IT Pro: Unattended deployment for Entra ID-joined computer via MS Intune (Legacy)

Legacy Client Compatibility

The Legacy Xink client supports Azure AD-joined machines and only updates signatures in Classic Outlook.
If you're using New Outlook, Web Outlook, or Mobile Outlook, please refer to our cross-platform signature deployment guide, which also updates Classic Outlook email signatures.

Pre-requisites:

  • Only joined devices are supported, not linked work accounts.
  • The login email must match the employee record in Xink (e.g., if a user logs in with john.doe@xink.io, there must be a corresponding employee entry in Xink).

How to Install

  1. In the Xink Web Admin, go to Preferences > Download tab. Download IT: Download Xink Client (.MSI Package).

    Download MSI package
  2. Generate a Domain Authentication Token (if you haven't already). Use the copy icon to grab the full token—it may be longer than what appears on screen.

    Copy token
  3. Install or deploy the XinkClientSetupAD.msi using your preferred software deployment tool.

    Ensure the Xink Token ID is applied to the computer's registry:

    Registry Path: HKLM:\SOFTWARE\Policies\Xink\Xink Client AD\ADConfig

SCCM Deployment

If you're using SCCM, you can deploy the MSI and write the registry keys without using GPO. See this KB article for guidance.

NOTE

Reboot the target PCs after deployment to complete installation.

Intune Deployment

Refer to Microsoft’s documentation for deploying apps via Intune: https://docs.microsoft.com/en-us/intune/lob-apps-windows

  1. Add the XinkClientSetupAD.msi as a Line-of-Business (LOB) app.

    Add MSI to Intune
  2. In the App Information section, use the following command-line argument:
    DomainAuthToken=YOUR_TOKEN /qn (For silent installation)

    App info example

    If there's a mismatch between UPN and SMTP, append: USEOUTLOOKPROFILENAMEASEMAIL=True

    UPN/SMTP switch
  3. Configure assignment (user or device groups), then click Review + Save.

    Deployment screen

    Click Create to begin deployment. Allow several hours for replication.

    Final step in Intune
  4. Verify installation success on Azure AD or Hybrid-Joined devices:
    • Check Programs and Features for "Xink AD Client".
    • Confirm DomainAuthToken registry key is present.
    • On next login, emsclient.exe runs, updating signatures to the user's profile folder.
      Registry entry verification

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.
Quick 1-on-1 Demo | Ⓒ 2025 Xink