Nov 18 2020 02:32 AM
Nov 18 2020 03:21 AM
SolutionHey @Busto445,
for user-driven Autopilot deployments there is no need for a TPM (but you may have other features like you said, BitLocker etc. which require one). For the Autopilot self-deploying scenario there is a dependency to a TPM 2.0 with device attestation, as the device needs to authenticate during the early phase, see here:
Windows Autopilot Self-Deploying mode | Microsoft Docs
Self-deploying mode uses a device’s TPM 2.0 hardware to authenticate the device into an organization’s Azure AD tenant. Therefore, devices without TPM 2.0 can't be used with this mode. Devices must also support TPM device attestation. All new Windows devices should meet these requirements. The TPM attestation process also requires access to a set of HTTPS URLs that are unique for each TPM provider. For more information, see the entry for Autopilot self-Deploying mode and Autopilot pre-provisioning in Networking requirements.
Important
If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Window 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. Since Windows 10 Enterprise 2019 LTSC is based on Windows 10 version 1809, self-deploying mode is also not supported on Windows 10 Enterprise 2019 LTSC. See Windows Autopilot known issues to review other known errors and solutions.
best,
Oliver
Nov 19 2020 01:45 PM