What is ztdid intune

Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.

Last updated: April 2, 2026

Quick Answer: ZTDID (Zero Touch Device ID) is a unique globally unique identifier (GUID) generated by Microsoft's Azure AD Device Registration Service for devices enrolled through Windows Autopilot in Intune. This randomly generated identifier is stamped on the Azure AD device object and serves as a permanent link between a physical device and its digital identity in Microsoft Entra ID. ZTDID enables administrators to create dynamic device groups for targeting configurations, applications, and policies specifically to Autopilot-enrolled devices. Each device enrollment generates a distinct ZTDID that remains constant throughout the device's lifecycle, distinguishing it from the hardware ID (HWID), which can remain consistent across multiple re-enrollments.

Key Facts

Overview of ZTDID in Intune

ZTDID stands for Zero Touch Device ID, where "ZTD" is Microsoft's internal codename for Windows Autopilot technology. It represents a fundamental component of Microsoft's modern device management approach, enabling organizations to deploy Windows devices with minimal manual intervention. When a device is registered with Windows Autopilot through Intune, Microsoft's Device Registration Service automatically generates a unique ZTDID and stamps it onto the corresponding Azure AD device object. This identifier serves as a permanent bridge between the physical hardware and its digital representation in Microsoft Entra ID (formerly Azure Active Directory), creating a secure and traceable enrollment pathway that persists throughout the device's entire lifecycle in the organization.

How ZTDID Works in the Autopilot Process

The ZTDID creation process begins when a device's hardware ID is imported into Intune or registered through Autopilot. The Azure AD Device Registration Service (DRS) intercepts this registration and pre-creates an Azure AD device object, simultaneously generating and attaching a unique ZTDID to that object. This ZTDID is stored in the device's devicePhysicalIDs attribute within Microsoft Entra ID, making it queryable and usable for administrative purposes. Unlike the hardware ID, which is derived from physical device characteristics such as MAC addresses, disk serial numbers, and other hardware identifiers, the ZTDID is purely a software-generated identifier that has no relationship to the device's physical components. This distinction is critical because it means that if you delete a device from Autopilot and re-import it using a CSV file, the device will receive an entirely new ZTDID, while its HWID will remain unchanged. This behavior allows administrators to distinguish between devices that have been re-enrolled versus devices that have maintained continuous enrollment status.

Once a ZTDID is assigned, it becomes the authoritative identifier for targeting that specific device within the Microsoft Entra ecosystem. Administrators can reference this identifier in dynamic device group rules, compliance policies, deployment profiles, and conditional access policies. The ZTDID format follows the pattern [ZTDid]:GUID-VALUE, where GUID-VALUE is the specific randomly generated identifier for that device. This standardized format enables consistent querying across organizational directories and ensures that device targeting rules remain functional even when device names change or other attributes are modified.

ZTDID-Based Dynamic Device Groups

One of the most practical applications of ZTDID is the creation of dynamic device groups specifically containing Autopilot-enrolled devices. Organizations typically use the query rule: (device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]")) to automatically populate a group with all devices that possess a ZTDID. This simple but powerful query ensures that any device enrolled through Autopilot is automatically added to this group without requiring manual administrative intervention. These dynamic groups serve as the foundation for segmented management, allowing IT administrators to create distinct deployment policies for Autopilot devices versus traditionally enrolled or manually registered devices. For example, an organization might apply aggressive security baselines to Autopilot devices during their initial deployment phase, knowing that these devices have followed a controlled provisioning pathway. Alternatively, organizations can create more granular device groups by combining ZTDID queries with other device attributes, such as device type, operating system version, or organizational unit membership, enabling highly targeted policy deployment strategies.

The scalability advantages of ZTDID-based groups cannot be overstated. Rather than manually managing a list of device names or serial numbers that might number in the thousands or tens of thousands, administrators can rely on a simple query rule that automatically captures all Autopilot devices. This approach eliminates the synchronization challenges that arise when device names change or when devices are transferred between departments. As organizations grow and deploy Windows Autopilot across multiple business units, subsidiaries, and international locations, the ability to target devices based on their enrollment method becomes increasingly valuable. A global organization deploying 10,000 devices across 50 countries can immediately ensure that all devices receive standardized security configurations, language packs, and productivity applications simply by being part of a ZTDID-based dynamic group.

ZTDID vs. Hardware ID (HWID)

A common point of confusion in Autopilot administration involves the distinction between ZTDID and HWID (Hardware ID). While both identifiers play critical roles in the Autopilot enrollment process, they serve fundamentally different purposes and exhibit different behaviors during device lifecycle events. The Hardware ID is derived from physical device characteristics—specifically, a hash of the device's MAC address, disk serial number, and other immutable hardware properties. Because HWID is based on physical characteristics, it remains constant throughout the device's entire operational life. Even if you remove a device from Autopilot, perform a complete Windows reinstallation, or transfer the device to another organization, the HWID will remain identical.

Conversely, ZTDID is a software-generated identifier created specifically for each Autopilot enrollment event. If a device is deleted from Autopilot and subsequently re-imported through a CSV file, the Device Registration Service will generate an entirely new ZTDID for that device. This behavior creates a clear audit trail and allows administrators to distinguish between devices that have undergone multiple enrollment cycles versus devices that have maintained continuous enrollment. Some organizations leverage this characteristic intentionally, using HWID continuity to track device hardware lifecycles while using ZTDID to track enrollment or ownership transitions. This dual-identifier approach provides flexibility for organizations that manage complex device scenarios, such as corporate device refresh programs where the same hardware might be re-enrolled multiple times over a five-year hardware lifecycle.

Common Misconceptions About ZTDID

A widespread misconception holds that ZTDID is derived from or based upon the device's hardware characteristics. In reality, ZTDID is a randomly generated GUID with no mathematical or logical relationship to the device's physical components. This misunderstanding sometimes leads administrators to assume that a device with the same hardware will receive the same ZTDID if re-enrolled, which is incorrect. The randomness of ZTDID generation is intentional, designed to prevent any possibility of identifier collision or predictability that might compromise device security.

Another common misunderstanding involves the permanence of ZTDID. While administrators often assume that ZTDID, once assigned, will remain attached to a device indefinitely, this is only true if the device maintains its enrollment status within Autopilot. The moment a device is removed from Autopilot, its ZTDID is effectively invalidated in the context of Autopilot targeting. If the device is later re-enrolled, a new ZTDID will be generated. This behavior differs significantly from Azure AD device registration, where other device identifiers might persist even after Autopilot-specific attributes are removed.

A third misconception suggests that all Azure AD-joined devices possess a ZTDID. This is incorrect. Only devices that have been registered through Windows Autopilot or that were pre-created through the Windows Autopilot device pre-registration process will have a ZTDID. Devices that are manually joined to Azure AD through traditional methods, bulk registration, or third-party tools will not have a ZTDID, even though they may have other device identifiers. This distinction is crucial for administrators designing device group strategies, as attempts to target non-Autopilot devices using ZTDID queries will return empty results.

Practical Considerations and Implementation

Organizations implementing Windows Autopilot should incorporate ZTDID-based device grouping as a foundational element of their device management strategy. Creating a broad dynamic group of all Autopilot devices provides a baseline for applying consistent policies across your managed device population. Many organizations establish multiple ZTDID-based groups with increasing levels of specificity: a master group containing all Autopilot devices, sub-groups for specific departments or business units, and highly granular groups for specialized use cases such as executive devices, development machines, or contractor-managed equipment.

When designing compliance policies and security baselines, administrators should consider that Autopilot devices have followed a controlled deployment pathway. This enables more aggressive security configurations compared to devices enrolled through alternative methods. For instance, an organization might require Windows Defender Antimalware Service Executable to run at higher priority levels on Autopilot devices, enforce BitLocker encryption with 256-bit AES cipher strength, and mandate UEFI Secure Boot with measured boot functionality specifically for ZTDID-tagged devices. For non-Autopilot devices, these requirements might be relaxed to accommodate legacy hardware or compatibility constraints.

Documentation of ZTDID values for specific devices is often valuable during troubleshooting scenarios. If an administrator needs to determine why a particular device is or is not receiving certain policies, querying the device object in Microsoft Entra ID to verify the presence of a ZTDID in the devicePhysicalIDs attribute provides definitive confirmation of Autopilot enrollment status. This verification process can be performed through the Microsoft Entra Admin Center, PowerShell scripts, or third-party device management tools that expose Azure AD attributes. Organizations should maintain clear documentation linking device names, asset tags, and ZTDID values, particularly for high-value or critical infrastructure devices.

Related Questions

How do I create a dynamic device group using ZTDID in Intune?

Navigate to Microsoft Entra Admin Center, select Dynamic groups, create a new group with device type, and use the query rule: (device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]")). This automatically populates the group with all Autopilot-enrolled devices. The group updates in real-time as new devices enroll through Autopilot, typically within 15-20 minutes of enrollment completion. You can then assign policies, applications, and compliance rules to this group through Intune.

Why does my device have a different ZTDID after re-enrollment in Autopilot?

Each Autopilot enrollment generates a new ZTDID through the Azure AD Device Registration Service (DRS). When you delete a device from Autopilot and re-import it via CSV, the DRS creates a fresh device object with a newly generated GUID-based ZTDID. The Hardware ID (HWID) remains constant across these re-enrollments because it's derived from physical device characteristics, but ZTDID is always randomly regenerated for each Autopilot enrollment cycle.

Can I use ZTDID to identify devices in PowerShell or Microsoft Graph queries?

Yes, you can query Azure AD using PowerShell to retrieve devices with specific ZTDID values. Use commands like Get-MgDevice with filters targeting the devicePhysicalIds property that contains "[ZTDid]:GUID-VALUE". Microsoft Graph API also supports querying devices based on devicePhysicalIds attributes, allowing you to programmatically retrieve lists of Autopilot-enrolled devices for auditing, reporting, or automated policy assignment purposes.

What is the relationship between ZTDID and Windows Autopilot deployment profiles?

ZTDID enables targeting of Autopilot deployment profiles to specific device groups. You can create deployment profiles and assign them to dynamic groups filtered by ZTDID, ensuring consistent provisioning experiences across defined device sets. For example, you might create a "Sales Devices" profile assigned to a ZTDID-based group containing only Autopilot devices from your sales department, guaranteeing that these devices receive sales-specific applications, language settings, and configurations during deployment.

Is ZTDID visible in Windows Device Manager or Settings on the actual device?

ZTDID is not directly visible to end users through standard Windows interfaces like Device Manager or Settings, as it exists solely within the Azure AD cloud infrastructure. IT administrators can view ZTDID values in the Microsoft Entra Admin Center by examining the device object's devicePhysicalIds attribute. Some third-party endpoint management tools may also expose ZTDID information in their dashboards, though this requires integration with Microsoft Graph or Azure AD APIs.

Sources

  1. Create device groups for Windows Autopilot - Microsoft LearnCC-BY-SA
  2. Windows Autopilot Behind The Scenes Top Secrets - Anoop C NairBlog
  3. Create a device group - Microsoft LearnCC-BY-SA
  4. What About Autopilot Dynamic Device Groups - Mauvlan's RamblingsBlog

Missing an answer?

Suggest a question and we'll generate an answer for it.