- Basics
- About Knox
- Knox licenses
- Knox white paper
- Sign up for Samsung Knox
- Latest release notes
- General Knox FAQ
- General Knox KBAs
- Submit a support ticket
- User Acceptance Testing
- For IT admins
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Knox Mobile Enrollment
- Knox Configure
- Introduction
- Get started
- How to guides
- Manage licenses
- Release notes
- Provide feedback
- Troubleshoot
- Wearables
- FAQ
- KBAs
- Knox Capture
- Welcome
- Overview
- How-to guides
- Manage licenses
- Scanning profiles
- Apps and activities
- Scan engine settings
- Keystroke output and data formatting
- Export configuration and deploy through EMM
- Set the camera scan trigger
- Connect a hardware scanner
- Configure the output path
- Check a configuration in test mode
- Use intent output
- Knox Capture AR
- Get started
- How-to videos
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox Capture Scandit Edition
- Introduction
- How it works
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Create a new profile
- Assign profiles to groups and organizations
- Enroll devices
- Shared Android device quickstart
- Non-shared Android device enrollment quickstart
- Android Management API device enrollment quickstart
- Apple User Enrollment quickstart
- View device information
- Apply profiles to organizations
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQ
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Device management
- Accept or reject devices
- Upload devices
- Complete device management
- Delete devices
- Send notifications
- Enable or disable SIM control
- Download devices as CSV
- View device log
- Start and stop blinking reminder
- Lock and unlock devices
- Send relock timestamp
- Update or disable offline lock policy
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQ
- KBAs
- Support
- Knox Guard REST API
- Samsung Care+ for Business
- For Knox Partners
- Knox Deployment Program
- Knox MSP Program
Enroll a Windows device with Azure AD
If your Knox Manage tenant syncs Active Directory resources from your Azure AD tenant, you can enroll and provision Windows devices in your fleet with your user's Azure AD accounts. Enrolling with Azure AD offers the benefits of rapid cloud-based provisioning technology like Windows Out of Box Experience and Windows Autopilot.
In the Azure AD ecosystem, there are two types of managed devices:
- Registered devices — BYOD devices such as employee-owned laptops, 2-in-1 computers, tablets, and phones. For a full description of this type, see Azure AD registered devices in the Microsoft docs.
- Joined devices — Company-owned devices such as workstations, laptops, 2-in-1 computers, tablets, and kiosks. For a full description of this type, see Azure AD joined devices in the Microsoft docs.
Depending on your enterprise needs and deployment strategy, there are four available methods for enrolling and provisioning devices in Knox Manage through Azure AD:
- Windows Settings — Provisioning an enterprise user account by adding it as Windows account. Available for registered and joined devices.
- Windows Out of Box Experience (OOBE) — Enrolling a device in the startup wizard when the device is first turned on. Available for joined devices.
- Windows Autopilot — Enrolling a device with a customized OOBE profile. Available for joined devices.
- Provisioning package (PPKG) — Enrolling a device with a configuration file. Available for joined devices.
Before you can begin enrolling Windows devices using these methods, you must configure your Knox Manage tenant to sync information with your Azure AD tenant. Refer to Sync user information with Azure AD through Microsoft Graph API for a full explanation and details.
Supported platforms
The following Windows editions support enrollment in Knox Manage through Azure AD:
- Windows 10/11 Pro
- Windows 10/11 Business
- Windows 10/11 Enterprise
- Windows 10/11 Education
- Windows 10 Mobile
Enroll a device through Windows Settings
In this enrollment method for joined and registered devices, the device user adds their Azure AD account to their device in the Windows Settings, which provisions their enterprise identity and enrolls the device in your Knox Manage tenant through the Samsung Knox EMM cloud app. These actions take place during a regular user session after the device has already been set up for personal use.
For more details about this feature, see Register your personal device on your work or school network in the Microsoft support pages.
To enroll a device through Windows Settings, the device user first adds their Azure AD account:
- On the device, go to Start >
Settings, then in the Settings window click Accounts > Access work and school.
- Click + Connect. A dialog for setting up a work or school account opens.
-
Authenticate with the Azure AD account:
-
Enter the account name:
-
For a registered device, enter the Azure AD account name, then click Next.
-
For a joined device, click Join this device to Azure Active Directory. In the Microsoft account dialog, enter the Azure AD account name, then click Next.
-
-
If the account is recognized, both the password prompt and the Knox Manage branding shows in the dialog. Enter the account password and click Sign in.
-
-
If they read and agree to the terms of Knox Manage Privacy Policy and End User License Agreement, they select I Agree and then click Accept.
-
For a registered device, confirm both the Azure domain and the username is correct.
-
If the provisioning succeeds, the dialog reads The device is connected to Samsung EMM. Click Done. The Azure AD account is added to the device.
- Back in the Settings window, ensure the Azure AD account is in the account list.
After the device user adds their Azure AD account, the device is provisioned and enrolled through the Samsung Knox Management App.
Lastly, it's best if you ensure that the device is enrolled in your Knox Manage tenant:
- On the Knox Manage console, go to Device.
- Search for the user's device by its IMEI/MEID, serial number, or by their user name.
-
Check whether the device's status is Enrolled.
Enroll a device with Windows Out of Box Experience
In this enrollment method for joined devices, the device user provisions the Azure AD account after turning on the device for the first time, also known as the standard OOBE on Windows 10 and 11. This process can only take place if the device hasn't yet been configured for work or personal use.
To learn more about this technology, see Windows Out of Box Experience in the Microsoft docs.
To enroll a device with OOBE, the device user must:
- Ensure the device is connected to the Internet, and turn it on. The OOBE flow starts.
-
Follow the on-screen instructions to specify their language, region, and keyboard settings.
- If the device connects to the Internet through Wi-Fi or mobile data, choose an access point to connect to or select the cellular option. If the device uses mobile data, but no SIM card is present, they must insert a SIM card before they can connect to a cellular network.
- Follow the on-screen instructions until they reach the End User License Agreement. If they read and agree to it, select Next.
-
On the How would you like to set up this device? screen, select Set up for work or school, then select Next.
-
When prompted for sign in information, enter their Azure AD account name, then select Next.
-
If the account name is recognized, the Knox Manage branding shows, and they are prompted for the account password. Enter the password for the Azure AD account, then click Sign in.
-
If they read and agree to the terms of Knox Manage Privacy Policy and End User License Agreement, they select I Agree and then click Accept.
-
Follow the remaining on-screen instructions until they are prompted to approve the sign in request. The preferred means of authentication is the Microsoft Authenticator app on a separate device.
-
If the device user doesn't have the Microsoft Authenticator app, they must select I can't use my Microsoft Authenticator app right now, and select an alternative authentication method:
- A verification code from their mobile app
- An SMS message to their phone
- A call to their phone
-
- Enter a personal PIN for the device and finish the OOBE flow.
After the device user completes the OOBE flow, the device is provisioned with their Azure AD account and enrolled through the Samsung Knox Management App.
Lastly, it's best if you ensure that the device is enrolled in your Knox Manage tenant:
- On the Knox Manage console, go to Device.
- Search for the user's device by its IMEI/MEID, serial number, or by their user name.
-
Check whether the device's status is Enrolled.
Register a device in Windows Autopilot
For more information about this technology, see Windows Autopilot in the Microsoft docs.
If you plan to enroll a joined device in Knox Manage with Azure AD and an Autopilot profile, you must first prepare it by registering it with the Autopilot cloud service. There are several registration methods:
- OEM registration by the device vendor
- Reseller, distributor, or partner registration
- (These instructions) Manual registration by capturing the hardware ID of the device and uploading it to the Microsoft Admin Center
To manually register a device in Windows Autopilot, first locally capture its hardware ID:
- Turn on the device for the first time. The OOBE flow begins.
- Without following the on-screen instructions, press Shift + F10 to open PowerShell.
-
Run the following commands to save the hardware ID as a CSV file on the device:
New-Item -Type Directory -Path "C:\HWID" Set-Location -Path "C:\HWID" $env:Path += ";C:\Program Files\WindowsPowerShell\Scripts" Set-ExecutionPolicy -Scope Process -ExecutionPolicy RemoteSigned Install-Script -Name Get-WindowsAutopilotInfo Get-WindowsAutopilotInfo -OutputFile AutopilotHWID.csv
- Copy AutopilotHWID.csv to an external storage device or networked drive.
- Turn off the device.
- If you are registering multiple devices at the same time, combine the CSV files for each of them into one.
Next, upload the hardware ID to the Windows Autopilot cloud service:
-
On the Microsoft Admin Center, go to Device > Autopilot.
- On the Devices tab, click + Add Devices, then upload the device CSV file. Save the device.
- Create and configure an Autopilot profile for the device.
-
On the Azure AD portal, check the list of devices to ensure the device is present with the Autopilot icon:
After the device is registered, it's ready for OOBE enrollment.
Enroll a device with a provisioning package for Azure AD
In this enrollment method for joined devices, you create a provisioning package (PPKG) that configures the enrollment, then install it to the device.
Create a provisioning package
In order to build a PPKG, you need the Windows Configuration Designer app.
To build a PPKG for Azure AD:
- Open Windows Configuration Designer.
- Under Create, click Provision desktop devices. The PPKG wizard starts.
-
On the Set up device screen, enter a name for the device, then click Next.
TIP — You can use the %SERIAL% substitution token to add the device's serial number to the name. - (Optional) On the Set-up network screen, you need to perform enrollment over a specific network, you can set it at the Set up network stage. Otherwise, click Next.
- On the Account Management screen, select Enroll in Azure AD, then click Get Bulk Token. A sign-in dialog opens.
-
Enter your Azure AD tenant account name, then click Next.
-
If the account is recognized, the Knox Manage branding shows, and you're prompted for your account password. Enter the password for the Azure AD account, then click Sign in.
-
On the Stay signed in to all your apps screen, deselect Allow my organization to manage my device, then click No, sign in to this app only.
- Configure the settings on the Add applications and Add certificates screens as needed.
-
On the Finish screen, click Create to generate the PPKG file. After it generates, a link at the bottom of the screen shows you where the file is saved in your local storage.
The PPKG file is prepared and ready to be deployed to devices in your fleet.
Enroll a device with the provisioning package
These actions take place during a regular user session after the device has already been set up for personal use.
To enroll a device with the PPKG:
- Copy the PPKG file to the device, either physically through USB storage, a VPN, or other secure means.
- Have the device user open the PPKG file. A popup asks for verification.
-
If the PPKG appears genuine and trustworthy, the device user clicks Yes, add it. The PPKG enrolls the device.
After the PPKG finishes applying, the device is provisioned and enrolled through the Samsung Knox Management App.
Lastly, it's best if you ensure that the device is enrolled in your Knox Manage tenant:
- On the Knox Manage console, go to Device.
- Search for the user's device by its IMEI/MEID, serial number, or by their user name.
-
Check whether the device's status is Enrolled.