Device Lifecycle & IAM

Windows Autopilot &
Device Lifecycle
Management

Multi-client rollout of nearly 650 corporate Windows devices via Microsoft Intune and covering the full identity-driven device lifecycle: initial deployment and user assignment, ongoing joiners, movers and leavers processes, cross-site device reassignment, and secure decommissioning.

Microsoft Intune Windows Autopilot Microsoft Entra ID Configuration Policies Compliance Policies App Deployment User-Assigned Devices Joiners · Movers · Leavers Device Decommissioning
Timeline~5 weeks
Devices deployed~650
Team size3 to 4 Techs
Cadence~150 per site · every ~10 months
PlatformMicrosoft Intune + Entra ID

Overview

Clients required fully managed Windows devices for both new employees and their wider user base. Each device; whether newly deployed or repurposed was provisioned and assigned to an individual user’s Microsoft account in Entra ID before user onboarding and device distribution. This ensured that the correct applications, configuration profiles, security policies, and compliance settings were automatically applied based on the user’s role and requirements, enabling a consistent and secure experience from first sign-in.

Working as part of a 3–4 technician team, I took ownership of key areas within the identity-driven device lifecycle, including hardware hash collection, Intune device registration, configuration and compliance policy design, and application deployment. I also played a central role in managing the joiners, movers, and leavers process—reassigning devices as users changed roles or locations, and securely decommissioning devices when users left the organisation.

Key differentiator: Every device was assigned to a specific user’s Microsoft account in Entra ID. Autopilot pre-configured the out-of-box experience so that when the user signed in for the first time, they automatically received a fully configured, policy-compliant device. This same identity-driven approach was used throughout the device lifecycle. When a user changed roles or left the organization, their access was revoked, and the device was either reassigned to another user or securely wiped.

Deployment Architecture

How hardware, Intune, Entra ID, and end users connect across the Autopilot deployment flow.

Windows Autopilot → Intune → OOBE → User-ready device
Windows Autopilot provisioning flow Hardware hashes are uploaded into Intune, devices receive group tags, user assignments, app assignments, and configuration policies, then Autopilot setup leads into Windows OOBE. Hardware Hashes Collected on-site + vendor-provided CSVs Microsoft Intune Devices imported and registered in Autopilot Group Tag Determines profile User Assignment User or DEM account Assigned Apps Based on user groups Config Policies Security + device settings Autopilot Setup Profile selected · assignments applied Windows OOBE Ready for user Hardware hash uploaded → Intune registration → assignments configured → Autopilot setup → Windows OOBE

Process

How the team executed the deployment from unboxed hardware to a user-ready, fully managed device.

01
Hardware hash consolidation

The team would ensure hardware hashes were either provided by the vendor or collected via a pre-configured< strong>Autopilot hardware hash collection executable to record each device's unique hardware identity. The hardware hash, serial number, and product ID would be stored into a CSV file which would be uploaded directly into Intune to register the devices in the Autopilot program.

Get-WindowsAutoPilotInfo · CSV upload to Intune
02
Device registration and user assignment

Once registered, each device would adopt the Autopilot deployment profile configured for user-driven mode. Devices were then individually assigned to their respective user's Microsoft Entra ID account, once booted Autopilot pre-populated the sign-in experience for that specific user. No generic setup, no shared credentials.

User-driven Autopilot profile · Entra ID user assignment
03
Configuration policies built and assigned

Configuration policies were created in Intune covering device settings, Windows Update rings, BitLocker encryption, security baselines, and desktop experience. These were assigned to device groups so they applied automatically during the Enrollment Status Page (ESP) phase before the user reached the desktop.

Configuration profiles · Security baseline · BitLocker · Update rings
04
Compliance policies configured

Compliance policies were defined to enforce minimum security standards; OS version requirements, BitLocker status, and antivirus state. Devices that didn't meet requirements were flagged as non-compliant and blocked from accessing company resources via Conditional Access until remediated.

Compliance policies · Conditional Access integration
05
App deployment via Intune

Required applications were deployed as Required assignments to device or user groups, installing automatically during or after the ESP phase. This included Microsoft 365 and line-of-business apps. Optional apps were made available through the Company Portal.

Required app assignments · Company Portal · Line-of-business apps
06
Device collection

Devices were handed to end users with the zero touch setup complete. All users had to do was sign-in, chsange their password, and their ready to take ownership.

Zero-touch delivery · Enrollment Status Page · OOBE

Device Lifecycle Management

Alongside initial deployment, this engagement included ongoing identity-driven device lifecycle management across multiple clients and sites. Because every device was tied to a specific user account in Entra ID, any change to that user's status had a direct, managed impact on their device.

Joiners — New user, new device

When a new staff member joined a client at any site, a device from that site's allocated pool was registered in Intune via the Autopilot hardware hash collected during the original deployment run. The device was assigned directly to the new user's Entra ID account before they arrived — meaning on first boot, Autopilot recognised the device, applied the correct deployment profile for that client's tenant, and walked the user through a pre-populated sign-in flow.

+
New Entra ID account provisionedUser added to the correct site/role group; app assignments and policies inherited immediately via group membership
+
Site-specific policies appliedEach client site had its own device group; the correct configuration profile, update ring, and app set applied based on site assignment
+
Device built before arrivalOOBE was completed via user Microsoft account; zero IT intervention needed at the physical device collection
+
Compliance verified at first sign-inDevice required to pass BitLocker, OS version, and antivirus checks before accessing any company resources
Movers - Role change or site transfer

Movers were the most varied scenario across this engagement. Staff moved between roles within the same site or transferred between different client sites. Each situation required a different combination of Intune and Entra ID actions depending on whether the device moved with the user or stayed at the site.

Scenario A: Role change, same site

User moved to a different team or department at the same site. Their Entra ID account was moved to the appropriate group; updated app assignments and configuration policies pushed automatically to the device via Intune without any re-enrollment or physical access needed.

Scenario B: Transfer to a different site

User relocated to another site within the organisation. If the device travelled with them, the device group assignment in Intune was updated to the destination site, triggering the correct site-specific policies. If the device stayed behind, it was Autopilot-reset and reassigned to a new joiner at that site, or added to a holding group pending the next deployment cycle.

Leavers - Offboarding and device decommissioning

When a user left a client, the offboarding process ran in two parallel tracks: identity (Entra ID account) and device (Intune). Because the two were linked, acting on the account side immediately affected what the device could access, even before the physical device was returned.

×
Entra ID account disabled immediatelyConditional Access blocked the device from all company resources; email, SharePoint, apps the moment the account was disabled, regardless of physical device location
×
Remote wipe or Autopilot reset issuedDepending on the situation: a full remote wipe (data erasure next time the device communicates with Intune) or Windows Autopilot reset (returns device to OOBE, keeps Autopilot registration) was issued via Intune
Device reassigned within the siteIf recovered and in good condition, the device was reassigned via Autopilot to the next joiner at the same sitel; no re-imaging and no additional admistrative work
×
Device fully retired and removed from IntuneWhere hardware was end-of-life or not recovered, the device record was deleted from Intune and the Autopilot registration removedl fully decommissioned from the client's tenancy and organization

Why this is IAM work: A device assigned to a user in Entra ID carries that user's identity and access rights. Managing what happens to the device at each lifecycle stage: who it's assigned to, what policies it carries, whether it can access resources is a direct extension of identity governance. The joiners/movers/leavers process here wasn't handled separately from endpoint management: it was the same operation, executed through the same tooling, on the same identity plane.

Device Lifecycle

How a single device moves through states across sites and user roles, from first enrollment to decommission or reassignment.

Device state transitions · joiners · movers · leavers
Device lifecycle flow Device moves through joiner enrollment, mover reassignment scenarios, and leaver decommissioning or re-assignment across multiple client sites Joiner — device enrolled Assigned to user · Site A or B Active managed device Policies + compliance enforced Mover Leaver Entra ID group updated Policies reassigned Same site: group update No re-enrollment needed Account disabled Cond. Access blocks access Remote wipe issued via Intune Device retired Removed from Intune Reassigned Next joiner Ongoing compliance + policy enforcement throughout lifecycle Microsoft Intune · Entra ID · Conditional Access

Policies Deployed

The policy framework applied to every device across all sites and clients.

Configuration policies

  • Windows Update delivery rings
  • BitLocker encryption enforcement
  • Microsoft security baseline
  • Desktop and Start menu layout
  • Windows Hello for Business
  • Firewall and Defender settings

Compliance policies

  • Minimum OS version enforced
  • BitLocker must be enabled
  • Antivirus must be active and reporting
  • Device must check-in with Intune periodically
  • Non-compliant devices blocked via Conditional Access

App deployments

  • Microsoft 365 (Required)
  • Client line-of-business apps (Required)
  • Company Portal for self-service
  • Assigned at device and user group level

Identity & access

  • Each device pre-assigned to user's Entra ID account
  • User-driven Autopilot deployment profile
  • Conditional Access policies tied to compliance
  • Single sign-on via Microsoft account at OOBE

Team

A coordinated 3 to 4 person effort; responsibilities split across hardware hash conolidation, Intune configuration, policy management, and device provisioning before handoff.

T1
Enrollment AdminHardware hash consolidation + Autopilot registration & testing
T2
User Management AdminUser assignment + Entra profile management
T3
Device Configuration AdminConfiguring necessary policies + App deployment
T4*
Optional TechnicianAssist Enrollment Admin to stay within project timeline

All Technicians of the team get the proper permissions to perform their roles in the project.

Outcomes

~650
Devices deployed across all sites
3-4
Person team coordinating the rollout
10mo
Recurring cadence per client site
0
Manual IT steps needed at user handoff

The process was documented and repeatable enough to run at a large scale per client site on a regular cadence, with consistent policy application, zero-touch delivery, and a full lifecycle management capability built in from day one.

Tools & Technologies

Microsoft Intune Windows Autopilot Microsoft Entra ID Get-WindowsAutoPilotInfo Enrollment Status Page Configuration Policies Compliance Policies Conditional Access User-Driven Deployment Profile Joiners · Movers · Leavers Device Reassignment Remote Wipe Autopilot Reset Company Portal BitLocker