- Unbox the device, plug it in, and turn it on.
- If it uses multiple languages, select a language, locale, and keyboard.
- Connect it to a wireless or wired network with internet access. If using wireless, first connect to the wi-fi network.
- Specify an e-mail address account and password/TruU QR sign-in for the organization.
- Join the organization.
- Enroll in Microsoft Intune or another mobile device management (MDM) service.
- Download and install the assigned Applications and Configs (TruU Windows Authenticator is installed)
Prerequisite
- Windows 10/11 device with Trusted Platform Module (TPM) 2.0
- Intune Administrator account to configure the setup.
- Microsoft Intune and Entra ID P1 license
- MDM user scope should be set.
Step 1: Create a dynamic device group with the Group tag for User-Driven devices
- Sign in to the Microsoft Intune admin center > Groups > New Group.

- Select Security for Group type, give a name. (eg. UserDriven Autopilot Devices)
- For Membership type, choose Dynamic Device.
- Select Add dynamic query.
- Save the created group.
Step 2: Create User-Driven Autopilot deployment Profile
You can refer to the Microsoft article and create the User-Driven Autopilot profile as per your organization requirement. Tutorial/User-driven?Azure-ad-join-autopilot-profile#Create-and-assign-user-driven-microsoft-entra-join-autopilot-profile Note: Assign the created User-Driven Autopilot Profile to the dynamic device group which was created in the previous step.Step 3: Register devices as Autopilot devices
- Collect the HardwareID/hash from the devices which needs to be enrolled in self-deployment mode by referring the Autopliot/add devices#collect the hardware hash
- Sign into the Microsoft Intune admin center.
- In the Home screen, select Devices in the left hand pane.
- In the Devices | Overview screen, under By platform, select Windows.
- In the Windows | Windows devices screen, under Device onboarding, select Enrollment.
- In the Windows | Windows enrollment screen, under Windows Autopilot, select Devices.
- In the Windows Autopilot devices screen that opens, select Import.

- Import the .csv(hardware hash) file of the all devices which needs to be enrolled.
- After the import is complete, select Sync. (A message displays saying that the sync is in progress. The sync process might take a few minutes to complete, depending on how many devices are being synchronized.)
- Click on the newly added devices and add the Group tag as ‘UserDriven’
- Once the GroupTag has been assigned, wait for the Profile status to change from Unassigned to Assigned state.
Step 4: Package and Deploy TruU Windows Authenticator in Intune
Complete this step by following the instructions in the link Package and Deploy TruU Windows authenticator in IntuneStep 5: Configure and assign Autopilot Enrollment Status Page (ESP)
- Sign into the Microsoft Intune admin center.
- In the Home screen, select Devices in the left hand pane.
- In the Devices | Overview screen, under By platform, select Windows.
- In the Windows | Windows devices screen, under Device onboarding, select Enrollment.
- In the Windows | Windows enrollment screen, under Windows Autopilot, select Enrollment Status Page.
- In the Enrollment Status Page screen that opens, select Create.
- The Create profile screen opens. In the Basics page: a. Next to Name, enter a name for the ESP profile. b. Next to Description, enter a description. c. Select Next.
- In the Settings page, toggle the option Show app and profile configuration progress to Yes.
- Configure the settings as desired. However, make sure that you select the latest TruU for Windows application which was created in step 4 under “Block device use until these required apps are installed if they are assigned to the user/device:”

- Assign this ESP profile to the dynamic device group created in step 1.
Step 6: Enable the Security Keys (FIDO2) sign-in
To enable the use of security keys using Intune, complete the following steps:- Sign in to the Microsoft Intune admin center.
- Browse to Devices > Enroll Devices > Windows enrollment > Windows Hello for Business.
- Set Use security keys for sign-in to Enabled.
- Configure Windows Hello for Business shall be Not configured or Disabled state.

- Sign in to the Microsoft Intune admin center.
- Browse to Devices > Windows > Configuration profiles > Create profile.
- Configure the new profile with the following settings:
- Platform: Windows 10 and later
- Profile type: Templates > Custom
- Name: Security Keys for Windows Sign-In
- Description: Enables FIDO Security Keys to be used during Windows Sign In
- Select Next > Add and in Add Row, add the following Custom OMA-URI settings:
- Name: Turn on FIDO Security Keys for Windows Sign-In
- Description: (Optional)
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
- Data Type: Integer
- Value: 1
- Assign the Policy to the Groups that should support TruU login.
TruU Intune Autopilot Deployment TruU-Intune Self-Deployment Autopilot Setup

