# Keep Windows 365 current and stay current with Windows Autopatch

## BEFORE YOU BEGIN

{% hint style="warning" %}
**Disclaimer:** All information and content in this blog post is provided without any warranty whatsoever. The entire risk of using this information or executing the provided content remains with you. Under no circumstances should the mentioned persons or vendors, the author, or anyone else involved in creating these blog posts be held liable for any damage or data loss.
{% endhint %}

## Introduction

In this blog post, we’ll explore Windows Autopatch, which became generally available (GA) in July 2022 for customers with **Windows 10/11 Enterprise E3 (or higher)** at no additional costs. Because this new Microsoft cloud service supports Windows 365 Enterprise Cloud PCs, it got my full attention and curiosity about the opportunities it brings for organizations and IT pros.\
\
So, in this deep dive post, we’ll look into how to configure Windows Autopatch from scratch, register Windows 365 Enterprise Cloud PCs directly to the Windows Autopatch during its provisioning process, and where to monitor update deployments and device health afterward.

## **What is Windows Autopatch?**

Windows Autopatch is a Microsoft cloud service that manages updates for **Windows 10/11**, **Microsoft 365 Apps**, **Microsoft Edge**, and **Microsoft Teams** on behalf of the customer. Microsoft engineers use the Windows Update for Business client policies and deployment service tools on the customer’s behalf. The service creates four update rings (**Test**, **First**, **Fast** and **Broad**) and monitors rollouts-pausing and even rolling back changes where possible.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/2207_Comparing-MMD-Autopatch-WUfB-1024x512.png" alt="Understanding Update Management."><figcaption><p><em>Source:</em> <a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-autopatch-has-arrived/ba-p/3570119"><em>Microsoft Tech Community</em></a></p></figcaption></figure>

Have you been asked to do more with less? – With **Windows Autopatch**, IT pros can gain more time and resources to drive value for the business, and the second Tuesday of every month will be “just another Tuesday”.

## Prerequisites

* Azure Active Directory (Azure AD)
* Hybrid Azure AD-Joined or Azure AD-joined only
* Microsoft Intune
* Supported Windows 10/11 Enterprise and Professional editions:
  * Windows 10 (1809+)/11 Pro x64 architecture
  * Windows 10 (1809+)/11 Enterprise x64 architecture
  * Windows 10 (1809+)/11 Pro for Workstations x64 architecture
* Devices must be corporate-owned. Windows bring-your-own-devices (BYOD) is not supported.
* Devices must be managed by either Microsoft Intune or Configuration Manager Co-management.
* Devices must have communicated with Microsoft Intune in the last 28 days.
* Devices must have internet connectivity.
* Devices must have a Serial number, Model, and Manufacturer.
* Connectivity to multiple Microsoft service endpoints from the corporate network.\
  For the full list of required IPs and URLs, see [Microsoft Docs](https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/prepare/windows-autopatch-configure-network)

**Configuration Manager Co-management requirements:**

* Configuration Manager (version 2010 or later)
* Configuration Manager is connected to the internet and cloud-attach with Intune.
* Configuration Manager is configured for Co-management.
* In Configuration Manager, switch workloads for **Device configuration**, **Office Click-to-Run apps**, and **Windows Update policies** from **Configuration Manager** to **Pilot Intune** or **Intune**.

## Licensing Requirements

* Windows 10/11 Enterprise E3 (or higher)
  * Licenses that grant entitlement to Windows Autopatch:
    * Microsoft 365 E3
    * Microsoft 365 E5
    * Windows 10/11 Enterprise E3
    * Windows 10/11 Enterprise E5
    * Windows 10/11 Enterprise VDA
* Azure AD Premium
* Microsoft Intune

Are you looking for **Windows 365 Enterprise prerequisites** and how to get started? – See the [How to configure Windows 365 Enterprise in Microsoft Endpoint Manager](https://www.osdsune.com/home/blog/2021/configure-windows-365-enterprise) blog post.

## Enroll Your Tenant to Windows Autopatch

{% hint style="warning" %}
&#x20;**Important:** You must be a **Global Administrator** to run the **Readiness assessment tool** and enroll your tenant.
{% endhint %}

Once we have reviewed all the prerequisites, we’ll have to run the Windows Autopatch Readiness assessment tool from the Microsoft Endpoint Manager admin center. – The Readiness Assessment tool checks various settings (For example, **Update Rings for Windows 10 or later**, **Conditional Access**, **Windows Autopatch Service Accounts**, **Security Defaults**, etc.) in Microsoft Intune and Azure AD to ensure they’ll work with Windows Autopatch.\
\
Go to <https://intune.microsoft.com>\
\
In the left pane, click **Tenant administration** | **Windows Autopatch** | **Tenant enrollment**\
Tick the check box and then select **Agree**.

{% hint style="warning" %}
&#x20;**Important:** If you can’t find the **Tenant enrollment** blade for **Windows Autopatch**, it’s probably because you don’t meet the prerequisites or the proper licenses. – See the [Windows Autopatch prerequisites](https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites#more-about-licenses).
{% endhint %}

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch01-1024x609.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

This assessment only takes a few moments, and you can investigate the details by selecting **View details**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch02-1024x610.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

So, the details tell us that there are two advisories based on the readiness assessment. One advisory is about Co-Management workloads, and the other is about my Conditional Access policies that are assigned to all users, which according to MS Docs, isn’t the best practice for Windows Autopatch.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch03-1024x574.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

Windows Autopatch does come with a step-by-step explanation on how to remediate this directly within the advisory itself. However, a note states that Windows Autopatch will attempt to exclude their service accounts from my Conditional Access policies during the Windows Autopatch enrollment process.

{% hint style="info" %}
&#x20;**Note:** During the Windows Autopatch enrollment process, the service will attempt to exclude our service accounts from relevant Conditional Access policies and apply new Conditional Access policies to restrict access to these accounts. However, if we are unsuccessful, Windows Autopatch will contact you to exclude the service account from any conflicting Conditional Access policies.
{% endhint %}

Instead of following the advisory, let’s try and see if their service account will be excluded automatically from my Conditional Access policies during the Windows Autopatch enrollment process.\
\
Still on the assessment details page, click the upper right cross to return to the **Tenant enrollment** blade.\
Select **Enroll**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch04-1024x573.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

Windows Autopatch needs your consent to allow administrator access for Microsoft. By doing so, you are allowing Windows Autopatch the ability to create **Service Accounts**, **Azure AD Groups**, **Collect data**, etc.\
\
Tick the check box and then select **Agree**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch05-1024x572.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

Fill in the required contact information and click **Complete**.\
This will kick off the **Windows Autopatch enrollment process**, which may take some time to complete.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch06-1024x574.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch07-1024x574.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

What exactly happened during the Windows Autopatch enrollment process? – Well, I can see that several Azure AD groups and service accounts were created in Azure AD by the Windows Autopatch service.\
\
Just to highlight some of the more important ones.

**Azure AD Groups:**

* Modern Workplace Devices-Windows Autopatch-Test
* Modern Workplace Devices-Windows Autopatch-First
* Modern Workplace Devices-Windows Autopatch-Fast
* Modern Workplace Devices-Windows Autopatch-Broad
* Modern Workplace – Windows 11 Pre-Release Test Devices
* Modern Workplace Service Accounts
* Windows Autopatch Device Registration

**Service Accounts:**

* Modern Workplace Administrator Account (<MSAdmin@xxx.com>)
* Modern Workplace Interactive Administrator Account (<MSAdminInt@xxx.com>)
* Modern Workplace Test Account (<MSTest@xxx.com>)

**Assigned Administrative Roles:**

<table><thead><tr><th width="255">Assigned Roles</th><th>Service Account</th></tr></thead><tbody><tr><td>Helpdesk Administrator</td><td>• Modern Workplace Interactive Administrator Account</td></tr><tr><td>Intune Administrator</td><td>• Modern Workplace Administrator Account<br>• Modern Workplace Interactive Administrator Account</td></tr><tr><td>Security Reader</td><td>• Modern Workplace Administrator Account</td></tr><tr><td>User Administrator</td><td>• Modern Workplace Administrator Account<br>• Modern Workplace Interactive Administrator Account</td></tr></tbody></table>

{% hint style="info" %}
&#x20;**Note:** Throughout this blog post, we will return to each highlighted Azure AD group and explain its purpose.
{% endhint %}

I can confirm that the Azure AD group **Modern Workplace Service Accounts** contains all Windows Autopatch service accounts and that the service excluded this group from my Conditional Access policies during the Windows Autopatch enrollment process.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch08-1024x624.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

The enrollment process also created a new Conditional Access policy to restrict access to these accounts.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch09-1024x623.png" alt="Windows Autopatch Tenant enrollment."><figcaption></figcaption></figure>

## Deploying with Windows Autopatch

Now that we have completed the Windows Autopatch enrollment, we need to add and verify the admin contact information, which is essential for the Windows Autopatch Service Engineering Team to communicate with its customers. After that, we can finally begin registering our devices to the Windows Autopatch service so Microsoft can start to manage them on our behalf.

### **Add and Verify Admin Contact Information**

{% hint style="warning" %}
&#x20;**Important:** You might have already added these contacts in the **Microsoft Endpoint Manager admin center** during the Windows Autopatch enrollment process. If so, take a moment now to double-check that the contact information is accurate since the **Windows Autopatch Service Engineering Team** must be able to reach them if a severe incident occurs.
{% endhint %}

Go to <https://intune.microsoft.com>\
\
In the left pane, click **Tenant administration** | **Windows Autopatch** | **Admin contacts**\
From the **Windows Autopatch Admin contacts** blade, you can add, edit or remove the admin contact info.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch10-1024x610.png" alt="Verify Admin Contact Information."><figcaption></figcaption></figure>

Your admin contacts will receive notifications about **support request updates** and **new messages**.\
These areas include the following:

<table><thead><tr><th width="240">Area of focus</th><th>Description</th></tr></thead><tbody><tr><td>Devices</td><td>• Device Registration<br>• Device Health</td></tr><tr><td>Updates</td><td>• Windows Quality Updates<br>• Windows Feature Updates<br>• Microsoft 365 Apps for Enterprise Updates<br>• Microsoft Edge Updates<br>• Microsoft Teams Updates</td></tr></tbody></table>

*Source:* [*Microsoft Docs*](https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/deploy/windows-autopatch-admin-contacts)

### **Register Devices into the Windows Autopatch Service**

Before Microsoft can manage devices in Windows Autopatch, we must have devices (either physical or virtual) registered with the service. You might recall that earlier in this post, I highlighted an Azure AD group called **Windows Autopatch Device Registration**, this group was created during the Windows Autopatch enrollment process, and its purpose is to register devices to the service.\
\
We choose which devices to manage with Windows Autopatch by either adding them as direct membership or nesting other Azure AD dynamic/assigned groups into the **Windows Autopatch Device Registration** Azure AD group. Windows Autopatch automatically runs its discovery function every hour to discover new devices added to this group. Once the discovery function discovers new devices, Windows Autopatch attempts to register these devices.

{% hint style="warning" %}
&#x20;**Important:** The **Windows Autopatch Device Registration** Azure AD group only supports one level of Azure AD nested groups.
{% endhint %}

### **Built-in Roles Required for Device Registration**

We can use one of the following built-in roles to register devices in Windows Autopatch.

* Global Administrator
* Intune Administrator
* Modern Workplace Intune Admin

{% hint style="info" %}
&#x20;**Note:** The **Modern Workplace Intune Admin** role is a custom role in the **Microsoft Endpoint Manager admin center** created during the Windows Autopatch enrollment process.
{% endhint %}

**To register physical or virtual devices into Windows Autopatch**:\
\
Go to <https://intune.microsoft.com>\
\
In the left pane, click **Devices** | **Windows Autopatch** | **Devices**\
Select the **Windows Autopatch Device Registration** hyperlink.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch11-1024x569.png" alt="Windows Autopatch Device Registration."><figcaption></figcaption></figure>

This opens the **Windows Autopatch Device Registration** Azure AD group blade in a new browser tab.\
\
Add devices as direct membership or other Azure AD dynamic/assigned groups as nested groups in the **Windows Autopatch Device Registration** group. – I chose an existing Co-managed device with all workloads managed by Microsoft Intune.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch12-1024x337.png" alt="Windows Autopatch Device Registration."><figcaption></figcaption></figure>

{% hint style="info" %}
&#x20;**Note:** The **Windows Autopatch Device Registration** hyperlink is in the center of the **Ready** tab page when no devices are registered with the Windows Autopatch service. Once you have one or more devices registered with the Windows Autopatch service, the **Windows Autopatch Device registration** hyperlink is at the top of both the **Ready** and **Not ready** tabs.
{% endhint %}

Once devices or Azure AD groups containing devices are added to the **Windows Autopatch Device Registration** group, the Windows Autopatch service will discover these devices and run several prerequisite checks to try registering them with its service.

{% hint style="info" %}
&#x20;**Tip:** You can also use the **Discover Devices** button in either the **Ready** or **Not ready** tab to discover devices from the **Windows Autopatch Device Registration** Azure AD group on demand.
{% endhint %}

After a few minutes, I could see my Co-managed device appearing on the **Windows Autopatch Devices** blade.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch13-1024x445.png" alt="Windows Autopatch Device Registration."><figcaption></figcaption></figure>

The **Windows Autopatch Devices** blade has two tabs, where the purpose of the **Not ready** tab is to help IT pros detect and troubleshoot device readiness.

<table><thead><tr><th width="137">Tab</th><th>Purpose</th></tr></thead><tbody><tr><td>Ready</td><td>The purpose of the <strong>Ready</strong> tab is to show devices that were successfully registered to the <strong>Windows Autopatch service</strong>.</td></tr><tr><td>Not ready</td><td>The purpose of the <strong>Not ready</strong> tab is to help you identify and remediate devices that don’t meet the prerequisite checks to register into the <strong>Windows Autopatch service</strong>. This tab only shows devices that didn’t successfully register into Windows Autopatch.</td></tr></tbody></table>

*Source:* [*Microsoft Docs*](https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices)

### **Windows Autopatch and Windows 365 Enterprise Cloud PCs**

The main reason that Windows Autopatch got my attention and curiosity in the first place was because of the Windows 365 Enterprise support (Windows 365 for Business is not supported). This Windows 365 Enterprise support provides a seamless experience for admins and users and ensures that the Cloud PCs are always up to date. When IT pros decide to manage their Windows 365 Enterprise Cloud PCs with Windows Autopatch, the Windows 365 provisioning process calls the Windows Autopatch device registration APIs to register devices on behalf of the IT pros.

{% hint style="info" %}
&#x20;**Note:** All existing **Windows 365 Enterprise Cloud PCs** can be registered into **Windows Autopatch** by leveraging the same method as any other physical or virtual device.
{% endhint %}

**To provision Windows 365 Enterprise Cloud PCs and register them into Windows Autopatch**:\
\
Go to <https://intune.microsoft.com>\
\
In the left pane, click **Devices** | **Provisioning** | **Windows 365** and select the **Provisioning policies** tab.\
Create a new policy or modify an existing provisioning policy. – I chose to modify an existing policy.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch14_new-1024x530.png" alt="Windows Autopatch Device Registration."><figcaption></figcaption></figure>

Under the **Additional Services** section, select **Windows Autopatch**. Then select **Next** and **Update**.

{% hint style="warning" %}
&#x20;**Important:** If the “***Windows Autopatch (preview) cannot manage your Cloud PCs until a Global Admin has finished setting it up.***” message appears, you must complete the Windows Autopatch enrollment to continue.
{% endhint %}

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch15-1024x498.png" alt="Windows Autopatch Device Registration."><figcaption></figcaption></figure>

The next time you provision a Windows 365 Enterprise Cloud PC, it will automatically be enrolled and managed by Windows Autopatch. Okay! Let’s test this by adding a Windows 365 Enterprise license to a user in my environment and see what happens. And as expected, after approx. 20-30 minutes, the new Windows 365 Enterprise Cloud PC appeared on the **Windows Autopatch Devices** blade. – Pretty cool, huh?

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch16-1024x479.png" alt="Windows Autopatch Device Registration."><figcaption></figcaption></figure>

## Update Management

In this section, we will dive deeper into the configuration made to Microsoft Endpoint Manager during the Windows Autopatch enrollment process. For example, the **Windows 10/11 Update Rings**, **Device Configuration profiles**, etc.

### **The Update Rings**

Earlier in this post, I highlighted the four Azure AD groups that make up the update rings (**Test**, **First**, **Fast** and **Broad**). They were created during the Windows Autopatch enrollment process and are used to segment devices into update rings:

* Modern Workplace Devices-Windows Autopatch-Test
* Modern Workplace Devices-Windows Autopatch-First
* Modern Workplace Devices-Windows Autopatch-Fast
* Modern Workplace Devices-Windows Autopatch-Broad

Each update ring has a different purpose and is assigned a set of policies to control the rollout of updates in each update management area (**Windows Quality/Feature Updates** and partially **Microsoft Edge**).

{% hint style="warning" %}
&#x20;**Important:** You can’t create additional update rings and must use the four update rings provided by **Windows Autopatch**.
{% endhint %}

During Windows Autopatch device registration, each device is assigned to an update ring (**First**, **Fast**, and **Broad**) so that we have the appropriate distribution across the estate. Unfortunately, there is no machine learning behind this distribution, and some devices may end up in the wrong update ring. But no worries, we can manually move devices around from the device view on the **Windows Autopatch Devices** blade. For example, we may need to move the device belonging to the CEO from the **First** to the **Broad** update ring.

<table><thead><tr><th width="96.33333333333331">Ring</th><th width="145">Default device count</th><th>Description</th></tr></thead><tbody><tr><td>Test</td><td>Zero</td><td>Windows Autopatch doesn’t automatically add devices to this ring. You must manually add devices to the Test ring. The recommended number of devices in this ring, based upon your environment size, is as follows:<br><br>• 0–500 devices: minimum one device<br>• 500–5000 devices: minimum five devices<br>• 5000+ devices: minimum 50 devices<br><br>Devices in this group are intended for your IT Administrators and testers since changes are released here first. This release schedule provides your organization the opportunity to validate updates prior to reaching production users.</td></tr><tr><td>First</td><td>1%</td><td>The First ring is the first group of production users to receive a change.<br><br>This group is the first set of devices to send data to Windows Autopatch and are used to generate a health signal across all customers. For example, we can generate a statistically significant signal saying that critical errors are trending up in a specific release for all customers but can’t be confident that it’s doing so in your environment.<br><br>Since Windows Autopatch doesn’t yet have sufficient data to inform a release decision, devices in this ring might experience outages if there are scenarios that weren’t covered during testing in the Test ring.</td></tr><tr><td>Fast</td><td>9%</td><td>The Fast ring is the second group of production users to receive changes. The signals from the First ring are considered as a part of the release process to the Broad ring.<br><br>The goal with this ring is to cross the 500-device threshold needed to generate statistically significant analysis at the tenant level. These extra devices allow Windows Autopatch to consider the effect of a release on the rest of your devices and evaluate if a targeted action for your tenant is needed.</td></tr><tr><td>Broad</td><td>90%</td><td>The Broad ring is the last group of users to receive changes. Since it contains most of the devices enrolled in Windows Autopatch, it favors stability over speed in deployment.</td></tr></tbody></table>

*Source:* [*Microsoft Docs*](https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/operate/windows-autopatch-update-management)

To change the group/update ring for a specific device, choose the device on the **Windows Autopatch Devices** blade, click **Device action**, and select **Assign device group**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch17-1024x552.png" alt="Update Management."><figcaption></figcaption></figure>

Choose which group/update ring to assign the device from the drop-down list and click **Save**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch18-1024x553.png" alt="Update Management."><figcaption></figcaption></figure>

It may take a while. But ultimately, the device will be assigned to the chosen group/update ring.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch19-1024x511.png" alt="Update Management."><figcaption></figcaption></figure>

### **Windows Quality and Feature Updates**

**Windows Quality Updates**\
Windows Autopatch aims to keep at least 95% of eligible devices on the latest Windows quality update 21 days after release. On the second Tuesday of each month, Windows Autopatch will gradually deploy the B release of the Windows quality update. But the services may determine that a quality update is critical to security and choose to expedite it at any time during the release period. If this happens, the goal of 95% of devices in 21 days no longer applies, and Windows Autopatch accelerates the release schedule to update the environment more quickly.\
\
**Windows Feature Updates**\
Windows Autopatch aims to keep at least 99% of eligible devices on a supported version of Windows to continue receiving Windows feature updates. When the service decides to move to a new version of Windows, the timeline below indicates the minimum time between each ring rollout.

{% hint style="info" %}
&#x20;**Note:** The final release schedule is communicated prior to the feature release and may vary a little from the timeline below to account for business weeks or other scheduling considerations.
{% endhint %}

The table below shows the deferral, deadline, and grace period for each group/update ring and update type.

<table><thead><tr><th width="124">Update Type</th><th width="93">Group</th><th width="94">Feature Update</th><th width="132">Timeline</th><th>Deferral</th><th>Deadline</th><th>Grace period</th></tr></thead><tbody><tr><td></td><td></td><td></td><td></td><td></td><td></td><td></td></tr><tr><td>Windows Quality</td><td>Test<br>First<br>Fast<br>Broad</td><td>N/A<br>N/A<br>N/A<br>N/A</td><td>N/A<br>N/A<br>N/A<br>N/A</td><td>0<br>1<br>6<br>9</td><td>0<br>2<br>2<br>5</td><td>0<br>2<br>2<br>2</td></tr><tr><td>Windows Feature</td><td>Test<br>First<br>Fast<br>Broad</td><td>21H2<br>21H2<br>21H2<br>21H2</td><td>Release + 0<br>Release + 30<br>Release + 60<br>Release + 90</td><td>0<br>0<br>0<br>0</td><td>5<br>5<br>5<br>5</td><td>0<br>0<br>2<br>2</td></tr><tr><td>Windows Expedited</td><td>All Devices</td><td>N/A</td><td>N/A</td><td>0</td><td>1</td><td>1</td></tr></tbody></table>

*Source:* [*Microsoft Docs*](https://docs.microsoft.com/en-us/windows/deployment/windows-autopatch/operate/windows-autopatch-wqu-overview)\
\
Let’s look at the **Update rings for Windows 10 and later** and **Feature updates for Windows 10 and later (preview)** policies created in Microsoft Endpoint Manager during the Windows Autopatch enrollment process.

Go to <https://intune.microsoft.com>

In the left pane, click **Devices** | **Policy** | **Update rings for Windows 10 and later**.\
A profile has been created for each update ring (**Test**, **First**, **Fast**, and **Broad**), and each ring’s configuration matches the above table deferral, deadline, and grace period.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch20-1024x510.png" alt="Update Management."><figcaption></figcaption></figure>

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch21_new-915x1024.png" alt="Update Management."><figcaption></figcaption></figure>

In the left pane, click **Devices** | **Policy** | **Configuration profiles**.\
A device configuration profile has been created for each update ring (**Test**, **First**, **Fast**, and **Broad**), and each configuration profile matches the above table deferral, deadline, and grace period.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch23-1024x513.png" alt="Update Management." height="513" width="1024"><figcaption></figcaption></figure>

In the left pane, click **Devices** | **Policy** | **Feature updates for Windows 10 and later (preview)**.\
A profile has been created for each update ring (**Test**, **First**, **Fast**, and **Broad**) + one for **Windows 11**, and each ring’s configuration matches the above table feature update version.\
\
The **Modern Workplace DSS Policy \[Windows 11]** profile enables you to test Windows 11 before a broad rollout within your environment. When you add devices to the **Modern Workplace – Windows 11 Pre-Release Test Devices** Azure AD group, they’ll update to Windows 11.

{% hint style="info" %}
&#x20;**Note:** The **Modern Workplace DSS Policy** policies control the target version of Windows. The deferrals and deadlines for feature and quality updates are controlled by the **Modern Workplace Update Policy** policies from the **Update rings for Windows 10 and later** blade.
{% endhint %}

{% hint style="warning" %}
&#x20;**Important:** The **Modern Workplace DSS Policy \[Windows 11]** profile is intended for testing purposes only and shouldn’t be used to broadly rollout of Windows 11 within your environment.
{% endhint %}

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch22-1024x511.png" alt="Update Management." height="511" width="1024"><figcaption></figcaption></figure>

### **Microsoft 365 Apps Updates**

All devices registered for Windows Autopatch will receive updates from the **Monthly Enterprise Channel**. Updates from this channel are pulled directly from the **Office Content Delivery Network** (CDN) and released on the second Tuesday of each month. – These updates can include **Feature**, **Security**, and **Quality** updates.

{% hint style="info" %}
&#x20;**Note:** Windows Autopatch doesn’t use update rings to control the rollout of these updates.
{% endhint %}

In the left pane, click **Devices** | **Policy** | **Configuration profiles**.\
Several device configuration profiles have been created for the **Microsoft 365 Apps** configuration.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch24-1024x538.png" alt="Update Management." height="538" width="1024"><figcaption></figcaption></figure>

### **Microsoft Edge Updates**

Windows Autopatch uses the **Stable Channel** of Microsoft Edge, and updates are rolled out progressively by the Microsoft Edge product group to ensure the best experience for customers.\
\
Devices in the **Test** update ring receive feature updates from the **Beta Channel**. This channel is fully supported and automatically updated with new features approximately every four weeks.\
\
In the left pane, click **Devices** | **Policy** | **Configuration profiles**.\
Several device configuration profiles have been created for the **Microsoft Edge** configuration.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch25-1024x538.png" alt="Update Management." height="538" width="1024"><figcaption></figcaption></figure>

### **Microsoft Teams Updates**

Windows Autopatch uses the **standard automatic update channel** for Microsoft Teams. Updates for the Teams desktop client are released monthly for all users and twice a month for **Technology Adoption Program** (TAP) members.

{% hint style="info" %}
&#x20;**Note:** Windows Autopatch doesn’t use update rings to control the rollout of these updates.
{% endhint %}

## Monitor the Update Deployment and Device Health

After enrolling your tenant to Windows Autopatch and the service starts to manage and deploy updates in your environment, the IT pros would probably want some visibility into Windows update status, device health, and other insights. These insights are provided through reports in the Microsoft Endpoint Manager admin center. – Let’s check it out!\
\
In the left pane, click **Reports** | **Windows Autopatch (preview)** | **Windows Quality Updates**.\
From the **Windows Quality Updates** blade, you will see a summary of Windows quality updates and device health across all devices registered to Windows Autopatch.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch26-1024x727.png" alt="Deployment Reports."><figcaption></figcaption></figure>

Still on the **Windows Quality Updates** blade, click **Reports**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch27-1024x566.png" alt="Deployment Reports."><figcaption></figcaption></figure>

Select the **All devices report**.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch28-1024x437.png" alt="Deployment Reports."><figcaption></figcaption></figure>

A report is generated, which can take a while. Once the report is successfully generated, you can use the filters (**All update statuses**, **All deployment rings**, and **Windows Autopatch devices**) to refine it further. If you use the filter, don’t forget to click **Generate report** to generate a new report.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch29-1024x557.png" alt="Deployment Reports."><figcaption></figcaption></figure>

## Summary and Conclusion

In this blog post, you learned how to enroll your tenant into Windows Autopatch and register devices to the service. I also showed you how to configure the Windows 365 Enterprise provisioning policy to register Cloud PCs directly to the Windows Autopatch service during the provisioning process and where to monitor update deployments and device health afterward.\
\
Prior to enrolling my tenant into Windows Autopatch, I created a few Conditional Access policies to see how Windows Autopatch would cope with that. – But besides that, it was a clean tenant without any Device Configuration profiles or Windows update policies.\
\
During my exploration of Windows Autopatch, we found out that during the Windows Autopatch enrollment process, the service had created the following:

* Eighteen **Azure AD groups**.
* Three **Windows Autopatch Service Accounts** (two of which were added to multiple administrator roles).
* Four **Update rings for Windows 10 and later** policies.
* Five **Feature updates for Windows 10 and later (preview)** policies.
* Eighteen **Device Configuration** profiles.
* One **Custom Endpoint Manager role**.
* One **Conditional Access** policy.

I think that Windows Autopatch has some fantastic functionality built into its service. For example, it was definitely cool to see that it could exclude the services accounts from my existing Conditional Access policies during the Windows Autopatch enrollment process. I also think the reporting and support for Windows 365 Enterprise Cloud PCs are pretty cool!\
\
However, there is room for improvement, in my opinion. For example, I did experience that the telemetry profiles conflict with each other, probably because the dynamic Azure AD groups used as an exclusion in the assignments for both policies are empty.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch30-829x1024.png" alt="Summary and Conclusion."><figcaption></figcaption></figure>

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch31_new.png" alt="Summary and Conclusion."><figcaption></figcaption></figure>

I also noticed errors repeatedly showing when accessing the reports for Windows Autopatch.

<figure><img src="http://blog.mindcore.dk/wp-content/uploads/2022/08/W365Autopatch32.png" alt="Summary and Conclusion."><figcaption></figcaption></figure>

And lastly, why release a product with the **Device Configuration** profiles based on the Custom OMA-URI settings? I am not saying it is wrong, but why not use the “new” settings catalog template wherever possible?\
\
So, who is it for? – I think Windows Autopatch could be an excellent fit for some small and medium-sized business (SMB) customers. For larger or more complex organizations, it may not be the right solution here in its early stages, but as the product evolves and enhances over time, who knows?\
\
I definitely think it’s worth looking into and perhaps start exploring its functionality by yourself and come to your own conclusions on this topic. – That’s it, folks. Happy testing! 🤓\
\
If you have any questions regarding this topic, please feel free to reach out to me.
