AutoPilot Tool – Upload HW hash with a user interface

Download from GitHub:
https://github.com/NicklasAhlberg/AutoPilotTool

.Version 1.0.2.5
– It is now possible to add a default tag to the config-file

.Version 1.0.2.4
– Slightly new graphical interface
– Optional: It is now possible to add a group tag!
– Use the gather logs button to get autopilot logs as a CAB-file

2021-08-17
.Version 1.0.2.3
It is now possible to set a default domain name. Get the latest version (1.0.2.3) from GitHub and you will find “config.txt” – edit as per your need. Thanks Dylan Brown for the idea!

Example:

.Version 1.0.2.2
It is now possible to use a custom logo. Place “logo.png” in the same directory as the .exe
Recommended logo size: 210×110 px

If you have been working with Windows Autopilot you know that manual upload of the hardware hash is a repetitive and time consuming task.

This tool will make your life easier by…

  • Install the necessary PowerShell modules
  • Connect to the tenant (MFA is supported)
  • Import the hardware hash.csv-file to the tenant
  • Run a sync

…. directly from the device!

No more need to struggle to manually get, move and import the csv-file from another device. All you need to do is run the tool (Shift+F10 when you get to pick your keyboard layout), start Autopilot Tool and sign in to Azure (when you get prompted) with an administrative user. This works well with MFA!

Instructions

  1. Put “Autopilot Tool.exe”, “Logo.png” and “config.txt” in same directory on either a USB-stick or on a network location
  2. Press Shift+F10 when you are at the “pick your keyboard layout” screen
  3. Navigate to “Autopilot Tool.exe”, press Enter to start the tool
  4. Change yourDomain.onmicrosoft.com to your specific need
  5. Update: it is now possible to edit config.txt to add a default domain and tag
  6. Optional: add a group tag
  7. Press the OK-button
  8. Sign-on with an Intune Administrator account (or similar) when prompted
  9. The HW hash has now been uploaded and will be visible in the Windows Autopilot service
  10. Update: press “Gather Logs” to create a CAB-file with all autopilot logs. Use this to troubleshoot the autopilot deployment

Download the tool from Github:
https://github.com/NicklasAhlberg/AutoPilotTool

This is a UI to Nickolaj Andersens script found at: https://github.com/MSEndpointMgr/Intune/blob/master/Autopilot/Upload-WindowsAutopilotDeviceInfo.ps1

Windows 10 versionSupported
21H1OK
20H2OK
2004OK
1909OK
1903OK

8 thoughts on “AutoPilot Tool – Upload HW hash with a user interface

  1. Is the administrative user you are saying in azure or just in the local admin? Thanks

    1. Hello,
      The administrative user is an Azure identity with Intune Admin privileges or similar. Thanks for your question I have updated the info text.

  2. Is it possible to exchange your logo for that of our company for internal use?

    It might be nicer for the users. Otherwise, your tool is gigantically good. Many thanks

    1. That is fully possible with latest version
      Thanks for the feedback! 🙂

      best regards

      Nicklas

  3. A handy version of this would be for a (remote) end user to run, then automatically launching the default mail client with the hash CSV file as an attachment for forwarding to IT for importing.

    1. Hi Jörn, Thanks for reaching out. That is a good idea for a future version 👍

      Regards

      //Nicklas

  4. What permissions/apps is this needing to contact? I have bypassed “microsoft intune powershell” application in my CA policies however I’m still being blocked. We require MFA AND hybrid join from global admin accounts, and despite excluding the app, these rules are still triggering on “microsoft intune powershell” despite being excluded.

    1. Hi Jason,

      The users running the tool should be “Intune admin” or similar. If your CA requires the device to be hybrid joined it will not work to you run it on a device before it has ben provisioned by Windows Autopilot, as the device is not hybrid joined at that point.

      //Nicklas

Leave a Reply

Your email address will not be published.