the setup steps. When you reach the How would you like to set up? screen, select Set up for an organization. If your workstations has Windows 11, select Set up for work or school.
Sign in with your test user's credentials and finish the setup steps.
When you reach the desktop on your Windows workstation, confirm that your workstation was automatically enrolled to Fleet by selecting the carrot (^) in your taskbar and then selecting the Fleet icon. This will navigate you to this workstation's My device page.
On the My device page, below My device confirm that your workstation has a Status of "Online."
Sign in to Microsoft Intune using the Intune admin user from step 1.
In the left-side bar select Devices > Enroll devices. Under Windows Autopilot Deployment Program select Deployment Profiles to navigate to the Windows Autopilot deployment profiles page.
Select + Create profile > Windows PC and follow steps to create an Autopilot profile. On the Assignments step, select + Add all devices.
Open your test workstation and follow these Microsoft instructions to export your workstations's device hash as a CSV. The CSV should look something like DeviceHash_DESKTOP-2V08FUI.csv
In Intune, in the left-side bar, select Devices > Enroll devices. Under Windows Autopilot Deployment Program select Devices to navigate to the Windows Autopilot devices page.
Select Import and import your CSV.
After Intune finishes the import, refresh the Windows Autopilot devices page several times to confirm that your workstation is registered with Autopilot.
Navigate to Microsoft Entra ID portal.
At the top of the page, search for "Microsoft Entra ID", select Microsoft Entra ID, and then select Company branding.
On the Company Branding page, select Configure or Edit under Default sign-in experience.
Select the Sign-in form tab and upload your logo to the Square logo (light theme) and Square logo (dark theme) fields.
In the bottom bar, select Review + Save and then Save.
Wipe your test workstation.
After it's been wiped, open your workstation and follow the setup steps. At screen in which you're asked to sign in, you should see the title "Welcome to [your organziation]!" next to the logo you uploaded in step 4.