Deploying a Windows 365 Enterprise Cloud PC from Partner Success Core Benefits

May 21, 2026| Tags: Windows 365, Cloud PC, Microsoft 365, Intune

When I bought the Partner Success Core Benefits package, one of the benefits I wanted to use was the included Windows 365 Enterprise Cloud PC:

Windows 365 Enterprise
8 vCPU, 32 GB RAM, 512 GB storage

On paper that sounds simple: redeem the benefit, assign the license, create the Cloud PC, and connect. In practice, I learned that Windows 365 Enterprise has a few moving parts that all need to line up before the Cloud PC appears.

This is the flow I followed, including the licensing and Intune troubleshooting steps that mattered most.

Confirming the Benefit Was Included

I first checked whether the Windows 365 Cloud PC was actually part of my Partner Success Core Benefits package.

In Partner Center, I went to:

Benefits -> Cloud services

There I saw:

Windows 365 Enterprise
Partner Success Core Benefits
1 license
Not Redeemed

That confirmed the license was included, but it was not available yet. The important detail was the status: Not Redeemed.

I also had to separate the Cloud PC subscription from possible extra Azure costs. The included benefit covers the Windows 365 Cloud PC license itself, but extra costs can still happen when using advanced networking, such as Azure VNet integration, VPN, firewalls, or other Azure resources.

For this deployment, I chose the simplest route: Microsoft-hosted network. That avoided unnecessary Azure networking complexity.

Redeeming the Windows 365 Enterprise Benefit

The next step was redeeming the benefit in Partner Center:

Partner Center -> Benefits -> Cloud services -> Windows 365 Enterprise -> Redeem / Activate

Before redeeming it, the license was not assignable in Microsoft 365. After redemption, it became available in:

Microsoft 365 admin center -> Billing -> Licenses

and also under:

Users -> Active users -> selected user -> Licenses and apps

Assigning the Cloud PC License

I then assigned the Windows 365 license to my user:

Microsoft 365 admin center -> Users -> Active users -> Robert Knoester -> Licenses and apps

The license I assigned was:

Windows 365 Enterprise 8 vCPU, 32 GB, 512 GB

That part was correct, but it was not the full story. For Windows 365 Enterprise, assigning only the Cloud PC license is usually not enough.

The user also needs supporting rights for identity, device management, and Windows. In my case, the Partner Success Core Benefits package also included useful supporting products such as:

  • Microsoft 365 Business Premium (no Teams)
  • Microsoft Entra ID P2
  • Defender for Endpoint P2
  • Teams Enterprise
  • other Microsoft cloud services

The key distinction I had to keep in mind was this:

Office 365 E3 is not the same as Microsoft 365 Business Premium or Microsoft 365 E3.

Office 365 E3 gives productivity services like Office, Exchange, and SharePoint, but it does not automatically cover all Windows 365 Enterprise management requirements, such as Intune.

For my Cloud PC user, the practical recommendation was:

  • Windows 365 Enterprise 8 vCPU, 32 GB, 512 GB
  • Microsoft 365 Business Premium (no Teams)
  • Microsoft Entra ID P2, optional but useful because it was included

Fixing the Intune Access Problem

When I tried to access Intune, I ran into this Dutch error:

Niet gemachtigd
Kan het aantal apparaten per platform niet ophalen. Neem contact op met uw globale of Intune-beheerder.

In English, the meaning was roughly:

Not authorized.
Cannot retrieve the number of devices per platform. Contact your global or Intune administrator.

That told me my account existed and might even have admin permissions, but Intune did not yet authorize it to access Intune data.

At first, I looked at three possible causes:

  • My account did not have the right admin role.
  • My account did not have a license that included Intune.
  • I was signed in with a different account than the one receiving the licenses and roles.

That last point mattered because I was seeing different identities during the setup, including info@knoester-it.nl and Robert Knoester.

I separated the two roles in my head:

Purpose Requirement
Account managing Intune Needs Intune access and an admin role
Account receiving the Cloud PC Needs the Windows 365 license and supporting user licenses

The same account can do both, but if different accounts are used, each account has to be configured for its own purpose.

Checking the Admin Roles

In the Microsoft 365 admin center and Entra admin role screens, I confirmed that my account had:

  • Global Administrator
  • Intune Administrator

I also added:

  • Windows 365 Administrator

Strictly speaking, Global Administrator already gives broad control, but Windows 365 Administrator is the more specific role for managing Cloud PCs.

After that, I checked my Intune permissions again under:

Intune roles -> My permissions

The page confirmed:

U bent een beheerder met volledige machtigingen voor alle Microsoft Intune- en alle Cloud-pc-resources.

That meant I had full permissions for Intune and Cloud PC resources. At that point, the problem was no longer an admin role issue. The next step was to actually create the Windows 365 provisioning policy.

Understanding That a Cloud PC Does Not Start Like a VM

One thing I had to clarify for myself was that a Windows 365 Cloud PC does not start like a normal Azure virtual machine.

There is no simple “start VM” button at the beginning.

Instead, Windows 365 automatically provisions a Cloud PC when both of these are true:

  • A user has a valid Windows 365 license.
  • That same user is targeted by a Windows 365 provisioning policy in Intune.

So once licensing and permissions were fixed, the real deployment step was the provisioning policy.

Creating a Group for Assignment

Before creating the provisioning policy, I created a Microsoft Entra group:

Microsoft Entra admin center -> Groups -> New group

I used a clear group name:

W365-CloudPC-Users

Then I added the licensed Cloud PC user to that group.

This is a cleaner setup than targeting a single user directly, because Windows 365 provisioning policies are designed to target groups.

Creating the Provisioning Policy

The main deployment step happens in Intune:

Intune admin center -> Devices -> Provision Cloud PCs -> Provisioning policies -> Create policy

For my setup, I used this configuration:

Setting Value
Experience Access a full Cloud PC desktop
License type Enterprise
Join type Microsoft Entra join
Network Microsoft-hosted network
Region Closest available region, such as West Europe or North Europe
Image Windows 11 Enterprise + Microsoft 365 Apps
Assignment Group containing the Cloud PC user

The two most important choices were:

  • Microsoft Entra join
  • Microsoft-hosted network

That combination gave me the simplest modern deployment. I did not need my own Azure VNet, VPN, domain controller, or Azure Network Connection.

Enabling Microsoft Entra Single Sign-On

During the provisioning policy setup, I also saw this option:

Eenmalige aanmelding van Microsoft Entra gebruiken

In English:

Use Microsoft Entra single sign-on

I enabled it.

With single sign-on enabled, the sign-in experience is smoother. When I open the Cloud PC, I usually do not need to enter separate RDP or Windows credentials again. It uses the Microsoft Entra identity flow.

For this setup, the clean combination was:

Setting Choice
Join type Microsoft Entra join
Network Microsoft-hosted network
Single sign-on Enabled

Waiting for Provisioning

After creating and assigning the provisioning policy, Windows 365 started provisioning the Cloud PC automatically.

I could monitor the status here:

Intune admin center -> Devices -> Windows 365 -> All Cloud PCs

The status can show:

Status Meaning
Not provisioned The user has a license, but no provisioning policy applies yet
Provisioning The Cloud PC is being created
Provisioned The Cloud PC is ready to use
Failed Something went wrong and the error details need to be checked

The goal is simple:

Provisioned

Once that appears, the Cloud PC is ready.

Connecting to the Cloud PC

When provisioning is complete, I connect through:

https://windows365.microsoft.com

I sign in with the same user that received the Windows 365 license. From there, the Cloud PC appears as an available desktop.

I can open it directly in the browser or use the Windows App / Remote Desktop client.

My Final Checklist

This is the complete order I followed:

  1. I bought Partner Success Core Benefits.
  2. I went to Partner Center -> Benefits -> Cloud services.
  3. I redeemed Windows 365 Enterprise.
  4. I redeemed supporting benefits such as Microsoft 365 Business Premium and Entra ID P2.
  5. I went to Microsoft 365 admin center -> Users -> Active users.
  6. I assigned the Cloud PC user Windows 365 Enterprise, Microsoft 365 Business Premium, and optionally Entra ID P2.
  7. I made sure the admin account had Global Administrator, Intune Administrator, and preferably Windows 365 Administrator.
  8. I confirmed that Intune access worked.
  9. I created an Entra group such as W365-CloudPC-Users.
  10. I added the licensed Cloud PC user to that group.
  11. I went to Intune admin center -> Devices -> Provision Cloud PCs -> Provisioning policies.
  12. I created a provisioning policy with Enterprise, Microsoft Entra join, Microsoft-hosted network, and Windows 11 Enterprise + Microsoft 365 Apps.
  13. I assigned the policy to W365-CloudPC-Users.
  14. I enabled Microsoft Entra single sign-on.
  15. I waited for the Cloud PC to show as Provisioned.
  16. I opened https://windows365.microsoft.com and connected.

The Main Lesson

The biggest confusion was that three separate things had to be correct at the same time:

Area What must be true
Benefit redemption The Windows 365 benefit must be redeemed in Partner Center
Licensing The user must have Windows 365 and supporting licenses
Intune management The admin must have Intune and Cloud PC permissions

Once I fixed the Intune access issue and confirmed that I had full permissions for Intune and Cloud PC resources, the rest of the process became much clearer.

The Cloud PC did not need to be manually started. It needed the right license, the right supporting services, and a provisioning policy that targeted the right user.

SO WHAT YOU THINK ?

Let's Unlock the potential of your business with AI-supported automation.

Contact with me