This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can trysigning in orchanging directories.
Access to this page requires authorization. You can trychanging directories.
The enrollment status page (ESP) shows the provisioning status to people enrolling Windows devices and signing in for the first time. You can configure the ESP to block device use until all required policies and applications are installed. Device users can look at the ESP to track the setup progress on their device.
The ESP can be deployed during the default out-of-box experience (OOBE) for Microsoft Entra join, and anyWindows Autopilot provisioning scenario.
To deploy the ESP to devices, create an ESP profile in Microsoft Intune, and configure the ESP settings that control:
This article describes the information that the enrollment status page tracks and how to create an ESP profile in Microsoft Intune.
Use the following steps to create an Intune profile that configures the enrollment status page.
In theMicrosoft Intune admin center, selectDevices > expandDevice onboarding > *Enrollment.
In theWindows tab, underWindows Autopilot, selectEnrollment Status Page.
SelectCreate.
InBasics, enter the following properties:
SelectNext.
InSettings, configure the following settings:
Show app and profile configuration progress: Your options:
Show an error when installation takes longer than specified number of minutes: A time-out error message is shown after your desired time. The default time-out is 60 minutes. Enter a higher value if you think more time is needed to install apps on your devices.
Show custom message when time limit or error occur: Include a custom message that tells people what happened and who to contact for help. Your options:
Setup could not be completed. Please try again or contact your support person for help. default message is shown to users when an error occurs.Turn on log collection and diagnostics page for end users: We recommended turning on this option since the user's logs and diagnostics could aid with troubleshooting. Your options:
Only show page to devices provisioned by out-of-box experience (OOBE): Use this setting to stop the enrollment status page from reappearing to every new user who signs into the device. Your options:
Install Windows quality updates (might restart the device): Use this setting to control checking and installation from Windows Updates for the available quality updates, also known as monthly security update releases. Your options:
Important
Block device use until all apps and profiles are installed: Your options:
Allow users to reset device if installation error occurs: Your options:
Allow users to use device if installation error occurs: Your options:
Block device use until these required apps are installed if they are assigned to the user/device: Your options:
Only fail selected blocking apps in technician phase: Use this setting with Windows Autopilot pre-provisioned deployments to control how your required apps are prioritized during theTechnician Flow. This setting is only available ifblocking apps are added and only applies to devices going through pre-provisioning. Your options:
Tip
When using this feature, expect provisioning time to increase during the Technician Flow. The more apps assigned, the longer it could take. If you're using a non-Microsoft provider to provision your devices, tell them about the potential for increased provisioning time. Increase the ESP time-out duration to prevent deployment from failing due to a time-out.
SelectNext.
InAssignments, select the groups to receive your profile. Optionally, selectEdit filter to restrict the assignment further.
Note
Due to OS restrictions, a limited selection of filters are available for ESP assignments. The picker only shows filters that have rules defined formodel,manufacturer,osVersion,operatingSystemSKU,deviceOwnership, andenrollmentProfileName properties.model andmanufacturer are available with Windows 11, version 23H2 with KB5035942 or later, or version 22H2 with KB5035942 or later. Filters that contain other properties aren't available.
SelectNext.
Optional. InScope tags, assign a tag to limit profile management to specific IT groups, such asUS-NC IT Team orJohnGlenn_ITDepartment. Then selectNext.
Scope tags limit who can see and reprioritize ESP profiles in the admin center. A scoped user can tell the relative priority of their profile even if they can't see all of the other profiles in Intune. For more information about scope tags, seeUse role-based access control and scope tags for distributed IT.
InReview + create, review your settings. After you selectCreate, your changes are saved, and the profile is assigned. Once deployed, the profile applies the next time the devices check in. You can access the profile from your profiles list.
Intune applies the default profile to all users and all devices when no other ESP profiles are available to assign. You can configure the default profile to show or hide the ESP.
Select the default profile.
SelectProperties.
Go to theSettings section and selectEdit.
ConfigureShow app and profile installation progress to set the behavior of the default profile. Your options:
If you selectYes, more settings become available for you to configure.
SelectReview + save.
Review the summary of changes and then selectSave.
When you configure the enrollment status page, you can choose to installmonthly security update releases, also known as quality updates, during the OOBE. By default, these quality updates aren't installed during OOBE.
On Windows 11 versions with the2025-06 D quality update, the control that enables this feature is part of the operating system. On other Windows 11 versions, the feature is in the2025-11 D zero day package (ZDP) that's automatically installed before the ESP is displayed. So, to install quality updates during OOBE, you only need to configure the ESP policy in Intune.
Note
The operating system control is included in the following2025-06 D operating system updates:
| OS version | KB article |
|---|---|
| Windows 11, version 25H2 | Automatically included |
| Windows 11, version 24H2 | KB5060829 |
| Windows 11, version 23H2 Windows 11, version 22H2 | KB5060826 |
TheInstall Windows quality updates Intune setting is available now. But, the OS doesn't enforce it yet. Enforcement is planned in the2026-01 B quality update.
TheInstall Windows quality updates Intune setting only installs monthly security update releases. It doesn't install the other types of updates listed atTypes of update releases.
TheInstall Windows quality updates Intune setting can be configured on new and existing ESP profiles.
On new ESP profiles, the setting default isYes.
On existing ESP profiles, the setting default isNo.
To install the quality updates during OOBE, edit the existing ESP profile and set theInstall Windows quality updates setting toYes.
Installing the quality updates during OOBE adds 20-40 minutes to the provisioning process and might require restarts. If a restart occurs, the user isn't automatically signed into Windows. Restarts can break some autologon provisioning scenarios. In these scenarios, we recommend you setInstall Windows quality updates toNo.
Monthly security update releases aren't installed during OOBE when the device is on a metered network.
Important
To ensure that monthly security update releases are installed, set theBlock device use until all apps and profiles are installed ESP profile setting toYes. When set toNo, the device might exit ESP before the following items are applied:
No can result in monthly security update releases not being installed during OOBE, even whenInstall Windows quality updates is set toYes.
Devices that meet all of the following conditions honor theInstall Windows quality updates setting. Devices that don't meet the following conditions don't honor theInstall Windows quality updates setting and they won't install monthly security update releases during OOBE.
The following specific scenarios aren't supported and theInstall Windows quality updates setting isn't honored:
Update rings settings, such as monthly security update release deferrals and pauses, are honored. The ESP page doesn't exit until ring settings are synced. This process ensures sure that the right settings are used when Windows Update scan occurs. If a device isn't registered as a Windows Autopilot device, theAll Devices assignments must be used for both the Update Rings and ESP profile settings.
If using Windows Autopatch, Update rings policies need to be configured as described. Since Autopatch groups don't support assigning toAll Devices, use one of the following two methods instead:
Expedited updates aren't part of the installation of monthly security update releases during OOBE. Devices assigned to an expedited update policy will initiate the expedited update sometime after OOBE completes if the expedited updates aren't part of monthly security update releases.
Tip
By using Update Rings to manage updates, administrators don't need to go to both the ESP and Update Rings to pause an update. Pausing an update via Update Rings pauses the update on both devices being provisioned, for example running Windows Autopilot, and devices that are already enrolled.
If you assign a user or device more than one ESP profile, the profile with the highest priority takes precedence over the other profiles. The profile set to 1 has the highest priority. Intune applies the default ESP profile when no other profiles are assigned to the device or user.
Intune applies profiles in the following order:
To prioritize your profiles:
Specify the apps that must be installed before the user can exit the ESP. You can choose up to 100 apps.
The apps in this list are used by Intune to filter the list that should be considered blocking. It doesn't specify what apps should be installed. For example, if you configure this list to include:
AndApp 3 andApp 4 are targeted to the device or user, the ESP tracks onlyApp 3.App 4 is still installed during pre-provisioning flows, but the ESP doesn't wait for it to complete. In other scenarios, such as user-driven and self-deploying mode, and whenApp 4 is a Win32, Microsoft Store, or Enterprise app catalog app, it doesn't get installed until after ESP completes.
The enrollment status page tracks these phases of provisioning:
This section describes the types of information, apps, and policies tracked during each phase.
During device preparation, the enrollment status page tracks these tasks for the device user:
This task ensures that the device completes the Trusted Platform Module (TPM) key attestation and validates its identity with Microsoft Entra ID. Microsoft Entra ID sends a token to the device, which is used during Microsoft Entra join.
This step is required for Windows Autopilot self-deploying mode and Windows Autopilot pre-provisioning deployment. It isn't needed for Windows Autopilot scenarios in user-driven mode.
The device uses the token received in the previous step to join Microsoft Entra ID. This step is required in Windows Autopilot self-deploying mode and Windows Autopilot pre-provisioning deployment. Devices in user-driven mode have already completed this task by time they open the ESP.
The device enrolls in Microsoft Intune for mobile device management (MDM).
This step is required in Windows Autopilot self-deploying mode and Windows Autopilot pre-provisioning deployment. Devices in user-driven mode have already completed this step by time they open the ESP.
After enrollment, the device calculates the policies and apps required to track in the next phase. For Windows 10, version 1903 and later versions, the device also creates the tracking policy for the SideCar agent, and installs the Intune Management Extension used to install Win32 apps.
The enrollment status page tracks these items during the device setup phase:
ESP doesn't track security policies, such as device restrictions, but these policies are installed in the background. The ESP does track Microsoft Edge, Assigned Access, and Kiosk Browser policies.
Tip
When complete, the status for security policies appears on the ESP as(1 of 1) completed.
The ESP tracks the installation of SCEP certificate profiles targeted at devices.
The ESP tracks VPN and Wi-Fi profiles targeted at devices.
The ESP tracks the installation of apps deployed in a device context and targeted to devices, and includes:
Note
Don't mix LOB and Win32 apps. Both LOB (MSI) and Win32 installers use TrustedInstaller, which doesn't allow simultaneous installations. If the OMA DM agent starts an MSI installation, the Intune Management Extension plugin starts a Win32 app installation by using the same TrustedInstaller. In this situation, Win32 app installation fails and returns anAnother installation is in progress, please try again later error message. In this situation, ESP fails. Therefore, don't mix LOB and Win32 apps when using Windows Autopilot.
If mixing LOB and Win32 apps is required, consider usingWindows Autopilot device preparation, which doesn't use ESP so therefore supports mixing of LOB and Win32 apps.
During the account setup phase, the ESP tracks apps and policies targeted at users, including:
Security policies
Certificates
Network connections
Apps
Tip
Before installation begins, the device creates a tracking policy and calculates all apps and policies that need to be tracked. While that's happening, the ESP shows subtasks in anIdentifying state.
ESP doesn't track security policies, such as device restrictions, but these policies are installed in the background. The ESP does track Microsoft Edge, Assigned Access, and Kiosk Browser policies.
The ESP tracks the installation of SCEP certificate profiles assigned to users.
The ESP tracks Wi-Fi profiles assigned to users.
During this phase, the ESP tracks the installation of apps assigned to the user. The ESP tracks Win32 apps for Windows 10, version 1903 and later.
It also tracks the following types of apps when they're assigned to all devices, all users, or a user group that includes the enrolling device user:
If you're using Microsoft Entra hybrid join, Win32 and UWP apps assigned to the device with user installation context aren't tracked during provisioning.
This section lists the known issues for the enrollment status page.
When creating apps that are deployed during ESP, any reboots that are packaged within the app might cause ESP to hang and fail the deployment. We recommend specifying the reboot behavior in Intune instead of triggering the reboot within the package.
Disabling the ESP profile doesn't remove ESP policy from devices and users still get ESP when they sign in to device for first time. The policy isn't removed when the ESP profile is disabled.
A reboot during device setup forces the user to enter their credentials before the account setup phase. User credentials aren't preserved during reboot. Instruct the device users to enter their credentials to continue to the account setup phase.
The ESP always times out on devices running Windows 10, version 1903 and earlier, andenrolled via theAdd work and school account option. The ESP waits for Microsoft Entra registration to complete. The issue is fixed on Windows 10 version 1903 and later.
Hybrid Microsoft Entra Windows Autopilot deployment with ESP takes longer than the time-out duration entered in the ESP profile. On Hybrid Microsoft Entra Windows Autopilot deployments, the ESP takes 40 minutes longer than the value set in the ESP profile. For example, you set the time-out duration to 30 minutes in the profile. The ESP can take 30 minutes + 40 minutes. This delay gives the on-premises AD connector time to create the new device record to Microsoft Entra ID.
Windows sign in page isn't prepopulated with the username in Windows Autopilot User Driven Mode. If there's a reboot during the Device Setup phase of ESP:
ESP is stuck for a long time or never completes the "Identifying" phase. Intune computes the ESP policies during the identifying phase. A device might never complete computing ESP policies if the current user doesn't have an Intune licensed assigned.
Configuring Microsoft Defender Application Control causes a prompt to reboot during Windows Autopilot. Configuring Microsoft Defender Application (AppLocker CSP) requires a reboot. When this policy is configured, it might cause a device to reboot during Windows Autopilot. Currently, there's no way to suppress or postpone the reboot.
When theDeviceLock policy is enabled as part of an ESP profile, the OOBE or user desktop autologon could fail unexpectedly for two reasons.
ESP doesn't apply to a Windows device that was enrolled with Group Policy (GPO).
Scripts that run in user context (Run this script using the logged on credentials on the script properties is set toyes) might not execute during ESP. As a workaround, execute scripts in System context by changing this setting tono.
Microsoft 365 Apps might cause the ESP to hang during app installation, specifically when:
To prevent the ESP from hanging during installation and causing a failed deployment, we recommend deploying Microsoft 365 Apps with Microsoft Intune by using theWin32 app type.
For help with errors or messages related to the ESP, including how to disable an already-enabled ESP, seeTroubleshoot the Windows Enrollment Status page.
Was this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?
Was this page helpful?
Want to try using Ask Learn to clarify or guide you through this topic?