Create a Windows Provisioning Package (.PPKG) for Automated Domain Enrollment

Overview

This tutorial walks through the Windows Configuration Designer (WCD) wizard to create a Windows provisioning package (.PPKG) that can be applied during imaging or first boot (OOBE) to automatically configure and enroll a device. The steps below correspond exactly to the wizard screens shown when selecting Provision desktop devices.


Prerequisites

  • A Windows PC to build the package.
  • Tenant requirements:
    • Entra ID join is allowed for users (or device join is permitted by policy).
    • If you want Intune enrollment: Intune licensing and auto-enrollment are enabled.


Index

  1. Install Windows Configuration Designer
  2. Create a new provisioning project
  3. Set up device
  4. Set up network
  5. Account management
  6. Add certificates (Optional)
  7. Finish – Build the provisioning package

Content

1) Install Windows Configuration Designer


2) Create a new provisioning project

  • Open Windows Configuration Designer.
  • Click Provision desktop devices.

Make sure your Windows Configuration Designer has these options menu, other versions will not provide the expected results. 

  • Give your project a name (example: AutoJoin-Entra-Intune).
  • Click Next until you reach the main editor.

3) Set up device

This step defines basic device identity and behavior.

Device name (Required)

Enter a device name or naming pattern.

You can use variables to automatically generate unique names:

  • %SERIAL% – Uses the device serial number
  • %RAND:x% – Generates x random digits

Examples:

  • COMP-%SERIAL%
  • VDI-%RAND:5%
  • SOFTDRIVE-%RAND:6%
Device names must be 63 characters or fewer and are supported on Windows 10 version 2004 and later.

Enter product key (Optional)

Use this field only if you need to:

  • Upgrade Windows edition (for example, Home → Pro)
  • Apply a MAK or retail key

If your image is already licensed or uses subscription-based activation, you can leave this blank.


Configure devices for shared use

Toggle Yes only if this is a:

  • Shared PC
  • Kiosk
  • Classroom or lab device

For most corporate laptops, VMs, or VDI images, leave this set to No.


4) Set up network

This step ensures the device has network connectivity during provisioning.

Wi-Fi profile (Optional but recommended)

Add a Wi-Fi profile if:

  • The device will not have wired Ethernet during OOBE.
  • Enrollment depends on immediate internet access.

You’ll need:

  • SSID
  • Security type (WPA2/WPA3)
  • Pre-shared key or certificate

Click Next.


5) Account management

This step controls identity and enrollment.

Enroll in Azure AD (Microsoft Entra ID)

Enable Azure AD Join to automatically join the device to your tenant.

You may be prompted to:

  • Sign in with an enrollment or admin account.
  • Provide tenant information.

This allows the device to:

  • Join Entra ID during OOBE.
  • Skip manual user-based join.

6) Add certificates (Optional)

Use this step if your environment requires certificates for:

  • Wi-Fi authentication
  • VPN access
  • Internal resources

Supported certificate types:

  • Root certificates
  • Client certificates

Click Next.


7) Finish – Build the provisioning package

Package settings

  • Owner: IT Admin
  • Version: Start with 1.0

Security

Choose one:

  • Sign the package (recommended)
  • Or protect with a password
Signing improves trust and prevents tampering.

Click Build to generate the .ppkg file.

Embedded in an image

The package can be:

  • Stored with the image
  • Applied during first boot using scripts or recovery customization folders

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article