Intune Stuff | The Community place for Microsoft Intune, Intune Suite, Autopilot, macOS Management, Copilot for Security.

How to setup Windows Autopatch and enable Hotpatch – The Complete Step by Step guide

by | Jul 30, 2025 | Autopatch, Device Management, Featured Post, Hotpatch, Intune, MDM, Microsoft, Most Popular, News, Top Stories | 8 comments

Hi Community,

We are almost at the ending of a great year filled with new and cool features all across the Microsoft cloud ecosystem. After Microsoft Ignite this year a lot of new Intune features where announced. Windows Autopatch is not new however the Hotpatch feature is a game changer in the Windows Update landscape.

I saw some older blogs regarding Windows Autopatch and I noticed that the settings to setup and manage the feature are changed. With this in mind i decided to write a blog post on these 2 features. In this blog i will explain how to setup everything and all details you need to know to get started.

Let’s dive in!

 

IMPORTANT CHANGE 11/02/2025

Windows Autopatch will cease to deploy and configure the Windows Data Diagnostics policy. Previously, as part of the Autopatch feature activation process, Windows Autopatch deployed a policy named Windows Autopatch – Data collection which set the Windows diagnostics data collection level to Optional for managed devices.

You will be able to configure and maintain the Windows Diagnostics Data level policy in your environment. As part of the ongoing service maintenance Windows Autopatch will remove the Windows Autopatch Data collection policy from tenants starting March 03, 2025, Pacific Standard Time. This change will be completed in 2 weeks.

 

Action required: Create and deploy a Windows Diagnostic data collection policy with at least the recommended minimum setting to all Autopatch devices prior to this change. You may see missing Client State and Client Substate values if your devices are not configured with the recommended Windows Diagnostics settings and level. Alternatively, you may already be covered with existing data collection policies in your environment.

 

TIP1: You may want to consider using the Windows Autopatch – Devices All group which contains all of the active, registered devices presently in your Autopatch implementation across any and all Autopatch Groups. This is a service-managed group (subject to changes at any time). Not Registered devices will not appear in this Entra group.

TIP2: If you already have a data collection policy in place, make sure that there aren’t any conflicting settings.

TIP3: If you create the new policy make sure to remove the assignements from the “old” policy and assing the new policy to avoid conflicts.

My fellow MVP Ugur Koc made me aware of this change, check out his blog site here

 

Solution: Create a new policy by March 3 to avoid disruptions on your Autopatch configuration. Folow the steps below to create the correct policy.

You can find this message in the Microsoft 365 Message Center, message ID: MC996580

 

 

 

Create the new Data Collection Policy

In the Intune portal go to Devices – Windows – Configuration – Create – New Policy – Platform: Windows 10 and later – Profile type: Settings catalog – Create.

Name your policy and give it a description if you want, e.g. Click next.

Autopatch

 

Now for the settings, click Add settings, take over the settings from the screen shot. Do not select Allow telemetry (user) this policy is being scoped on a device group.

 

Autopatch

 

Assign this policy to the Windows Autopatch – Devices All group.

And that is it, you are now ready for the change.

 

 

What is Windows Autopatch?

Windows Autopatch is a cloud service that automates Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams updates to improve security and productivity across your organization.

 

Rather than maintaining complex digital infrastructure, businesses want to focus on what makes them unique and successful. Windows Autopatch offers a solution to some of the challenges facing businesses and their people today:

  • Close the security gap: Windows Autopatch keeps software current, there are fewer vulnerabilities and threats to your devices.
  • Close the productivity gap: Windows Autopatch adopts features as they’re made available. End users get the latest tools to amplify their collaboration and work.
  • Optimize your IT admin resources: Windows Autopatch automates routine endpoint updates. IT pros have more time to create value.
  • On-premises infrastructure: Transitioning to the world of software as a service (SaaS) allows you to minimize your investment in on-premises hardware since updates are delivered from the cloud.
  • Onboard new services: Windows Autopatch makes it easy to enroll and minimizes the time required from your IT Admins to get started.
  • Minimize end user disruption: Windows Autopatch releases updates in sequential deployment rings, and responding to reliability and compatibility signals, user disruptions due to updates are minimized.
  • Windows Autopatch helps you minimize the involvement of your scarce IT resources in the planning and deployment of updates for Windows, Microsoft 365 Apps, Microsoft Edge, or Teams. Windows Autopatch uses careful rollout sequences and communicates with you throughout the release, allowing your IT Admins can focus on other activities and tasks.

 

Below is a list of what Autopatch will be responsible for updating:

  • Windows 10 and Windows 11 quality updates
  • Windows 10 and 11 features
  • Windows 10 and 11 drivers
  • Windows 10 and 11 firmware
  • Microsoft 365 apps for enterprise updates
  • Microsoft Edge

On top of what was mentioned, Windows Autopatch will also handle updating drivers and firmware that are only available through Windows Update as automatic updates. As for how Windows Autopatch works, there are four deployment rings. The first ring covers a small number of your company’s devices, while the second one handles 1% of them. The third and fourth rings take care of 9% and 90% of the devices, respectively.

 

The following Windows 64-bit editions are suported for Windows Autopatch:

  • Windows 10/11 Pro
  • Windows 10/11 Enterprise
  • Windows 10/11 Pro for Workstations

 

 

Windows Autopatch Licensing

 

Changes are made from April 2025 read the info box below!!! Microsoft 365 Business Premium is fully supported!!!

 

 

Windows Enterprise E3+ and F3 licenses, Business Premium and A3

 

The information in the section below only applies if you have Windows Enterprise E3+ or F3 licenses, Business Premium and A3 licenses and have activated Windows Autopatch features.

 

 

In April 2025, Windows Autopatch removed feature activation and made Windows Autopatch features available to Business Premium and A3+ licenses. These changes are rolling out over the next several weeks. If your experience looks different from the documentation, you didn’t receive the changes yet. Review Prerequisites and Features and capabilities to understand licensing and feature entitlement.

Check out the table below for the functionality:

 

Features included with Business Premium, A3+, E3+ and F3 licensesDescription
Update ringsYou can manage Update rings for Windows 10 and later devices with Windows Autopatch.
Autopatch groupsYou can manage update deployment based on your audience. An Autopatch group is a logical container or unit that groups several Microsoft Entra groups, and software update policies, such as Update rings policy for Windows 10 and later and feature updates policy for Windows 10 and later policies.
Windows quality updatesWith Windows Autopatch, you can manage Windows quality update profiles for Windows 10 and later devices. You can expedite a specific Windows quality update using targeted policies. Windows Autopatch: Aims to keep at least 95% of Up to Date devices on the latest quality update.
Hotpatch updatesInstall Monthly B release security updates without requiring you to restart the device.
Windows feature updates and Multi-phase release policies with feature updatesWindows Autopatch provides tools to assist with the controlled roll out of annual Windows feature updates. With multi-phase release policies, you can create customizable feature update deployments using multiple phases for your existing Autopatch groups. These phased releases can be tailored to meet the unique needs of your organization.
Driver and firmware updatesYou can manage and control your driver and firmware updates with Windows Autopatch. You can: - Choose to receive driver and firmware updates automatically, or self-manage the deployment - Control the flow of all drivers to an Autopatch group or rings within an Autopatch group - Control the flow of a specific driver or firmware across your entire tenant via approvals - Approve and deploy other drivers and firmware that previously couldn’t be centrally managed
Microsoft 365 Apps for enterprise updatesWindows Autopatch aims to keep at least 90% of eligible devices on a supported version of the Monthly Enterprise Channel (MEC).
Microsoft Edge updatesWindows Autopatch configures eligible devices to benefit from Microsoft Edge's progressive rollouts on the Stable channel.
Microsoft Teams updatesWindows Autopatch allows eligible devices to benefit from the standard automatic update channel.
Intune reportsUse Intune reports to monitor the health and activity of endpoints in your organization.
Hotpatch quality update reportHotpatch quality update report provides a per policy level view of the current update statuses for all devices that receive Hotpatch updates.
Enhanced Windows quality and feature update reports and device alertsUsing Windows quality and feature update reports, you can monitor and remediate managed devices that are Not up to Date and resolve any device alerts to bring managed devices back into compliance.

 

Features included with E3+ and F3 licenses only In addition to the features listed in the previous table, if you have Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, or E5), you have access to the following through the Microsoft Intune admin center:

Submit support requests with the Windows Autopatch Service Engineering Team

 

 

So if you are a Microsoft 365 Business Premium customer you are good to go with Autopatch!!

 

Windows Autopatch enrollment

Enable Windows Autopatch in your tenant

 

In this section I will show you how to enable Windows Autopatch in your tenant.

 

Before you enroll your tenant in Windows Autopatch, you must meet all the prerequisites required by the Autopatch Service. For more information, refer to the Windows Autopatch prerequisites documentation.

 

 

Go to the Intune Portal – Tenant administration – Windows Autopatch – Feature activate – Tick the box I consent to these changes on my tenant – click Activate

 

Autopatch

 

If the Windows Autopatch Tenant Enrollment blade is missing in the Intune portal. That’s because either you haven’t assigned proper licenses to devices or the Autopatch Service prerequisites are not met.

Unlicensed Admin Error in Intune Portal During the Autopatch Tenant enrollment, you may encounter the unlicensed admin error. The unlicensed admin error appears because the Intune administrator account doesn’t have enough permissions to interact with Azure AD organization. Follow the instructions provided in the following guide to fix Windows Autopatch unlicensed admin error.

 

 

Windows Auto patch will now activate

 

Autopatch

 

After a few seconds you will get the message that the feature is activated

 

Autopatch

 

You will also be presented with the message: Windows Autopatch is finishing background tasks to complete feature activation. You can continue to use the Windows Autopatch portal in the meantime.

 

Autopatch

 

Windows Autopatch settings

 

Once Windows Autopatch is enabled in your tenant you will see some settings under the Windows Autopatch in you Intune tenant administration blade:

  • Autopatch groups
  • Messages
  • Admin Contacts
  • Support Requests
  • Tenant management

 

Autopatch

 

Let’s walk over these settings in more detail.

 

Autopatch groups

The primary setup for Windows Autopatch is creating a group. This is the foundation for all the different settings that will be built from it. A Windows Autopatch group is essentially a collection of device rings. Most businesses will have just one group, which defines multiple Windows Update policy rings for managing their devices. Just to clarify, this is NOT an EntraID group – it’s a totally different concept. We will dig deeper in the creation of these groups later on in this blog

 

Messages

Here you can find messages that Microsoft will post regarding to Windows Autopatch, also you can see the service health.

 

Admin Contacts

Here you can add Admins who will be contacted by Microsoft if there are any issues or support requests.

 

Support Requests

Here you can initiate a support/service request to Microsoft. Only for E3 and higher.

 

Tenant management

Here you can find actions that you need to do if something changes to your tenant configuration.

 

Create Windows Autopatch groups

 

UPDATE 30/07/2025 These groups are no longer created automatically and are also no longer needed for the functionality of the process. The only group you still need to create is the device registration group, see below..

 

 

When Windows Autopatch got enabled in your tenant a few groups where created.

  • Modern Workplace Devices-Windows Autopatch-Fast
  • Modern Workplace Devices-Windows Autopatch-Broad
  • Modern Workplace Devices-Windows Autopatch-First
  • Modern Workplace Devices-Windows Autopatch-Test
  • Modern Workplace Devices-Virtual Machine
  • Windows Autopatch – Devices All

 

 

 

We need to create some Windows Autopatch groups that we can assign to the different update rings. By default Windows Autopatch creates 2 rings, these are not vissible yet at this point in the configuration, you will see this when you continue further on in the Windows Autopatch group creation. The rings that are created by default are:

  • Test
  • Last

I will create 1 group for the device registration (Dynamic group distribution), make sure you give it a clear name. If you do this right from the start you avoid confusion later on in time.

 

Group for Windows Autopatch Device Registration

To populate these system generated groups automatically, we need to define a source group for the registration of the devices into Windows Autopatch (Dynamic group Distribution). This is the most important group we need to get Windows Autopatch working, without this group we cannot configure the device distribution. you can fill this group manually with devices or nested with device groups. All devices in this group will be registered/ernolled into Windows Autopatch and will split all registered/enrolled devices in to the different update rings you configure.

 

This Dynamic Group distribution doesn’t have to be an Entra dynamic group at first – it can start as an Assigned group. Using an Entra dynamic group makes more sense once the service is fully up and running, ensuring all devices are managed by Windows Autopatch. In this setup i will opt for an assigned group, you can always change this later on to a dynamic group.

 

Go to the Intune portal – Groups – New Group

 

Windows Autopatch

 

Name your group e.g. Windows Autopatch Device Registration and give a description e.g. Group used for Windows Autopatch dynamic group distribution. Set the owner and you can also add members now if you want to. Click create.

 

Windows Autopatch

 

 

Create the Windows Autopatch Dynamic Group Distribution

 

To create the Windows Autopatch group, go to the Intune portal – Tenant administration – Windows Autopatch – Autopatch groups – Create

 

Windows Autopatch

 

Enter a group name, this can be your company name or for larger enterprise deployments you can also use multiple groups per department. In this case i will use DEMO. Add a description if you want. Click next.

 

Windows Autopatch

 

Now we need to add a group that will be in charge of the device registration in Windows Autopatch, we will use the Windows Autopatch Device Registration group we created in the previous step. To do this click add groups next to Dynamic group distribution and add the group and click select.

 

Windows Autopatch

 

Create the Windows Autopatch update rings

Setting up the Deployment rings is probably the most complicated part of configuring Autopatch. By default, there are 2 rings, which are assigned to groups with matching names. Administrators will need to define which devices go into each group. The Test ring is used for the first devices that will receive Windows Update.

Devices in this group are meant for your IT admins and testers since they get the updates first. This gives your organization a chance to test and confirm updates before they roll out to everyone.

The Last ring is for VIP or priority devices. These devices will still receive updates, but they’ll be the last to get them.

 

Windows Autopatch

 

Add as many deployment rings you want to use, in this setup i will use 3 rings.

Click Add deployment ring to add 3 rings and fill in the percentages of devices you want to add to a specific deployment ring.

 

 

Now click next to proceed to the Windows update settings

 

Set the Windows Autopatch update settings

The default settings are like this:

 

Windows Autopatch

 

You can change these settings per ring by clicking on the 3 dots at the end of each Deployment ring and select Manage deployment cadence. There are 2 option to choose from:

  • Deadline Driven: Updates become available to devices during the specified time range. Devices can be updated at any point in that window.
  • Schedule Install: Updates are only installed during the specified time window. Best for business-critical devices only.

 

For this setup i will opt for Deadline Driven.

You will have 3 options here for deadline driven:

  • Deferral period – The number of days after the update becomes available you want your rollout to begin x days after the release.
  • Deadline – The number of days after the deferral when the update must be installed by x days after deferal period ends.
  • Grace period – The number of days after a device becomes active when the update must be installed by x days after a device becomes active.

 

 

you can configure these setting according to your needs. For this setup i have entered thse settings:

 

Windows Autopatch

 

Per Deployment ring you can also set the notification settings. you can choose between these options:

 

Windows Autopatch

 

For this setup i will leave them on the default setting: Use the default Windows Update notifications.

Click next for the Drive update settings.

 

Set the Windows Autopatch driver update settings

Here you can choose to also opt for driver updates installations. You can choose to automatically approve them or manually. Also i have set the deferal perion of the driver updates the same as the Windows Update settings.

 

Windows Autopatch

 

If you have set these options click review and create to review your configuration, if you are satisfied, click create.

 

Windows Autopatch

 

This will take a few seconds to create.

Now you can check if your groups have been created, go to groups – All groups and you will see the created groups.

 

Windows Autopatch

 

Now to verify that our deployment rings have groups assinged go to Devices – Windows updates – Update rings. Here you will see your Windows Autopatch group, in this case DEMO. Expand it and you will see your created Deployment rings with the settings you have configured in the previous steps.

 

Windows Autopatch

 

Now click on an update ring and check the assignment. For DEMO – Test all is ok.

 

Windows Autopatch

 

You can check the other update rings to if you want.

Now you have configured the Windows Autopatch feature. The only thing we need to configure are the update settings. Let’s do this now.

 

Set the update settings

To set the update settings click Update settings next to Autopatch groups.

 

Windows Autopatch

 

Here you can choose which products to be managed by Windows Autopatch.

 

Windows Autopatch

 

When i tried to toggle on all the features i got an error with the Edge updates, in the backend it will retry, so that was just a matter of time and after a few seconds wait it turned green.

 

Windows Autopatch

 

Now it will take some time for the groups to get populated. In my case (only 2 test devices) it took around 5 minutes. As you can see my test VM is added to the nessecary groups.

 

Windows Autopatch

 

When we check the Windows Autopatch groups you can also see that there are 2 devices registered.

 

Windows Autopatch

 

If the registration of your devices to Windows Autopatch is taking a long time you can speed up the process by going to Devices – Windows updates – Monitor – Autopatch devices

 

Windows Autopatch

 

Click on Autopatch devices – Discover devices

 

Windows Autopatch

 

 

 

What other things where created by enabling Windows Autopatch

 

Apart from the Entra ID groups some confguration profiles are also created, these configuration profiles are set according to the settings we toggled on in the update settings section.

 

Windows Autopatch

 

We have the following configuration policies:

  • Windows Autopatch – Data Collection
  • Windows Autopatch – Edge Update Channel Beta
  • Windows Autopatch – Edge Update Channel Stable
  • Windows Autopatch – Office Configuration
  • Windows Autopatch – Office Update Configuration [Broad]
  • Windows Autopatch – Office Update Configuration [Fast]
  • Windows Autopatch – Office Update Configuration [First]
  • Windows Autopatch – Office Update Configuration [Test]

 

Windows Autopatch

 

These configration profiles are automatically assigned to the groups that where automatically generated. Do NOT modify these assignments.

  • Windows Autopatch – Data Collection – assigned to Windows Autopatch – Devices All
  • Windows Autopatch – Edge Update Channel Beta – assigned to Modern Workplace Devices-Windows Autopatch-Test
  • Windows Autopatch – Edge Update Channel Stable –  assigned to Modern Workplace Devices-Windows Autopatch-Broad, Modern Workplace Devices-Windows Autopatch-Fast & Modern Workplace Devices-Windows Autopatch-First
  • Windows Autopatch – Office Configuration – assigned to Modern Workplace Devices-Windows Autopatch-Broad, Modern Workplace Devices-Windows Autopatch-Fast, Modern Workplace Devices-Windows Autopatch-First & Modern Workplace Devices-Windows Autopatch-Test
  • Windows Autopatch – Office Update Configuration [Broad] – assigned to Modern Workplace Devices-Windows Autopatch-Broad
  • Windows Autopatch – Office Update Configuration [Fast] – assigned to Modern Workplace Devices-Windows Autopatch-Fast
  • Windows Autopatch – Office Update Configuration [First] – assigned to Modern Workplace Devices-Windows Autopatch-First
  • Windows Autopatch – Office Update Configuration [Test] – Modern Workplace Devices-Windows Autopatch-Test

 

Change a device to another update ring

 

It can be possible that you are not satisfied with the update ring a device has been given by the system, in this case you can change that device to another ring. Go to Devices – Windows updates – Monitor –
Autopatch Devices – select a device you want to change – click assing ring and choose your desired ring.

 

 

A notification will appear. This can take some time to reflect.

Windows Autopatch

Windows Autopatch recap

 

Creating the Intune Windows Autopatch group automatically generates several configurations in the environment.

  • Entra groups starting with Modern Work – Do NOT modify these groups, these are created by default.
  • DEMO – Test and DEMO – Last update rings – Adding or importing devices in these update rings is NOT supported.
  • The 3 Entra Groups DEMO – Ring 1, DEMO – Ring 2 and DEMO – Ring 3 – Do NOT modify these groups, these are created by default.
  • Under Devices – Windows Update – Update rings, a set of Windows Update for Business policies are created and matches the Autopatch group configuration.
  • Under Devices – Windows Update – Feature updates the Windows Autopatch – Global DSS Policy is created.
  • Under Devices – Windows Update – Driver Updates, a set of Windows Update for Business policies are created and matches the Autopatch group configuration.
  • Windows Autopatch creates one Feature Update policy that’s automatically applied to all rings. The purpose of this policy is to establish a baseline minimum for the Windows 10/11 build, ensuring it’s on the oldest supported version. Right now, that’s Windows 10 22H2. In the future, this will automatically switch to Windows 11 23H2, as it becomes the next supported build.

 

Before you can manage devices with Autopatch, they need to be registered. The Windows Autopatch Discover Devices feature checks for devices every hour. To register devices, simply add them to the Microsoft Entra groups linked to the Autopatch group, in this case the Windows Autopatch Device Registration group.

 

 

Hotpatch Updates (Public Preview)

What is Hotpatch

Hotpatch updates are Monthly B release security updates that can be installed without requiring you to restart the device. Hotpatch updates are designed to reduce downtime and disruptions. By minimizing the need to restart, these updates help ensure faster compliance, making it easier for organizations to maintain security while keeping workflows uninterrupted.

The key benefits are:

  • Hotpatch updates streamline the installation process and enhance compliance efficiency.
  • No changes are required to your existing update ring configurations. Your existing ring configurations are honored alongside Hotpatch policies.
  • The Hotpatch quality update report provides a per policy level view of the current update statuses for all devices that receive Hotpatch updates.

 

Eiligible devices:

  • Operating System: Devices must be running Windows 11 24H2 or later.
  • VBS (Virtualization-based security): VBS must be enabled to ensure secure installation of Hotpatch updates.
  • Latest Baseline Release: Devices must be on the latest baseline release version to qualify for Hotpatch updates. Microsoft releases Baseline updates quarterly as standard cumulative updates.

 

Release cycles:

  • Baseline Release Months: January, April, July, October.
  • Hotpatch Release Months: February, March, May, June, August, September, November, December.

If you’re using Autopatch groups and want your devices to receive Hotpatch updates, you must create a Hotpatch policy and assign devices to it. Turning on Hotpatch updates doesn’t change the deferral setting applied to devices within an Autopatch group.

Using Hotpatch will reduce anual reboots from every month to just 4.

 

How to enable Hotpatch

In the Intune portal go to Devices – Windows updates – Quality updates – Create – Windows quality update policy (preview).

 

Windows Autopatch

 

Name your policy e.g. Enable Hotpatch and add a description if you want. Click next.

 

Hotpatch

 

Switch the box When available, apply without restarting the device (“hotpatch”) to Allow.

 

Hotpatch

 

Now assign the policy to a device group and click next,

 

Hotpatch

 

On the review page click create.

 

Hotpatch

 

 

Device check

Now when you sync your device with Intune you can check the follwing on your device:

Registry key:

 

Hotpatch

 

In the settings – Windows updates – Advanced options – Configured update policies

 

Hotpatch

 

User Experience

Without Hotpatch the user needs to reboot.

 

Hotpatch

 

With Hotpatch enabled no reboot is needed.

 

 

This new feature marks a major step forward in update management for Windows 11 Enterprise. By cutting down on reboots while keeping security strong, it allows IT admins to provide a smoother and more secure experience for users.

With this update, the approach moves from fixing issues after they arise to taking proactive steps to ensure security without any trade-offs. Organizations using this update method can look forward to more efficient operations, increased productivity, and, most importantly, a safer environment for their teams.

 

This concludes this quit long blog and as always if you feel there is something in error or you want to add some stuff from your own experience don’t hesitate to contact me!

SHARE THIS:

8 Comments

  1. Sarah

    Weird question, but hear me out. My environment is currently mostly Windows Pro. We are licensing for the M365 E3 as I roll out Intune. Will I have to upgrade the machines to the included Enterprise license, or will it work based on the M365 E3 on Windows Pro?

    Reply
    • joery

      Your Windows machines will be Enterprise because of the M365E3, Windows Enterprise is included in that package so with these digital licenses you are good to go.

      Reply
  2. Matt Dillon

    Thanks much for this article. Finally, someone walked me through setting this up. Everything else online was out of date. Worked like a charm except I am not seeing my devices in the Autopatch Devices section. The updates applied to the devices already and I show two registered devices under Autopatch groups. Will give it another hour before I blow away this tenant and start over.

    If I have existing Windows Update for Business Rings, do I need to delete them before I deploy Autopatch??

    Reply
    • joery

      Hi Matt, thank you. And no you can use them next to each other so you can migrate in phases. It can take some time before your devices show in Autopatch.

      Reply
  3. Sam

    Excellent article, I have one question, when I created Autoptach Group. Say ContosoAPG, I added three rings and for assignments I added security groups which I created beforehand say Group1-Test, Group-Ring1, Group-Ring2, Group-Ring3, Group-Last. After Autopatch Group was created, it also created security groups like ContosoAPG-Test, ContosoAPG-Ring1, ContosoAPG-Ring2, ContosoAPG-Ring3 and ContosoAPG-Last. The groups which were created by Autopatch are also assigned on the update policies. Do I now need to move devices from the groups I manually created to the groups which Autopatch created? To add to the confusion there are also set of groups with Modern Workplace ** with similar rings or do I have to manually move devices to any of the Modern Workplace groups? Now there are three sets of groups, the one I created beforehand, the set of groups which autopatch group created and the modern workplace set of groups. And I am not using dynamic group allocation within Autopatch group. Thanking you

    Reply
    • joery

      Hi, thank you. You just need to fill up the Windows Autopatch Device Registration group, you can make this an assigned or dynamic group. In case of a dynamic group no manual action is needed.

      Reply
      • Sam

        The device assignment with Windows Autopatch Device Registration will go for custom rings within autopatch group (Ring1/2/3), what about first and last rings which I have assigned with the groups I created manually? In the Windows update policy the group I created is not there, but the group which Autopatch created e.g. Contoso-APG-Test. Does it mean I have to move my devices from Group1-Test to Contoso-APG-Test?

        Reply

Submit a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from IntuneStuff

Subscribe now to keep reading and get access to the full archive.

Continue reading