Learn about Zero Trust Architecture
Impenetrable cybersecurity without sacrificing usability
Gain detailed visibility into all your endpoints activities
Harden applications and hardware environments
Immediate and continuous response to incidents
Close the window of time your data could be exposed
Get your Comodo solutions setup, deployed or optimized
Control access to malicious websites
Defend from any internet based threats
Stop email threats before it enters your inbox
Preserve and protect your sensitive data
Keep your website running fast and malware free
Add encryption to your websites
Automated certificate mgmt. platform
Secure private intranet environments
Digital signature solutions for cloud apps
Encrypt emails for senders and recipients
Stay compliant with PCI DSS
Trusted authentication for IoT devices
Francisco Partners a leading technology-focused private equity fund, has acquired a majority stake in Comodo’s certificate authority business. Newly renamed from Comodo CA Limited to Sectigo Limited. Privacy Policies, Trademarks, Patents and Terms & Conditions are available on Sectigo Limited’s web site.
Meet the people behind the direction for Comodo
Get the latest news about Comodo
People are the key to achievement and prosperity
Stay up to date with our on-demand webinars
Worldwide: Sales, Support and General Inquiries
Schedule a live demonstration of our solutions
Need immediate help? Call 1-888-551-1531
Instantly removes viruses to keep your PC virus free
Experience true mobile security on your mobile apple devices
Secure Internet Browser based on Chrome
Chrome browser internet security extension
Submit a ticket to our support team
Share any product bugs or security flaws
Collaborate with research experts on data sets
Valkyrie Threat Intelligence Plugins
Valkyrie Threat Intelligence APIs
If you’re struggling to figure out how to keep a laptop from reenrolling in MDM, you’re not alone. Many IT teams, cybersecurity pros, and even business owners face the same issue—especially when dealing with previously enrolled corporate devices. Whether you’re wiping a machine for reuse, repurposing hardware, or preventing unauthorized MDM policies from returning, forced automatic MDM enrollment can feel like a never-ending loop.
In the first few minutes of powering on the device, it can mysteriously re-add itself to your company’s MDM platform. Why does this happen? And more importantly—how do you stop it?
This article breaks down everything you need to know, in a simple, actionable, and human-readable way.
Before you stop MDM from coming back, it helps to understand why it happens in the first place. Mobile Device Management (MDM) platforms like Intune, Jamf, Workspace ONE, or MobileIron are designed to enforce compliance—even after a system reset.
Many organizations configure:
These mechanisms exist to protect business data. However, when devices are decommissioned, resold, reassigned, or repurposed, they often need MDM fully removed.
If not done properly, the MDM profile reappears instantly—forcing your hand and re-locking the device.
To learn how to keep a laptop from reenrolling in MDM, you should first identify which mechanism is pulling the device back into the management system.
Here are the most common triggers:
If the device identity still exists in Azure Active Directory, rejoining or signing in can trigger automatic MDM enrollment.
Autopilot hardware hashes stored in Intune will force re-registration immediately after the device connects to the internet.
Any Mac serial number tied to ABM will auto-enroll into MDM immediately after first boot.
A previously enrolled device might retain:
Some corporate Wi-Fi networks automatically push enrollment commands when connecting.
Once you identify the trigger, stopping automatic re-enrollment becomes much easier.
Below are practical steps for IT managers and cybersecurity teams who want to prevent automatic re-enrollment. These methods apply to both Windows 10/11 and macOS.
Windows devices are most likely tied to these systems:
Follow the steps below to break the automatic link.
This prevents Azure from recognizing the device when a user logs in.
This breaks the MDM management relationship.
Autopilot is the #1 reason Windows laptops re-enroll automatically.
You must delete:
If the hardware ID lives in Autopilot, the device will always re-enroll, no matter how many times you reset it.
Use this method when you want to wipe the laptop clean without connecting to corporate systems.
This prevents Autopilot or Azure from triggering enrollment mid-setup.
Use with caution — corporate devices may prohibit editing the registry.
Navigate to:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\MDM
Set:
AutoEnrollMDM = 0
This stops Windows from automatically enrolling via GPO or Azure AD join.
MacBooks often auto-enroll because they are still inside Apple Business Manager (ABM) or still linked to Automated Device Enrollment (DEP).
This is the most strict version of forced MDM, and macOS will always re-apply the profile unless removed correctly.
Important: This action is permanent and cannot be undone.
In your MDM dashboard:
This ensures the MDM server no longer pushes enrollment commands.
To stop automatic enrollment:
If Wi-Fi is enabled during setup, macOS immediately checks ABM and triggers enrollment.
On previously enrolled Macs, residual certificates cause re-enrollment.
Delete:
/var/db/ConfigurationProfiles/*
/Library/Managed Preferences/*
/Library/Application Support/*MDM*
This ensures macOS doesn’t validate old MDM tokens.
When learning how to keep a laptop from reenrolling in MDM, it’s essential to stay compliant.
Unauthorized removal can violate organizational and regulatory policies.
If you want to avoid re-enrollment problems long-term, implement these recommendations.
Every decommissioned device should go through a checklist:
MDM auto-enrollment failures often stem from outdated device records.
Be sure to update:
Device identity is just as important as user identity.
Maintain:
Well-maintained identity management prevents phantom re-enrollments.
Sometimes, even after you delete everything, the device still re-enrolls.
Common reasons include:
Azure and Intune may take 10–30 minutes to propagate deletions.
Even one leftover hash triggers instant re-enrollment.
Until removed from Apple Business Manager, it will re-enroll forever.
Any enterprise SSID with automatic MDM enforcement can reapply it.
Tokens can survive resets unless wiped manually.
This section is for IT professionals managing dozens or hundreds of devices.
Get-AutopilotDevice | Remove-AutopilotDevice
These methods often solve stubborn re-enrollment loops.
Yes—if you own the device and have permission from your organization. Removing MDM from corporate-owned assets without approval is prohibited.
Because it is still linked to Autopilot, ABM, or Azure AD. Until you delete it from those systems, it will re-enroll every time.
Yes—once removed from Azure/Autopilot/ABM and wiped offline, the device stops re-enrolling.
Not if the device is linked to automated enrollment systems such as Apple DEP or Windows Autopilot.
Some MDM platforms require a wipe to finalize unenrollment. This varies by system.
Stopping a laptop from automatically re-enrolling in MDM requires understanding the triggers behind:
Once you remove these enrollment anchors and reinstall the operating system offline, you gain full control of the device again. For IT teams, this process strengthens operational efficiency, security posture, and asset management hygiene.
If you’re looking for a stronger and more modern endpoint security platform that complements this process, consider exploring solutions designed for enterprise-grade protection.
Start your free trial now
Sign up to our cyber security newsletter
Comodo Cybersecurity would like to keep in touch with you about cybersecurity issues, as well as products and services available. Please sign up to receive occasional communications. As a cybersecurity company, we take your privacy and security very seriously and have strong safeguards in place to protect your information.
agreecheck
See how your organization scores against cybersecurity threats
Advanced Endpoint Protection, Endpoint Detection and Response Built On Zero Trust Architecture available on our SaaS EPP