Hello Greg, I am Henry and I want to help you with your concern.
When a PC is signed in with a work or school account, it can become associated with an organization through Microsoft Entra. A standard Windows reset removes local data, but it does not always remove the device from the organization’s tenant. If the same work or school email is used again during setup, Windows may automatically reconnect the device — which is why the Azure/organization account appears again after the reset.
This behavior is directly related to the email used during configuration. If that address belongs to a work or school tenant, Windows treats it as an organizational identity and may re-establish the association. The reference documents list below also offer further clarification:
- Microsoft documentation explaining device registration and join states: How devices get joined to Microsoft Entra ID: https://learn.microsoft.com/en-us/entra/identity/devices/concept-device-registration
- Manage device identities in Microsoft Entra ID (including removing devices from the tenant): https://learn.microsoft.com/en-us/entra/identity/devices/manage-device-identities
If this is your personal PC and you do not want it linked to an organization, set it up using a local account or a personal Microsoft account only, and avoid signing in with the work or school email during initial configuration. If the device was previously enrolled by an organization, it may need to be removed from the tenant by the administrator before the association fully stops.
The presence of an admin account does not by itself block peer-to-peer networking; however, device management policies applied through organizational enrollment can affect sharing and network visibility.
I hope you’ll give my recommendation a try and let me know how it goes and if this answer helps, feel free to hit “Accept Answer” so others can benefit too.