Blog Post

Intune Customer Success
1 MIN READ

Support tip: Unblock Windows “Set up for Work or School” enrollment

Liz_Cox's avatar
Liz_Cox
Icon for Microsoft rankMicrosoft
Jan 25, 2022

Some customers run into issues during the out-of-box experience (OOBE) when enrolling Windows devices, specifically when the device is recognized as a personal device and the tenant does not allow for this device type. This scenario can occur during device setup when the user chooses Set up for work or school and then signs in with an organization-linked Azure Active Directory (Azure AD) account.

 

Windows 11 out-of-box-experience (OOBE) - How would you like to set up your device.

 

Windows 11 out-of-box-experience (OOBE) - Let's set things up for your school.

 

If you have personal device enrollment blocked for your tenant, this enrollment method will result in a failure. The associated error code you might see is 80180014.

 

To fix this, you can allow personal enrollment of Windows devices either for all users or for a subset of users you want to be allowed to enroll personal devices. We recommend limiting the number of users you allow to enroll personal windows devices to only the users who will need this capability. This will ensure that other users in your organization do not accidentally enroll their personal devices.

To allow personal device enrollment, sign-in to the Microsoft Endpoint Manager admin center and select Devices > Enroll devices > Enrollment device platform restrictions.

 

Microsoft Endpoint Manager admin center - Enrollment device platform restrictions for Windows devices.

 

Select Windows restrictions > Create restriction and give the restriction an informative name. On the Platform settings page, make sure to set Personally owned devices to Allow.

 

Microsoft Endpoint Manager admin center - Creating a new enrollment restriction for personally owned Windows devices.

 

Assign the restriction to the group(s) you want to let enroll personal devices.

 

Microsoft Endpoint Manager Enrollment admin center - Assigning a new enrollment restriction to an Azure AD group for personally owned Windows devices.

 

Review and create the restriction.

 

If you have any questions or comments, reply to this post or reach out to @IntuneSuppTeam on Twitter.

Updated Dec 19, 2023
Version 10.0
  • LucaCavana's avatar
    LucaCavana
    Iron Contributor

    Hi Jason Katz , with the enrollment restrictions in place (blocking personally owned devices) then any Windows device not considered as corporate it is blocked. Personal enrollment is not permitted if you block it.

     

    Practically speaking, if Intune can somehow recognize the device as a corporate device:

    HW IDs for Autopilot -> uploaded by OEM or you for preapproved devices

    Domain Join for GPO / SCCM -> If the device is domain joined / SCCM managed then it's always corporate by definition

    Device Enrollment Manager account -> the IT is in control of this account

    Bulk Provisioning Package -> the IT is in control of this package

    it will allow enrollment, otherwise it will block it. This is what you typically want if you don't have a BYOD scenario going on / your org owns all the Windows devices.

     

    If you leave the device restrictions open, allowing both corporate and personal devices then Intune will mark as corporate any device falling in these categories, and any other device will be considered as personal. This is what you typically want if BYOD is permitted in your organization.

     

    Please note that in the case of Azure AD Joined devices (and only for those) this goes hands in hands with who can actually join them to Azure AD and it is regulated on Azure AD side, by default everyone can. The most restrictive of the two (Enrollment Restrictions + Azure AD Join restrictions) wins:

    If everybody can Azure AD Join BUT only corporate devices are permitted -> Azure AD Join of personal devices will fail.

    If everybody can Azure AD Join AND personal devices are permitted -> Azure AD Join of personal devices will succeed.

    If nobody can Azure AD Join -> Enrollment restrictions does not matter anymore.

    Please remember to enable automatic enrollment for Azure AD Joined devices.

     

    I think this article is at most incomplete because you can't dismiss some complex subject as this with a few lines saying "just let anyone enroll their home PC into your tenant". It should have been paraphrased better. This way it's really dangerously incomplete because if people just go and put the gates looses, then the fiesta of user owned PCs in your tenant begins.

  • Jason Katz's avatar
    Jason Katz
    Copper Contributor

    LucaCavana , thanks for sharing.  So essentially with the device enrollment restriction in place (only allowing corporate enrollment) by default the device enrollment is considered personal.  Exceptions being enrollment via the Device Enrollment Manager and Autopilot, along with a few other methods mentioned in the doc you've linked.

     

    Does that seem correct?  Just want to make sure I fully understand.  

    Thank you!

  • JeffH88's avatar
    JeffH88
    Brass Contributor

    LucaCavana  Duly noted ... I was trying to differentiate my questions from the quotes.

     

    Thanks for the link ... it has the answer I was looking for.

  • LucaCavana's avatar
    LucaCavana
    Iron Contributor

    JeffH88 please don't write in all caps, it's considered bad etiquette and spoils the pleasure of helping others.

     

    You can refer to this Docs to understand how Intune differentiates between Windows personal or corporate devices: Set enrollment restrictions in Microsoft Intune | Microsoft Docs.

    For this particular scenario, being enrollment by the OOBE screen, if you login with a Device Enrollment Manager account it will be recognized as corporate, otherwsie if you login with a normal user account it will be recognized as personal.

  • JeffH88's avatar
    JeffH88
    Brass Contributor

    In relation to Jason Katz's question above ...

     

    "Some customers run into issues during the out-of-box experience (OOBE) when enrolling Windows devices, specifically when the device is recognized as a personal device and the tenant does not allow for this device type."

     

    HOW IS THE DEVICE "RECOGNIZED AS A PERSONAL DEVICE" WHEN ALL THE USER HAS DONE SO FAR IS TURN IT ON AND LET IT BOOT TO THIS SCREEN?

     

    " This scenario can occur during device setup when the user chooses Set up for work or school and then signs in with an organization-linked Azure Active Directory (Azure AD) account."

     

    ISN'T THIS EXACTLY HOW USERS ARE SUPPOSED TO ENROLL CORPORATE DEVICES?

  • NJReyes's avatar
    NJReyes
    Copper Contributor

    To clarify -- these are for Windows Pro versions, opposed to Windows Home versions? 

  • Jason Katz's avatar
    Jason Katz
    Copper Contributor

    To my understanding "Setup for Work or School" creates an Azure AD Join (as opposed to a registration).  For the OOBE and initial enrollment, can you provide an example where the device would be recognized as Personal prior to registration with Work or School?