Edit

Share via


Windows update management overview

Keeping Windows devices secure and up to date is one of the most important responsibilities for any organization. Microsoft Intune provides a cloud-based approach to Windows update management, giving you control, predictability, and minimal disruption for users.

This overview explains how Intune manages Windows updates, the policy types available, and how these pieces fit together into a complete update strategy.

What you can do with Intune

  • Configure update settings on devices without managing individual patches.
  • Define update rings to control rollout timing and reduce risk.
  • Prevent devices from installing new feature versions until you're ready, while still applying security and quality updates.

Intune stores only the policy assignments, not the updates themselves. When you save a policy, Intune sends configuration details to Windows Update, which determines which updates to offer. Devices download updates directly from Windows Update.

Windows update management capabilities

The following policy types help you manage Windows updates in Intune:

Windows Update client policy

Configures the underlying Update policy CSP. Intune surfaces these settings through update rings and the Settings Catalog, giving administrators flexibility to apply granular update behaviors at the device level.

Update ring policy

Applies Windows Update client policies to groups of devices. Update rings control deferral periods, deadlines, restart behavior, and user experience settings, enabling phased rollout across your environment.

Feature update policy

Locks devices to a specific Windows version (for example, Windows 11 24H2). These policies prevent devices from upgrading beyond the targeted release, ensuring consistency and control over major OS upgrades.

Quality update policy

Delivers monthly cumulative updates for security and reliability. Supports:

  • Hotpatch: Apply eligible security patches without a reboot to reduce downtime.
  • Expedite policies: Push critical security updates immediately by overriding deferral settings.

Driver update policy

Manages the delivery of hardware driver updates from Windows Update. Driver update policies help ensure device compatibility and stability by controlling when and how drivers are installed.

Windows Autopatch

Windows Autopatch is a managed cloud service integrated with Microsoft Intune that helps keep Windows devices up to date and protected.

Autopatch uses feature update policies, quality update policies, and driver update policies as its policy surface. These policy types are built on the same cloud orchestration service that powers Windows Autopatch and are also available in Intune for admins who want to manage updates without enrolling devices in Autopatch.

Autopatch adds service-managed capabilities such as dynamic device grouping, phased rollouts, health monitoring, and reporting. For eligible Windows editions, it also enables cloud-powered update scenarios like hotpatch and expedited updates with minimal manual configuration.

Update ring policies are used in Intune to configure Windows Update behavior such as deferrals, deadlines, and restart settings. For Autopatch‑enrolled devices, update rings may be created and managed by the service to implement rollout cadence.

The following table compares how update management differs when you use Autopatch and manual Intune configuration:

Feature When NOT using Autopatch When using Autopatch
Update coordination You control scheduling, deferrals, and rollout manually using Intune policies. Autopatch orchestrates updates using service-managed policies and rollout logic.
Update ring policy You configure update ring policies in Intune to control deferrals, deadlines, and restart behavior. Autopatch may create and manage update ring policies to control rollout cadence and restart behavior. Admins shouldn't assign custom update ring policies to Autopatch-managed devices.
Feature update policy You use feature update policies to lock or schedule OS versions. Autopatch manages version targeting and rollout automatically.
Quality update policy You configure quality update policies, expedited updates, and hotpatch settings manually. Autopatch manages monthly patches, expedites critical updates, and applies hotpatch automatically for eligible devices.
Driver update policy You use driver update policies to review and approve drivers manually. Autopatch manages driver approvals and scheduling automatically.

Prerequisites

Each policy type has specific prerequisites, detailed in their respective documentation. In general:

  • Devices must be enrolled in Intune.
  • Devices must be Microsoft Entra joined or hybrid joined.

    Microsoft Entra registered devices aren't supported for any policy type that uses the same backend service as Windows Autopatch—including Feature updates, Quality updates, and Driver updates.
    For Entra registered devices, update management remains limited to Windows Update client policies and update ring policies.

  • Devices must have access to Microsoft update endpoints.

Feature update policies, quality update policies, and driver update policies use the same cloud orchestration layer as Windows Autopatch. Autopatch automates these policies, but when you configure them manually in Intune, you're still calling the same backend service—so the requirements don't change. Because they share this service, the prerequisites are the same across these three policy types:

  • Licensing: A Windows license that includes the Autopatch entitlement.

    If you're blocked when creating new policies for capabilities that require Windows Autopatch and you get your licenses to use Windows Update client policies through an Enterprise Agreement (EA), contact the source of your licenses such as your Microsoft account team or the partner who sold you the licenses. The account team or partner can confirm that your tenants' licenses meet the Windows Autopatch license requirements. See Enable subscription activation with an existing EA.

    Important

    Enable subscription activation with an existing EA isn't applicable to GCC and GCC High/DoD cloud environments for Windows Autopatch capabilities.

  • Telemetry: Diagnostic data set to Required level.

  • Services: Microsoft Account Sign-In Assistant enabled.

    If the service is blocked or set to Disabled, it fails to receive the update. For more information, see Feature updates aren't being offered while other updates are. By default, the service is set to Manual (Trigger Start), which allows it to run when needed.