Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB

This post will get more details about Windows 10 or Windows 11 Software Update Patching Options with Intune. How do you patch Windows 10/11 devices managed with Intune? If you are interested to know more about Intune Vs SCCM And WSUS Vs WUfB Patching Method Differences?

Microsoft Software Update Patching process for Intune admins. Intune helps configure Windows Update for Business (WUfB) policies to patch. This is the simplified patch management using Intune and WUfB.

Latest Post for Monthly Patching using Intune – Windows 11 Monthly Patch Deployment Using Intune HTMD Blog (anoopcnair.com)

The latest update guide for Intune monthly patching is available in the following Cloud PC Monthly Patching Process Using Intune. You can also configure Windows 10 and 11 Feature Update using Intune policies.

Patch My PC

The troubleshooting on Cloud PC and physical PC is also the same for monthly patching and feature update scenario.

In the following blog post, we have explained the troubleshooting methods to identify the issue with event logs and registry keys https://howtomanagedevices.com/intune/2319/uninstall-windows-10-feature-update/.

Introduction

Software update deployment with IntuneMicrosoft Intune provides Windows 10/11 Update Rings management to enable Windows as a Service via the Software Updates feature.

This enrolls a Windows PC into Windows Update for Business to manage features and quality updates the device receives and how quickly it updates to new releases.

Adaptiva

Software update deployment with Intune is straightforward. A few configuration steps, profile creation, and deployment are all done.

In this blog post, I will describe how to configure the windows update deployment through Intune on Windows 10 devices enrolled with Windows autopilot.

Update rings are policies that you assign to groups of devices. You can check out the following video to get more details on Intune based patching strategies. Intune Patch Management Methods for Windows iOS iPadOS macOS – Intune Design Decisions Part 7.

Intune Patch Management Methods for Windows iOS iPadOS macOS – Intune Design Decisions Part 7

Prerequisites

The following prerequisites must be fulfilled to use the Windows updates feature for Windows 10 devices in Intune. Server Operating Systems are not supported with Intune and Windows Update for Business.

Additional prerequisites to use Windows Update for Business (WUfB) are given below as per Microsoft. This includes the licensing requirements and others.

Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, or E5)
Windows 10/11 Education A3 or A5 (included in Microsoft 365 A3 or A5)
Windows Virtual Desktop Access E3 or E5
Microsoft 365 Business Premium

Additionally, devices managed by the Windows Update for Business deployment service must have the following:

Windows 10 version 1709 or later
Azure AD joined, or Hybrid AD joined
Windows 10 or Windows 11 editions installed: Pro Enterprise Education Pro for Workstations

Create a windows update policy

To create the policy for software updates, you need to Microsoft Intune – Overview and software updates, then click on Software updates. You will see the blade-like following.

Software Update Patching Options with Intune
Software Update Patching Options with Intune

Click on Windows 10 update ring, then click on Create.

Software Update Patching Options with Intune
Software Update Patching Options with Intune

Enter the Name and Description of the Intune Patching or Software Updates policy.

Software Update Patching Options with Intune
Software Update Patching Options with Intune

Intune Patching Update Settings

I have segregated this monthly patch policy configuration into two sections 1. Update Settings 2. User experience settings for easy understanding. This is the policy I created for the Day 0 deployment ring of Windows 11 devices.

In the update settings, you will see many options that need to be configured. Microsoft removed this section about Servicing channel from Intune update policy.

You must select the update servicing based on your requirement and the organization’s need; here, I have chosen a semi-annual channel.

1) You need to configure several days for a quality update and feature update at different times, from how many days these updates will install after release. For feature updates, I would recommend using different policies with more granular control.

  • Update settings
    • Microsoft product updates – Allow.
    • Windows drivers – Allow.
    • Quality update deferral period (days) – 0– Defer quality updates for the specified number of days for Windows 11 PCs. The allowed value is between 0-30 days.
    • Feature update deferral period (days) – – Defer feature updates for the specified number of days for Windows 11 PCs. The allowed value is between 0-365 days.
    • Set feature update uninstall period (2 – 60 days) – 10 – This is to set the feature update to uninstall period. The allowed value is between 2-60 days.
    • Upgrade Windows 10 devices to the Latest Windows 11 release – NO
    • Enable pre-release builds – Enable?
    • Select Pre-Release Channel – Windows Insider Channels (DEV or BETA)
Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB Fig. 1
Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB Fig. 1

User Experience Setting

User experience settings are those settings you configure to provide a better experience for end-users to do their day-to-day work without any interruption.

The first setting is automatic update behavior, where you have to configure how updates will install on your devices.

It either installs automatically or notifies the users to download the updates, install updates during maintenance time, or install the updates automatically and restart the device in the scheduled time.

The next setting is to provide an active start time and active end time; these are very important to configure the maintenance window for installing updates.

Next is restart checks, which means you can configure the restart check either for the battery power up to 40% or something else; you can skip this setting.

If you want users to have to approve for computer restart post-update installation, then you can enable this setting, and the user can authorize a computer restart,

Configure all the settings like servicing channel, product, and driver updates if you want to deploy them on Windows 10 devices, update deferral periods, user experience settings, the deadline for updates, and, most importantly, set auto-reboot settings.

All the settings are critical, I would say, and all of them would be required for all the organizations, but they would be different for them based on the security policies.

You can now configure the User Experience settings for Windows 11 monthly patch deployment policy. These Intune policies are configured in the Intune Admin center portal. I have not changed the settings of any of these policies for the Day 0 deployment ring.

  • Automatic Update behavior -> AutoInstall at maintenance time.
    • Active hours start -> 8 AM
    • Active hours end -> 5 PM
  • Restart checks – Allow – This policy is set to skip all checks before restart: Battery level = 40%, User presence, Display Needed, Presentation mode, Full-screen mode, phone call state, game mode etc.
  • Option to pause Windows updates -Enable
  • Option to check for Windows updates – Enable
  • Require user approval to dismiss restart notification – No
  • Remind user prior to required auto-restart with a dismissible reminder (hours) – The allowed number of hours, 2, 4, 8, 12, or 24 – 2 Hours.
  • Remind user prior to required auto-restart with a permanent reminder (minutes) – The allowed number of minutes, 15, 30, or 60 – 30 Minutes.
  • Change notification update level – Use default Windows Update notifications.
Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB Fig. 2
Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB Fig. 2

Intune Patching – Deadline Configurations

Now, you will need to configure the deadline settings experience for Windows 11 PCs. You have to be careful about these configuration policies because this defines the restart behavior for the users and reminders etc.

I have not configured these deadline settings policies for Day -0 deployment ring in my lab environment. However, I recommend configuring these policies as per your business requirements.

  • Use deadline settings -> Not Configured
  • Deadline for feature updates ->
  • Deadline for quality updates ->
  • Grace period –>
  • Auto reboot before the deadline –
  • Click on Next to continue.
Intune Patching - Deadline Configurations
Intune Patching – Deadline Configurations

Deployment of Software Updates and Patches

Let’s check the Deployment of Software Updates and Patches using Intune and Windows Update for Business. You can deploy this policy either to users or device groups. Intune has the intelligence to understand the devices assigned to a user using the lookup method.

Software Update Patching Options with Intune
Software Update Patching Options with Intune

Update ring assignment is straightforward, you have to look into the right hand, and you have to select the group to which your windows ten devices are added, and you need to update them.

I wanted to update you on all my windows autopilot devices, so I have selected the windows autopilot group.

Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB 1
Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB 2

End User Experience of Intune Patching using WUfB

In the next window, review all the settings you have configured and click on create.

When I check my windows 10 device and window update, I can see the policy are applied, and windows 10 is downloading the update, which is fast,

Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB
Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB

Once it’s installed, I checked in Intune console, and I can see the following dashboard,

Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB 3
End User Experience of Intune Patching using WUfB
End User Experience of Intune Patching using WUfB

Manage Windows 10 update rings – Pause Delete Resume Extend

In the Intune portal, go to device > Windows > Windows 10 update rings > and select the policy you want to manage; you can view the status of the ring assignment.

Here you can see the following options.

  • Delete
  • Pause
  • Resume
  • Extend

Delete: Delete setting you can use if you want to remove any configured ring from Intune; while deleting, you need to under that, and deleting the ring will not remove/modify settings already assigned to the devices.  

Pause: The pause setting can be used when you want to pause any update on the device, which can be done up to 35 days from the deployment.

After 35 days, the pause setting will expire automatically, and the device will scan updates for applicable updates.

Resume: If you have paused any update ring, you can use this setting to resume the updates.

Extend: if any update/ring is pushed, you can use this setting to extend the pause for another 35 eds.

Manage Windows 10 update rings - Pause Delete Resume Extend
Manage Windows 10 update rings – Pause Delete Resume Extend

Resources

5 thoughts on “Intune Monthly Patching Guide Software Update Patching Options with Intune WUfB”

  1. I have configured the updates to install at scheduled time, every day at 3am. What we encounter is that some devices still have update from september on install pending status. Next to that when in the policy we go to end User status a lot of user status have failed status. Any guidance for a good working update ring? Cause we have some updates on install pending State.

    Reply
    • Same here and wondering the same thing. We have ours set to SAC with scheduled time at 3AM. I know several that are using surface devices and rarely restart. Curious which setting would be the best approach to remediate this pending state.

      Reply
  2. Hello Guys.
    Great article. I would like to know the troubleshooting steps, to understand the update failure if any.

    We have a different Win 10 Update Rings policies created and deployed to respective AAD Groups. Is there a possibility to check what policy is applied on the client, except from looking at the registry under “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\current\device\Update”.

    We are using WufB for quite a time now and use update compliance to analyze the trend. I could see most of the devices with Deployment Status “Unknown”, when checked for the End User Update Status for those clients in MEMCM–>Update Ring blade, the Update Status will be a failure.

    I couldn’t get a possible reason for failure in Eventvwr and would be thankful if you could propose the troubleshooting steps for this. Any link to study and understand the concept better is also appriciated.

    Thanks in Advance.

    Reply
  3. Will Setting Catalog Update Policy work with Update ring of Windows update for business
    We have configured windows update for business by configuring the Update Ring in Intune with this we wanted to use Setting Catalog ->Windows update for business.
    Will both work together?

    Reply
  4. Hi,
    How can we manage Window update from Intune and SCCM at the same time?

    The ConfigMgr agent sets the “specify intranet…” setting using a local group policy –the client is restricted to get the update from SCCM servers.
    when we set specify intranet is not configured then client will get third-party update from SCCM or not
    please Guide.

    Reply

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.