Migration Prerequisites

Provisioning Package

Create, secure, and validate the bulk enrollment provisioning package with Windows Configuration Designer (WCD) for AD-to-Entra, Hybrid-to-Entra, and Tenant-to-Tenant migrations.

Provisioning Package Creation and Validation

Provisioning Package Preparation with Windows Configuration Designer

To facilitate device registration and migration, create a provisioning package by using Windows Configuration Designer (WCD).

Migration scenarioTenant used to create PPKG
AD-to-Entra or Hybrid-to-EntraTenant the device will join after migration
Tenant-to-TenantDestination target tenant

This ensures the device joins and enrolls into the intended Microsoft Entra ID and Intune environment during migration.

Treat the provisioning package (.ppkg) as a sensitive credential. It contains a bulk enrollment token that can join devices to the configured Microsoft Entra tenant. Store it only in approved secure storage, restrict access to migration administrators, and do not email it, share it through chat, or commit it to source control.


Step 1 - Download Windows Configuration Designer

Download and install Windows Configuration Designer from the Microsoft Store.

The Microsoft Store must be accessible on the PC used to create the provisioning package. This is usually a one-time setup completed on an IT administrator workstation.

Windows Configuration Designer in Microsoft Store


Step 2 - Launch Windows Configuration Designer

Open the Start menu and launch Windows Configuration Designer.

Launch Windows Configuration Designer


Step 3 - Create a New Project

  1. In the WCD home screen, select Provision desktop devices under the Create menu.
  2. In the New project dialog:
    • Enter a name for your provisioning package.
    • Select the project path.
    • Click Finish.

Create New WCD Project


Step 4 - Configure Device Settings

  1. Under Set up device, define a naming template for your PCs, for example IT-{SERIAL}.
  2. Click Next.

Set Up Device - Naming Template

  1. In Set up network, toggle Connect device to a Wi-Fi network to Off.
  2. Click Next.

Set Up Network - Wi-Fi Off


Step 5 - Enroll with Bulk Microsoft Entra Token

  1. Under Account Management, do the following:
    • Choose Enroll in Azure AD under Manage organization/school accounts.
    • Toggle Refresh AAD credentials to Yes.

Windows Configuration Designer may still display legacy labels such as Azure AD or AAD. These labels refer to Microsoft Entra ID.

Use the appropriate Microsoft Entra account based on your migration scenario:

  • AD-to-Entra or Hybrid-to-Entra migration: Sign in with an account from the tenant the device will join after migration.
  • Tenant-to-Tenant migration: Sign in with an account from the destination target tenant.

Account Management - Enroll in Azure AD

  1. Click Get Bulk Token and sign in with an account permitted to create a bulk enrollment token and grant the required consent. Global Administrator is commonly used for this step.

Get Bulk Token

  1. If this is your first time using WCD:
    • You will see a permissions consent screen.
    • Click Consent on behalf of your organization.
    • Click Accept.

Consent Screen

  1. Confirm that the bulk token was fetched successfully.

Bulk Token Fetched Successfully

Bulk enrollment tokens have a maximum validity of 180 days. Plan migration waves so all devices using this package complete migration before the token expires.

The bulk enrollment flow does not support interactive MFA during device provisioning. Ensure Conditional Access policies do not block the package account or device registration flow.


Step 6 - Complete the Package

  1. Skip the Add applications and Add certificates screens by clicking Next.
  2. On the Summary screen, verify all configuration details.

If you need to retain the existing computer name after migration, remove the DNSComputerName setting before exporting the final package.

  1. Click Create.
  2. After creation, WCD displays the file path to the generated .ppkg file.

Provisioning Package Created


Step 7 - Optional: Remove Computer Name from Package

If you need to retain the existing computer name after migration:

  1. In WCD, click Switch to advanced editor.

Switch to Advanced Editor

  1. Search for the Computer name object.
  2. On the right-hand side panel, under Runtime settings > Identification, select DNSComputerName.
  3. Click Remove.

Remove DNSComputerName

  1. The computer name setting is now excluded from the package.

Computer Name Removed


Step 8 - Export the Final Provisioning Package

  1. Click Export > Provisioning package.

Export Provisioning Package

  1. Enter a file name, then click Next.

Name Provisioning Package

  1. Leave security settings as default, then click Next.

Provisioning Package Security Settings

  1. Choose the destination folder, then click Next.

Choose Destination Folder

  1. Click Build.

Build Provisioning Package

  1. Confirm that the provisioning package was saved successfully and note the file location.

Provisioning Package Saved Confirmation

After export, move the .ppkg to approved secure storage. Restrict access to migration administrators only. Do not store the package in a public share, ticket attachment, email, or unmanaged endpoint folder.


Validate the Provisioning Package

Before using the provisioning package in production or uploading it to the Opsole Migrate portal, validate the .ppkg on a test device to confirm that it correctly joins the device to Microsoft Entra ID.

This validation confirms that the provisioning package configuration is correct and helps prevent avoidable failures during production migration waves.

Step 1 - Prepare a Test Device

  • Build or use a non-production test device.
  • Ensure the test device is standalone and not joined to Microsoft Entra ID or an Active Directory domain.
  • Confirm the device has network access to Microsoft Entra ID and Intune endpoints.

Step 2 - Verify Current Join Status

On the test device, open Command Prompt or PowerShell and run:

dsregcmd /status

Confirm the device is not already joined:

AzureAdJoined : NO
DomainJoined  : NO

Bulk Token Fetched Successfully

Step 3 - Apply the Provisioning Package

  • Copy the generated .ppkg file to a dedicated folder on the test device.
  • Right-click the .ppkg file and select Run as administrator, or double-click the file if prompted for elevation.
  • When prompted, select Yes, add it.

Bulk Token Fetched Successfully

This applies the provisioning configuration to the device.

Step 4 - Verify Microsoft Entra Join Status

After the provisioning package completes:

  1. Open Command Prompt or PowerShell and run:

    dsregcmd /status
  2. Confirm the device is Microsoft Entra joined:

    AzureAdJoined : YES
  3. Sign in to the Microsoft Entra admin center and confirm the device appears under Devices > All devices.

  4. Verify that the device shows as Microsoft Entra joined.

  5. If Intune automatic enrollment is expected, confirm the device also appears in the Intune admin center as an enrolled Windows device.

Successful validation confirms that the provisioning package is correctly configured and ready for use in migration activities.

After validation, remove or reset the test device according to your lab process so the test object does not remain in production Microsoft Entra ID or Intune inventory.

Do not upload or use the package in Opsole Migrate until validation succeeds. If validation fails, check tenant selection, token expiry, Conditional Access, MFA/device registration settings, Intune enrollment scope, Windows enrollment restrictions, network connectivity, and EDR/AV controls.


Next Steps

How is this guide?