Windows 365 Boot: Why User-Driven Mode?

Windows 365 Boot: Why User-Driven Mode?

Ever since writing about The Concept of Windows 365 Boot, I’ve been puzzled by Microsoft’s choice to use User-Driven mode in the Windows Autopilot deployment profile when configuring Shared PC mode through the Windows 365 Boot guided scenario. To me, it seems illogical to use User-Driven mode in a Shared PC scenario, which is basically a kiosk mode. So, if we assume that the Shared PC Scenario is the most common use case for Windows 365 Boot, their configuration choice simply doesn’t make sense 🤔

Why User-Driven Mode?

You might wonder why that doesn’t make sense! – Let me elaborate: In User-Driven mode, the user who enrolls the device will become the primary user of that device, requiring their credentials during provisioning. But do we want a primary user associated with the device in a Shared PC scenario? In my opinion, no! – In a Shared PC scenario, I prefer Self-Deploying mode because it requires no user interaction and doesn’t automatically assign a primary user during the Windows Autopilot provisioning.

– So, join me as I try to demystify Microsoft’s rationale for using User-Driven mode. We’ll explore what happens and what to be aware of if switching to Self-Deploying mode for the Windows 365 Boot Share PC scenario.

In this post, I’ll cover the following topics.

Shared vs. Dedicated PC scenarios

Before we delve into configuring Self-Deploying mode, let’s explore the different kinds of Boot to Cloud modes:

  • Boot to Cloud Shared PC Mode (Shared PC scenarios)
    The Shared PC scenario enables multiple users to sign in to their personal Cloud PCs via the same physical device. Moreover, this scenario is ideal for workers like nurses, salespeople, and call center staff. In particular, these workers often share company devices and frequently switch between tasks and computer interactions.
  • Boot to Cloud Dedicated Mode (Dedicated PC scenarios)
    In this scenario, a specific user is assigned to the physical device. This allows them to sign in on the device using Windows Hello for Business (e.g., PIN, biometrics) to connect to their secure Cloud PCs. The Dedicated mode also preserves user personalization, including their profile picture and username on the physical device. Additionally, it also enables fast account switching.

For more information, see What is Windows 365 Boot?

Configuring Self-Deploying Mode

First, let’s examine the Windows Autopilot deployment profile properties set during the Windows 365 Boot-guided scenario. The screenshot below shows that the Deployment mode is set to User-Driven.

Next, let’s find out if everything will blow up in our faces 💥 if we replace it with a new Windows Autopilot deployment profile based on Self-Deploying mode.

Self-Deploying vs. User-Driven mode

Log in to https://intune.microsoft.com
Go to Devices Enrollment (under Device onboarding) | Deployment profiles (under Windows Autopilot).

Select + Create profile, and choose Windows PC.

On the Basics tab, fill in the required Name field and set Convert all targeted devices to Autopilot to Yes.
Click Next.

Set the Deployment mode to Self-Deploying on the Out-of-box experience (OOBE) tab.
Define a device naming convention and click Next.

On the Assignments tab, assign the deployment profile to a security group containing the devices it applies to.
Click Next.

Review that everything is correct and click Create.

Test and Verification

Log in to https://intune.microsoft.com
Go to Devices Enrollment (under Device onboarding) | Deployment profiles (under Windows Autopilot).
Select the deployment profile created during the Windows 365 Boot-guided scenario.

Go to Properties and click Edit next to Assignments.

Click Remove.
Click Review + Save.

It’s time to reset our Windows 365 Boot device, which currently has a primary user associated with it.

Go to Devices Windows (under By platform).
Select the Windows 365 Boot device from the device overview and select Wipe.

Click Wipe.

Here’s what happens if you use Hyper-V Virtual Machines (with virtual TPM) for Self-Deploying deployment. The first step in the Enrollment Status Page (ESP) progress will fail with Error 800705b4.

For more details, see Securing your hardware (Failed: 0x800705b4)

End-User Experience

Unfortunately, I don’t have a spare physical device that meets Windows Autopilot Self-Deploying requirements. However, with a bit of workaround magic, I can still demonstrate the end-user experience using a Hyper-V Virtual Machine.

Nevertheless, this is what the Windows Autopilot Self-Deploying provisioning looks like. The “Welcome! Let’s get you set up for work.” page is only seen during Windows Autopilot Self-Deploying scenarios.

As previously mentioned, Windows Autopilot Self-Deploying mode requires no user interaction, enabling zero-touch deployment. Furthermore, it does not automatically assign a primary user to the device. – Perfect 🤩

The Enrollment Status Page (ESP) looks the same across all Windows Autopilot deployment modes.

The Windows Autopilot Self-Deploying provisioning is complete when you see the Windows 11 login screen.

The users must sign in with their work or school account on the Windows 11 login screen.

Once the credentials are validated, the user seamlessly connects to their personal Windows 365 Cloud PC.

Finally, let’s confirm via Microsoft Intune that the devices no longer have a primary user assigned.

Log in to https://intune.microsoft.com
Go to Devices Windows (under By platform).
Select the newly provisioned Windows 365 Boot device from the device overview.

The screenshot below shows that the device lacks an assigned primary user, which is the intended result.

Why?

Why did Microsoft choose to use User-Driven mode? As I have demonstrated, the Self-Deploying mode with Windows 365 Boot works perfectly. Therefore, what is the rationale behind their decision? Honestly, my research didn’t provide me with a clear answer. However, one plausible explanation could be that they prefer not to rely on a feature that is “still” in preview. 🤭

Perhaps Microsoft should revisit it since the Self-Deploying mode became generally available in February 2024.

Source: What’s new in Windows Autopilot

Summary

In this blog post, you learned about the differences between User-Driven and Self-Deploying modes in the Windows Autopilot deployment profile for Windows 365 Boot. Furthermore, I highlighted why the Self-Deploying mode is more suitable for Shared PC scenarios.

I provided detailed steps on how to configure Self-Deploying mode using Microsoft Intune. Additionally, I explained the process of testing and verifying the new deployment profile. Moreover, I described the end-user experience during Windows Autopilot Self-Deploying provisioning.

I hope you enjoyed this post and found it helpful. Additionally, to learn more about Microsoft Intune and Windows 365, please visit our Intune and Windows 365 categories.

That’s it, folks. Happy testing, and have fun exploring 🤓
If you have any questions regarding this topic, please feel free to reach out to us.

Website | + posts

Sune Thomsen is based in Denmark, and he is a dedicated IT Consultant at Mindcore with over 19 years of experience in the IT industry. He has spent at least a decade specializing in client management via Microsoft Configuration Manager and Intune.

His key areas:
- Microsoft Intune (i.e., Autopilot, Windows 365, Endpoint Security, etc.)
- Client Management in general
- Application Management
- Cloud transitioning and building solutions toward the cloud

He's a Windows 365 and Windows MVP, an Official Contributor in a LinkedIn group with 41.500 members, and a Microsoft 365 Enterprise Administrator Expert.

Sune is passionate about community work and enjoys sharing his knowledge and experience and inspiring others via our blog. Besides blogging, he also writes newsletters on behalf of the Windows 365 community, does technical reviews for book publishers, and speaks at tech events.

Official Contributor here "Modern Endpoint Management":
https://www.linkedin.com/groups/8761296/

Table of Contents

Share this post
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories

Follow on SoMe