mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' into cz-20240205-metadata
This commit is contained in:
commit
4910ab3c54
@ -72,20 +72,15 @@
|
||||
},
|
||||
"fileMetadata": {
|
||||
"feedback_system": {
|
||||
"ue-v/**/*.*": "None",
|
||||
"cortana-at-work/**/*.*": "None"
|
||||
"ue-v/**/*.*": "None"
|
||||
},
|
||||
"author":{
|
||||
"cortana-at-work//**/*.md": "aczechowski",
|
||||
"cortana-at-work//**/*.yml": "aczechowski",
|
||||
"wcd//**/*.md": "aczechowski",
|
||||
"wcd//**/*.yml": "aczechowski",
|
||||
"ue-v//**/*.md": "aczechowski",
|
||||
"ue-v//**/*.yml": "aczechowski"
|
||||
},
|
||||
"ms.author":{
|
||||
"cortana-at-work//**/*.md": "aaroncz",
|
||||
"cortana-at-work//**/*.yml": "aaroncz",
|
||||
"wcd//**/*.md": "aaroncz",
|
||||
"wcd//**/*.yml": "aaroncz",
|
||||
"ue-v//**/*.md": "aaroncz",
|
||||
@ -96,7 +91,6 @@
|
||||
"start//**/*.md": "ericpapa"
|
||||
},
|
||||
"ms.collection":{
|
||||
"cortana-at-work//**/*.md": "tier3",
|
||||
"wcd//**/*.md": "must-keep",
|
||||
"ue-v//**/*.md": [
|
||||
"must-keep",
|
||||
@ -109,7 +103,6 @@
|
||||
"✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>"
|
||||
],
|
||||
"ue-v//**/*.md": "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>",
|
||||
"cortana-at-work//**/*.md": "✅ <a href=\"https://learn.microsoft.com/windows/release-health/supported-versions-windows-client\" target=\"_blank\">Windows 10</a>",
|
||||
"wcd//**/*.md": ""
|
||||
}
|
||||
},
|
||||
|
@ -11,64 +11,61 @@ ms.localizationpriority: medium
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier2
|
||||
appliesto:
|
||||
appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||
ms.date: 12/31/2017
|
||||
---
|
||||
|
||||
# Overview of Windows as a service
|
||||
|
||||
> **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq)
|
||||
> **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2).
|
||||
|
||||
Windows as a service is a way to simplify the lives of IT pros and maintain a consistent Windows 10 experience for its customers. These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time.
|
||||
Windows as a service is a way to simplify the lives of IT pros and maintain a consistent Windows 10 experience for its customers. These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time.
|
||||
|
||||
## Building
|
||||
|
||||
Prior to Windows 10, Microsoft released new versions of Windows every few years. This traditional deployment schedule imposed a training burden on users because the feature revisions were often significant. That schedule also meant waiting long periods without new features — a scenario that doesn't work in today's rapidly changing world, a world in which new security, management, and deployment capabilities are necessary to address challenges.
|
||||
Prior to Windows 10, Microsoft released new versions of Windows every few years. This traditional deployment schedule imposed a training burden on users because the feature revisions were often significant. That schedule also meant waiting long periods without new features. That scenario doesn't always work in today's rapidly changing world, a world in which new security, management, and deployment capabilities are necessary to address challenges.
|
||||
|
||||
In the past, when Microsoft developed new versions of Windows, it typically released technical previews near the end of the process, when Windows was nearly ready to ship. With Windows 10, new features are delivered to the [Windows Insider community](/windows-insider/business/register) as soon as possible, during the development cycle, through a process called *flighting*. Organizations can see exactly what Microsoft is developing and start their testing as soon as possible.
|
||||
In the past, when Microsoft developed new versions of Windows, it typically released technical previews near the end of the process, when Windows was nearly ready to ship. With Windows 10, new features are delivered to the [Windows Insider Program](/windows-insider/) as soon as possible, during the development cycle, through a process called *flighting*. Organizations can see exactly what Microsoft is developing and start their testing as soon as possible.
|
||||
|
||||
Microsoft also depends on receiving feedback from organizations throughout the development process so that it can make adjustments as quickly as possible rather than waiting until after release. For more information about the Windows Insider Program and how to sign up, see the section [Windows Insider](#windows-insider).
|
||||
|
||||
Of course, Microsoft also performs extensive internal testing, with engineering teams installing new builds daily, and larger groups of employees installing builds frequently, all before those builds are ever released to the Windows Insider Program.
|
||||
Microsoft also runs extensive internal testing, with engineering teams installing new builds daily, and larger groups of employees installing builds frequently, all before those builds are ever released to the Windows Insider Program.
|
||||
|
||||
## Deploying
|
||||
|
||||
Deploying Windows 10 and Windows 11 is simpler than with previous versions of Windows. When migrating from earlier versions of Windows, you can use an easy in-place upgrade process to automatically preserve all apps, settings, and data. Afterwards, deployment of feature updates is equally simple.
|
||||
|
||||
|
||||
### Application compatibility
|
||||
|
||||
Application compatibility testing has historically been a burden when approaching a Windows deployment or upgrade. Application compatibility from the perspective of desktop applications, websites, and apps built on the Universal Windows Platform (UWP) has improved tremendously over older versions of Windows. For the most important business-critical applications, organizations should still perform testing regularly to validate compatibility with new builds.
|
||||
Application compatibility testing has historically been a burden when approaching a Windows deployment or upgrade. Application compatibility from the perspective of desktop applications, websites, and apps built on the Universal Windows Platform (UWP) has improved tremendously over older versions of Windows. For the most important business-critical applications, organizations should still perform testing regularly to validate compatibility with new builds.
|
||||
|
||||
## Servicing
|
||||
|
||||
Traditional Windows servicing has included several release types: major revisions (for example, the Windows 8.1, Windows 8, and Windows 7 operating systems), service packs, and monthly updates. With Windows 10 and Windows 11, there are two release types: feature updates that add new functionality and quality updates that provide security and reliability fixes.
|
||||
Traditional Windows servicing has included several release types: major revisions (for example, the Windows 8.1, Windows 8, and Windows 7 operating systems), service packs, and monthly updates. With Windows 10 and Windows 11, there are two release types: feature updates that add new functionality and quality updates that provide security and reliability fixes.
|
||||
|
||||
Servicing channels are the first way to separate users into deployment groups for feature and quality updates. For more information about developing a deployment strategy that uses servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md).
|
||||
Servicing channels are the first way to separate users into deployment groups for feature and quality updates. For more information about developing a deployment strategy that uses servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md).
|
||||
|
||||
For information about each servicing tool, see [Servicing tools](#servicing-tools).
|
||||
|
||||
There are three servicing channels, each of which provides different levels of flexibility over when these updates are delivered to client computers. For more information, see [Servicing channels](#servicing-channels).
|
||||
|
||||
|
||||
There are currently three release channels for Windows clients:
|
||||
|
||||
- The **General Availability Channel** receives feature updates as soon as they're available.
|
||||
- The **General Availability Channel** receives feature updates as soon as they're available.
|
||||
- The **Long-Term Servicing Channel**, which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years.
|
||||
- The **Windows Insider Program** provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update.
|
||||
|
||||
>[!NOTE]
|
||||
>With each General Availability release, we recommend beginning deployment right away to devices selected for early adoption (targeted validation) and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible.
|
||||
>With each General Availability release, we recommend beginning deployment right away to devices selected for early adoption (targeted validation) and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Devices on the General Availability Channel must have their diagnostic data set to **1 (Basic)** or higher in order to ensure that the service is performing at the expected quality. For instructions to set the diagnostic data level, see [Configure the operating system diagnostic data level](/windows/configuration/configure-windows-diagnostic-data-in-your-organization#diagnostic-data-levels).
|
||||
>Devices on the General Availability Channel must have their diagnostic data set to **1 (Basic)** or higher in order to ensure that the service is performing at the expected quality. For instructions to set the diagnostic data level, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization).
|
||||
|
||||
### Feature updates
|
||||
|
||||
New features are packaged into feature updates that you can deploy using existing management tools. These changes come in bite-sized chunks rather than all at once, decreasing user readiness time.
|
||||
|
||||
New features are packaged into feature updates that you can deploy using existing management tools. These changes come in bite-sized chunks rather than all at once, decreasing user readiness time.
|
||||
|
||||
### Quality updates
|
||||
|
||||
@ -76,12 +73,12 @@ Monthly updates in previous Windows versions were often overwhelming because of
|
||||
|
||||
Rather than receiving several updates each month and trying to figure out which the organization needs, which ultimately causes platform fragmentation, administrators see one cumulative monthly update that supersedes the previous month's update, containing both security and non-security fixes. This approach makes updating simpler and ensures that devices are more closely aligned with the testing done at Microsoft, reducing unexpected issues resulting from updates.
|
||||
|
||||
## Servicing channels
|
||||
## Servicing channels
|
||||
|
||||
There are three servicing channels. The [Windows Insider Program](#windows-insider) provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. The [General Availability Channel](#general-availability-channel) provides new functionality with feature update releases. Organizations can choose when to deploy updates from the General Availability Channel. The [Long-Term Servicing Channel](#long-term-servicing-channel), which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. For details about the versions in each servicing channel, see [Windows 10 release information](/windows/release-health/release-information).
|
||||
There are three servicing channels. The [Windows Insider Program](#windows-insider) provides organizations with the opportunity to test and provide feedback on features that will be shipped in the next feature update. The [General Availability Channel](#general-availability-channel) provides new functionality with feature update releases. Organizations can choose when to deploy updates from the General Availability Channel. The [Long-Term Servicing Channel](#long-term-servicing-channel), which is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATM machines, receives new feature releases every two to three years. For more information about the versions in each servicing channel, see [Windows release information](/windows/release-health/).
|
||||
|
||||
> [!NOTE]
|
||||
> Servicing channels are not the only way to separate groups of devices when consuming updates. Each channel can contain subsets of devices, which staggers servicing even further. For information about the servicing strategy and ongoing deployment process for Windows 10, including the role of servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md).
|
||||
> Servicing channels aren't the only way to separate groups of devices when consuming updates. Each channel can contain subsets of devices, which staggers servicing even further. For information about the servicing strategy and ongoing deployment process for Windows 10, including the role of servicing channels, see [Plan servicing strategy for Windows client updates](waas-servicing-strategy-windows-10-updates.md).
|
||||
|
||||
### General Availability Channel
|
||||
|
||||
@ -89,12 +86,9 @@ In the General Availability Channel, feature updates are available annually. Thi
|
||||
|
||||
When Microsoft officially releases a feature update, we make it available to any device not configured to defer feature updates so that those devices can immediately install it. Organizations that use Windows Server Update Services (WSUS), Microsoft Configuration Manager, or Windows Update for Business, however, can defer feature updates to selective devices by withholding their approval and deployment. In this scenario, the content available for the General Availability Channel is available but not necessarily immediately mandatory, depending on the policy of the management system. For more information about servicing tools, see [Servicing tools](#servicing-tools).
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> All releases of Windows 10 have **18 months of servicing for all editions**--these updates provide security and feature updates for the release. However, fall releases of the **Enterprise and Education editions** will have an **additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release**. This extended servicing window applies to Enterprise and Education editions starting with Windows 10, version 1607.
|
||||
>
|
||||
>
|
||||
> [!NOTE]
|
||||
>
|
||||
> Organizations can electively delay feature updates into as many phases as they wish by using one of the servicing tools mentioned in the section Servicing tools.
|
||||
|
||||
### Long-term Servicing Channel
|
||||
@ -105,13 +99,12 @@ Specialized systems—such as devices that control medical equipment, point-of-s
|
||||
>
|
||||
> The Long-term Servicing channel is not intended for deployment on most or all the devices in an organization; it should be used only for special-purpose devices. As a general guideline, a device with Microsoft Office installed is a general-purpose device, typically used by an information worker, and therefore it is better suited for the General Availability channel.
|
||||
|
||||
Microsoft never publishes feature updates through Windows Update on devices that run Windows 10 Enterprise LTSC. Instead, it typically offers new LTSC releases every 2–3 years, and organizations can choose to install them as in-place upgrades or even skip releases over the product's lifecycle. Always check your individual LTSC release to verify its servicing lifecycle. For more information, see [release information](/windows/release-health/release-information), or perform a search on the [product's lifecycle information](/lifecycle/products/) page.
|
||||
Microsoft never publishes feature updates through Windows Update on devices that run Windows 10 Enterprise LTSC. Instead, it typically offers new LTSC releases every 2-3 years, and organizations can choose to install them as in-place upgrades or even skip releases over the product's lifecycle. Always check your individual LTSC release to verify its servicing lifecycle. For more information, see [release information](/windows/release-health/), or perform a search on the [product's lifecycle information](/lifecycle/products/) page.
|
||||
|
||||
> [!NOTE]
|
||||
> LTSC releases will support the currently released processors and chipsets at the time of release of the LTSC. As future CPU generations are released, support will be created through future LTSC releases that customers can deploy for those systems. For more information, see **Supporting the latest processor and chipsets on Windows** in [Lifecycle support policy FAQ - Windows Products](/lifecycle/faq/windows).
|
||||
|
||||
The Long-term Servicing Channel is available only in the Windows 10 Enterprise LTSC editions. This edition of Windows doesn't include some applications, such as Microsoft Edge, Microsoft Store, Cortana (though limited search capabilities remain available), Microsoft Mail, Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, and Clock. These apps aren't supported in the Enterprise LTSC editions, even if you install by using sideloading.
|
||||
|
||||
The Long-term Servicing Channel is available only in the Windows 10 Enterprise LTSC editions. This edition of Windows doesn't include some applications, such as Microsoft Edge, Microsoft Store, Microsoft Mail, Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, and Clock. These apps aren't supported in the Enterprise LTSC editions, even if you install by using sideloading.
|
||||
|
||||
### Windows Insider
|
||||
|
||||
@ -119,18 +112,16 @@ For many IT pros, gaining visibility into feature updates early can be both intr
|
||||
|
||||
Microsoft recommends that all organizations have at least a few devices enrolled in the Windows Insider Program and provide feedback on any issues they encounter. For information about the Windows Insider Program for Business, go to [Windows Insider Program for Business](/windows-insider/business/register).
|
||||
|
||||
|
||||
|
||||
## Servicing tools
|
||||
|
||||
There are many tools you can use to service Windows as a service. Each option has its pros and cons, ranging from capabilities and control to simplicity and low administrative requirements. The following are examples of the servicing tools available to manage Windows as a service updates:
|
||||
|
||||
- **Windows Update (stand-alone)** provides limited control over feature updates, with IT pros manually configuring the device to be in the General Availability Channel. Organizations can target which devices defer updates by selecting the **Defer upgrades** check box in **Start\Settings\Update & Security\Advanced Options** on a Windows client device.
|
||||
- **Windows Update for Business** includes control over update deferment and provides centralized management using Group Policy or MDM. Windows Update for Business can be used to defer updates by up to 365 days, depending on the version. These deployment options are available to clients in the General Availability Channel. In addition to being able to use Group Policy to manage Windows Update for Business, either option can be configured without requiring any on-premises infrastructure by using Microsoft Intune.
|
||||
- **Windows Server Update Services (WSUS)** provides extensive control over updates and is natively available in the Windows Server operating system. In addition to the ability to defer updates, organizations can add an approval layer for updates and choose to deploy them to specific computers or groups of computers whenever ready.
|
||||
- **Microsoft Configuration Manager** provides the greatest control over servicing Windows as a service. IT pros can defer updates, approve them, and have multiple options for targeting deployments and managing bandwidth usage and deployment times.
|
||||
- **Windows Server Update Services (WSUS)** provides extensive control over updates and is natively available in the Windows Server operating system. In addition to the ability to defer updates, organizations can add an approval layer for updates and choose to deploy them to specific computers or groups of computers whenever ready.
|
||||
- **Microsoft Configuration Manager** provides the greatest control over servicing Windows as a service. IT pros can defer updates, approve them, and have multiple options for targeting deployments and managing bandwidth usage and deployment times.
|
||||
|
||||
**Servicing tools comparison**
|
||||
### Servicing tools comparison
|
||||
|
||||
| Servicing tool | Can updates be deferred? | Ability to approve updates | Peer-to-peer option | Additional features |
|
||||
| --- | --- | --- | --- | --- |
|
||||
@ -138,5 +129,3 @@ There are many tools you can use to service Windows as a service. Each option ha
|
||||
| Windows Update for Business | Yes | No | Delivery Optimization | Other Group Policy objects |
|
||||
| WSUS | Yes | Yes | BranchCache or Delivery Optimization | Upstream/downstream server scalability |
|
||||
| Configuration Manager | Yes | Yes | BranchCache, Client Peer Cache, or Delivery Optimization. For the latter, see [peer-to-peer content distribution](/configmgr/sum/deploy-use/optimize-windows-10-update-delivery#peer-to-peer-content-distribution) and [Optimize Windows Update Delivery](../do/waas-optimize-windows-10-updates.md) | Distribution points, multiple deployment options |
|
||||
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- tier2
|
||||
@ -41,6 +41,6 @@ Your admin contacts will receive notifications about support request updates and
|
||||
1. Under **Tenant administration** in the **Windows Autopatch** section, select **Admin contacts**.
|
||||
1. Select **+Add**.
|
||||
1. Enter the contact details including name, email, phone number and preferred language. For a support ticket, the ticket's primary contact's preferred language will determine the language used for email communications.
|
||||
1. Select an [Area of focus](#area-of-focus) and enter details of the contact's knowledge and authority in the specified area of focus.
|
||||
1. Select an [Area of focus](#area-of-focus) and enter details of the contact's knowledge and authority in the specified area of focus.
|
||||
1. Select **Save** to add the contact.
|
||||
1. Repeat for each area of focus.
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -67,7 +67,7 @@ As described in **step #4** in the previous [Detailed device registration workfl
|
||||
During the tenant enrollment process, Windows Autopatch creates two different deployment ring sets:
|
||||
|
||||
- [Service-based deployment ring set](../deploy/windows-autopatch-groups-overview.md#service-based-deployment-rings)
|
||||
- [Software update-based deployment ring set](../deploy/windows-autopatch-groups-overview.md#software-based-deployment-rings)
|
||||
- [Software update-based deployment ring set](../deploy/windows-autopatch-groups-overview.md#software-based-deployment-rings)
|
||||
|
||||
The following four Microsoft Entra ID assigned groups are used to organize devices for the service-based deployment ring set:
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -123,7 +123,7 @@ You **can’t** rename the Default Autopatch group. However, you can rename a Cu
|
||||
|
||||
## Delete a Custom Autopatch group
|
||||
|
||||
You **can’t** delete the Default Autopatch group. However, you can delete a Custom Autopatch group.
|
||||
You **can’t** delete the Default Autopatch group. However, you can delete a Custom Autopatch group.
|
||||
|
||||
**To delete a Custom Autopatch group:**
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -20,7 +20,7 @@ ms.collection:
|
||||
> [!IMPORTANT]
|
||||
> This feature is in "public preview". It is being actively developed, and may not be complete. They're made available on a “Preview” basis. You can test and use these features in production environments and scenarios, and provide feedback.
|
||||
|
||||
One of the most expensive aspects of the software update management process is to make sure devices are always healthy to receive and report software updates for each software update release cycle.
|
||||
One of the most expensive aspects of the software update management process is to make sure devices are always healthy to receive and report software updates for each software update release cycle.
|
||||
|
||||
Having a way of measuring, quickly detecting and remediating when something goes wrong with on-going change management processes is important; it helps mitigate high Helpdesk ticket volumes, reduces cost, and improves overall update management results.
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -31,7 +31,7 @@ Windows Autopatch can take over software update management control of devices th
|
||||
|
||||
### Windows Autopatch groups device registration
|
||||
|
||||
When you either create/edit a [Custom Autopatch group](../deploy/windows-autopatch-groups-overview.md#about-custom-autopatch-groups) or edit the [Default Autopatch group](../deploy/windows-autopatch-groups-overview.md#about-the-default-autopatch-group) to add or remove deployment rings, the device-based Microsoft Entra groups you use when setting up your deployment rings are scanned to see if devices need to be registered with the Windows Autopatch service.
|
||||
When you either create/edit a [Custom Autopatch group](../deploy/windows-autopatch-groups-overview.md#about-custom-autopatch-groups) or edit the [Default Autopatch group](../deploy/windows-autopatch-groups-overview.md#about-the-default-autopatch-group) to add or remove deployment rings, the device-based Microsoft Entra groups you use when setting up your deployment rings are scanned to see if devices need to be registered with the Windows Autopatch service.
|
||||
|
||||
If devices aren’t registered, Autopatch groups starts the device registration process by using your existing device-based Microsoft Entra groups instead of the Windows Autopatch Device Registration group.
|
||||
|
||||
@ -152,7 +152,7 @@ Windows 365 Enterprise gives IT admins the option to register devices with the W
|
||||
1. In the left pane, select **Devices**.
|
||||
1. Navigate to Provisioning > **Windows 365**.
|
||||
1. Select Provisioning policies > **Create policy**.
|
||||
1. Provide a policy name and select **Join Type**. For more information, see [Device join types](/windows-365/enterprise/identity-authentication#device-join-types).
|
||||
1. Provide a policy name and select **Join Type**. For more information, see [Device join types](/windows-365/enterprise/identity-authentication#device-join-types).
|
||||
1. Select **Next**.
|
||||
1. Choose the desired image and select **Next**.
|
||||
1. Under the **Microsoft managed services** section, select **Windows Autopatch**. Then, select **Next**. If the *Windows Autopatch (preview) can't manage your Cloud PCs until a Global Admin has finished setting it up.* message appears, you must [enroll your tenant](../prepare/windows-autopatch-enroll-tenant.md) to continue.
|
||||
@ -200,7 +200,7 @@ Support is available either through Windows 365, or the Windows Autopatch Servic
|
||||
|
||||
- For Windows 365 support, see [Get support](/mem/get-support).
|
||||
- For Azure Virtual Desktop support, see [Get support](https://azure.microsoft.com/support/create-ticket/).
|
||||
- For Windows Autopatch support, see [Submit a support request](/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request).
|
||||
- For Windows Autopatch support, see [Submit a support request](/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request).
|
||||
|
||||
## Device management lifecycle scenarios
|
||||
|
||||
|
@ -10,7 +10,7 @@ metadata:
|
||||
ms.topic: landing-page # Required
|
||||
author: tiaraquan #Required; your GitHub user alias, with correct capitalization.
|
||||
ms.author: tiaraquan #Required; microsoft alias of author; optional team alias.
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.date: 05/30/2022 #Required; mm/dd/yyyy format.
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
@ -34,7 +34,7 @@ landingContent:
|
||||
url: ./overview/windows-autopatch-overview.md
|
||||
- text: Windows Autopatch FAQ
|
||||
url: ./overview/windows-autopatch-faq.yml
|
||||
|
||||
|
||||
# Card (optional)
|
||||
- title: Articles and blog posts
|
||||
linkLists:
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Device alerts
|
||||
description: Provide notifications and information about the necessary steps to keep your devices up to date.
|
||||
description: Provide notifications and information about the necessary steps to keep your devices up to date.
|
||||
ms.date: 08/01/2023
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -17,14 +17,14 @@ ms.collection:
|
||||
|
||||
# Microsoft Edge
|
||||
|
||||
Windows Autopatch uses the [Stable Channel](/deployedge/microsoft-edge-channels#stable-channel) of Microsoft Edge.
|
||||
Windows Autopatch uses the [Stable Channel](/deployedge/microsoft-edge-channels#stable-channel) of Microsoft Edge.
|
||||
|
||||
## Device eligibility
|
||||
|
||||
For a device to be eligible for Microsoft Edge updates as a part of Windows Autopatch, they must meet the following criteria:
|
||||
For a device to be eligible for Microsoft Edge updates as a part of Windows Autopatch, they must meet the following criteria:
|
||||
|
||||
- The device must be powered on and have an internet connection.
|
||||
- There are no policy conflicts between Windows Autopatch policies and customer policies.
|
||||
- The device must be powered on and have an internet connection.
|
||||
- There are no policy conflicts between Windows Autopatch policies and customer policies.
|
||||
- The device must be able to access the required network endpoints to reach the Microsoft Edge update service.
|
||||
- If Microsoft Edge is open, it must restart for the update process to complete.
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- tier2
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -42,7 +42,7 @@ The following table explains the auto-populating assignment of your deployments
|
||||
| Phase 3 | Ring2 | Ring2 |
|
||||
| Phase 4 | Last | Ring3 |
|
||||
|
||||
If the Autopatch groups are edited after a release is created (Active status), the changes to the Autopatch group won’t be reflected unless you create a new custom release.
|
||||
If the Autopatch groups are edited after a release is created (Active status), the changes to the Autopatch group won’t be reflected unless you create a new custom release.
|
||||
|
||||
If you wish to change the auto-populating assignment of your deployment rings to release phases, you can do so by adding, removing, or editing the auto-populated phases.
|
||||
|
||||
@ -110,7 +110,7 @@ A phase is made of one or more Autopatch group deployment rings. Each phase repo
|
||||
|
||||
#### Details about Windows feature update policies
|
||||
|
||||
Windows Autopatch creates one Windows feature update policy per phase using the following naming convention:
|
||||
Windows Autopatch creates one Windows feature update policy per phase using the following naming convention:
|
||||
|
||||
`Windows Autopatch – DSS policy – <Release Name> – Phase <Phase Number>`
|
||||
|
||||
@ -195,12 +195,12 @@ The following table is an example of the Windows feature update policies that we
|
||||
> [!IMPORTANT]
|
||||
> You can only cancel a release under the Scheduled status. You cannot cancel a release under the **Active**, **Inactive** or **Paused** statuses.
|
||||
|
||||
**To cancel a release:**
|
||||
**To cancel a release:**
|
||||
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
1. Select **Devices** from the left navigation menu.
|
||||
1. Under the **Windows Autopatch** section, select **Release management**.
|
||||
1. In the **Release schedule** tab, select **Windows feature updates**.
|
||||
1. In the **Release schedule** tab, select **Windows feature updates**.
|
||||
1. In the **Windows feature updates** blade, select the **horizontal ellipses (…)** > **Cancel** to cancel your feature updates release.
|
||||
1. Select a reason for cancellation from the dropdown menu.
|
||||
1. Optional. Enter details about why you're pausing or resuming the selected update.
|
||||
|
@ -8,7 +8,7 @@ ms.topic: overview
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -33,7 +33,7 @@ Keeping your devices up to date is a balance of speed and stability. Windows Aut
|
||||
|
||||
## Autopatch groups
|
||||
|
||||
Autopatch groups help Microsoft Cloud-Managed services meet all organizations where they are at in their update management journey.
|
||||
Autopatch groups help Microsoft Cloud-Managed services meet all organizations where they are at in their update management journey.
|
||||
|
||||
Autopatch groups is a logical container that groups several [Microsoft Entra groups](/azure/active-directory/fundamentals/active-directory-groups-view-azure-portal), and software update policies, such as Windows Update rings and feature update policies, together.
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -17,7 +17,7 @@ ms.collection:
|
||||
|
||||
# Feature update status report
|
||||
|
||||
The Feature update status report provides a per device view of the current Windows OS upgrade status for all devices registered with Windows Autopatch.
|
||||
The Feature update status report provides a per device view of the current Windows OS upgrade status for all devices registered with Windows Autopatch.
|
||||
|
||||
**To view the Feature update status report:**
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -36,7 +36,7 @@ The Windows quality report types are organized into the following focus areas:
|
||||
|
||||
## Windows feature update reports
|
||||
|
||||
The Windows feature update reports monitor the health and activity of your deployments and help you understand if your devices are maintaining update compliance targets.
|
||||
The Windows feature update reports monitor the health and activity of your deployments and help you understand if your devices are maintaining update compliance targets.
|
||||
|
||||
If update deployments aren’t successful, Windows Autopatch provides information on update deployment failures and who needs to remediate. Certain update deployment failures might require either Windows Autopatch to act on your behalf or you to fix the issue.
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -17,7 +17,7 @@ ms.collection:
|
||||
|
||||
# Windows quality update end user experience
|
||||
|
||||
## User notifications
|
||||
## User notifications
|
||||
|
||||
In this section we'll review what an end user would see in the following three scenarios:
|
||||
|
||||
@ -58,7 +58,7 @@ The deadline specified in the update policy is five days. Therefore, once this d
|
||||
|
||||
In the following example, the user is on holiday and the device is offline beyond the quality update deadline. The user then returns to work and the device is turned back on.
|
||||
|
||||
Since the deadline has already passed, the device is granted a two-day grace period to install the update and restart. The user will be notified of a pending installation and given options to choose from. Once the two-day grace period has expired, the user is forced to restart with a 15-minute warning notification.
|
||||
Since the deadline has already passed, the device is granted a two-day grace period to install the update and restart. The user will be notified of a pending installation and given options to choose from. Once the two-day grace period has expired, the user is forced to restart with a 15-minute warning notification.
|
||||
|
||||
:::image type="content" source="../media/windows-quality-update-grace-period.png" alt-text="Windows quality update grace period" lightbox="../media/windows-quality-update-grace-period.png":::
|
||||
|
||||
@ -66,4 +66,4 @@ Since the deadline has already passed, the device is granted a two-day grace per
|
||||
|
||||
Windows Autopatch understands the importance of not disrupting end users but also updating the devices quickly. To achieve this goal, updates are automatically downloaded and installed at an optimal time determined by the device. By default, [Active hours](/windows/client-management/mdm/policy-csp-update#activehoursstart) are configured dynamically based on device usage patterns. Device restarts occur outside of active hours until the deadline is reached.
|
||||
|
||||
Windows Autopatch understands the importance of not disrupting critical devices but also updating the devices quickly. If you wish to configure a specific installation time or [Active hours](/windows/client-management/mdm/policy-csp-update#activehoursstart), use the [Customize Windows Update settings](../operate/windows-autopatch-groups-windows-update.md), and select the [**ScheduledInstall**](../operate/windows-autopatch-groups-windows-update.md#scheduled-install) option. Using this option removes the deadline enforced for a device restart. Devices with this configuration will also **not** be counted towards the [service level objective](../operate/windows-autopatch-groups-windows-quality-update-overview.md#service-level-objective).
|
||||
Windows Autopatch understands the importance of not disrupting critical devices but also updating the devices quickly. If you wish to configure a specific installation time or [Active hours](/windows/client-management/mdm/policy-csp-update#activehoursstart), use the [Customize Windows Update settings](../operate/windows-autopatch-groups-windows-update.md), and select the [**ScheduledInstall**](../operate/windows-autopatch-groups-windows-update.md#scheduled-install) option. Using this option removes the deadline enforced for a device restart. Devices with this configuration will also **not** be counted towards the [service level objective](../operate/windows-autopatch-groups-windows-quality-update-overview.md#service-level-objective).
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -68,7 +68,7 @@ The service level objective for each of these states is calculated as:
|
||||
> [!IMPORTANT]
|
||||
> This feature is in **public preview**. It's being actively developed, and might not be complete.
|
||||
|
||||
You can import your organization’s existing Intune Update rings for Windows 10 and later into Windows Autopatch. Importing your organization’s Update rings provides the benefits of the Windows Autopatch's reporting and device readiness without the need to redeploy, or change your organization’s existing update rings.
|
||||
You can import your organization’s existing Intune Update rings for Windows 10 and later into Windows Autopatch. Importing your organization’s Update rings provides the benefits of the Windows Autopatch's reporting and device readiness without the need to redeploy, or change your organization’s existing update rings.
|
||||
|
||||
Imported rings automatically register all targeted devices into Windows Autopatch. For more information about device registration, see the [device registration workflow diagram](../deploy/windows-autopatch-device-registration-overview.md#detailed-device-registration-workflow-diagram).
|
||||
|
||||
@ -82,32 +82,32 @@ Imported rings automatically register all targeted devices into Windows Autopatc
|
||||
|
||||
**To import Update rings for Windows 10 and later:**
|
||||
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
2. Select **Devices** from the left navigation menu.
|
||||
3. Under the **Windows Autopatch** section, select **Release management**.
|
||||
4. In the **Release management** blade, go to the **Release schedule** tab and select **Windows quality updates**.
|
||||
5. Select **Import Update rings for Windows 10 and later**.
|
||||
6. Select the existing rings you would like to import.
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
2. Select **Devices** from the left navigation menu.
|
||||
3. Under the **Windows Autopatch** section, select **Release management**.
|
||||
4. In the **Release management** blade, go to the **Release schedule** tab and select **Windows quality updates**.
|
||||
5. Select **Import Update rings for Windows 10 and later**.
|
||||
6. Select the existing rings you would like to import.
|
||||
7. Select **Import**.
|
||||
|
||||
### Remove an imported Update ring for Windows 10 and later
|
||||
|
||||
**To remove an Imported Update rings for Windows 10 and later:**
|
||||
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
2. Select **Devices** from the left navigation menu.
|
||||
3. Under the **Windows Autopatch** section, select **Release management**.
|
||||
4. In the **Release management** blade, go to the **Release schedule** tab and select **Windows quality updates**.
|
||||
5. Select the Update rings for Windows 10 and later you would like to remove.
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
2. Select **Devices** from the left navigation menu.
|
||||
3. Under the **Windows Autopatch** section, select **Release management**.
|
||||
4. In the **Release management** blade, go to the **Release schedule** tab and select **Windows quality updates**.
|
||||
5. Select the Update rings for Windows 10 and later you would like to remove.
|
||||
6. Select the **horizontal ellipses (...)** and select **Remove**.
|
||||
|
||||
### Known limitations
|
||||
|
||||
The following Windows Autopatch features aren't available with imported Intune Update rings:
|
||||
The following Windows Autopatch features aren't available with imported Intune Update rings:
|
||||
|
||||
- Autopatch groups and features dependent on Autopatch groups
|
||||
- Autopatch groups and features dependent on Autopatch groups
|
||||
- Moving devices in between deployment rings in devices
|
||||
- Automated deployment ring remediation functions
|
||||
- Automated deployment ring remediation functions
|
||||
- Policy health and remediation
|
||||
|
||||
## Release management
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: rekhanr
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: smithcharles
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -65,7 +65,7 @@ The type of banner that appears depends on the severity of the action. Currently
|
||||
> [!NOTE]
|
||||
> Only the Windows Autopatch sections of your tenant will be marked as **inactive**.
|
||||
|
||||
When Windows Autopatch is **inactive**, you're alerted with banners on all Windows Autopatch blades. You only have access to the Tenant management and Support requests blades. All other blades return an error message and redirect you to Tenant management blade.
|
||||
When Windows Autopatch is **inactive**, you're alerted with banners on all Windows Autopatch blades. You only have access to the Tenant management and Support requests blades. All other blades return an error message and redirect you to Tenant management blade.
|
||||
|
||||
To be taken out of the **inactive** status, you must [resolve any critical actions shown in the Tenant management blade](#critical-actions).
|
||||
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
title: Manage driver and firmware updates
|
||||
description: This article explains how you can manage driver and firmware updates with Windows Autopatch
|
||||
ms.date: 08/22/2023
|
||||
ms.date: 08/22/2023
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: andredm7
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
title: Microsoft 365 Apps for enterprise
|
||||
description: This article explains how Windows Autopatch manages Microsoft 365 Apps for enterprise updates
|
||||
ms.date: 10/27/2023
|
||||
ms.date: 10/27/2023
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -31,7 +31,7 @@ Microsoft 365 Apps deployed on the [Monthly Enterprise Channel](/deployoffice/ov
|
||||
|
||||
## Device eligibility
|
||||
|
||||
For a device to be eligible for Microsoft 365 Apps for enterprise updates (both 32-bit and 64-bit versions), as a part of Windows Autopatch, they must meet the following criteria:
|
||||
For a device to be eligible for Microsoft 365 Apps for enterprise updates (both 32-bit and 64-bit versions), as a part of Windows Autopatch, they must meet the following criteria:
|
||||
|
||||
- The device must be turned on and have an internet connection.
|
||||
- The device must be able to access the [required network endpoints](../prepare/windows-autopatch-configure-network.md#required-microsoft-product-endpoints) to reach the Office Content Delivery Network (CDN).
|
||||
@ -43,7 +43,7 @@ For a device to be eligible for Microsoft 365 Apps for enterprise updates (both
|
||||
|
||||
All devices registered for Windows Autopatch receive updates from the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview). This practice provides your users with new features each month, and they receive just one update per month on a predictable release schedule. Updates are released on the second Tuesday of the month; these updates can include feature, security, and quality updates. These updates occur automatically and pulled directly from the Office Content Delivery Network (CDN).
|
||||
|
||||
Unlike Windows update, the Office CDN doesn't make the update available to all devices at once. Over the course of the release, the Office CDN gradually makes the update available to the whole population of devices. Windows Autopatch doesn't control the order in which updates are offered to devices across your estate. After the update downloads, there's a seven day [update deadline](../references/windows-autopatch-microsoft-365-policies.md) that specifies how long the user has until the user must apply the update.
|
||||
Unlike Windows update, the Office CDN doesn't make the update available to all devices at once. Over the course of the release, the Office CDN gradually makes the update available to the whole population of devices. Windows Autopatch doesn't control the order in which updates are offered to devices across your estate. After the update downloads, there's a seven day [update deadline](../references/windows-autopatch-microsoft-365-policies.md) that specifies how long the user has until the user must apply the update.
|
||||
|
||||
## Deployment rings
|
||||
|
||||
@ -68,16 +68,16 @@ Updates are only applied when Microsoft 365 Apps aren't running. Therefore, [end
|
||||
|
||||
### Office client app configuration
|
||||
|
||||
To ensure that users are receiving automatic updates, Windows Autopatch prevents the user from opting out of automatic updates.
|
||||
To ensure that users are receiving automatic updates, Windows Autopatch prevents the user from opting out of automatic updates.
|
||||
|
||||
## Microsoft 365 Apps for enterprise update controls
|
||||
|
||||
Windows Autopatch doesn't allow you to pause or roll back an update in the Microsoft Intune admin center.
|
||||
Windows Autopatch doesn't allow you to pause or roll back an update in the Microsoft Intune admin center.
|
||||
|
||||
[Submit a support request](../operate/windows-autopatch-support-request.md) to the Windows Autopatch Service Engineering Team to pause or roll back an update when needed.
|
||||
|
||||
> [!NOTE]
|
||||
> Updates are bundled together into a single release in the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview). Therefore, we can't roll back only a portion of the update for Microsoft 365 Apps for enterprise.
|
||||
> Updates are bundled together into a single release in the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview). Therefore, we can't roll back only a portion of the update for Microsoft 365 Apps for enterprise.
|
||||
|
||||
## Allow or block Microsoft 365 App updates
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: rekhanr
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -27,7 +27,7 @@ When Windows Autopatch detects policies in the tenant are either missing or modi
|
||||
|
||||
IT admins must respond to the service-generated alerts to ensure that Autopatch services can be delivered, and devices remain eligible for the service.
|
||||
|
||||
With this feature, IT admins can:
|
||||
With this feature, IT admins can:
|
||||
|
||||
- View alerts, in line with the features you commonly use:
|
||||
- Windows Update related alerts in the Release management blade.
|
||||
@ -46,7 +46,7 @@ Alerts are raised when deployment rings don't have the required policies and the
|
||||
|
||||
The minimum role required to restore configurations is **Intune Service Administrator**. You can also perform these actions in the Global administrator role.
|
||||
|
||||
## Restore device configuration policy
|
||||
## Restore device configuration policy
|
||||
|
||||
**To initiate remediation action for device configuration alerts:**
|
||||
|
||||
@ -59,7 +59,7 @@ The minimum role required to restore configurations is **Intune Service Administ
|
||||
|
||||
There will be an alert for each policy that is missing or has deviated from the service defined values.
|
||||
|
||||
## Restore Windows Update policies
|
||||
## Restore Windows Update policies
|
||||
|
||||
**To initiate remediation actions for Windows quality update policies:**
|
||||
|
||||
@ -72,14 +72,14 @@ There will be an alert for each policy that is missing or has deviated from the
|
||||
|
||||
**To initiate remediation actions for Windows feature update policies:**
|
||||
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
1. Go to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
1. Navigate to **Devices** > **Windows Autopatch** > **Release management** > **Release schedule** > **Windows feature updates** > **Status**.
|
||||
1. Select **Policy Error** to launch the Policy error workflow.
|
||||
1. Review the message.
|
||||
1. If this is a missing policy error, select **Restore policy** to complete the workflow.
|
||||
2. If this is a modified policy, select **Submit changes** to restore to service required values.
|
||||
|
||||
## Restore deployment groups
|
||||
## Restore deployment groups
|
||||
|
||||
Windows Autopatch will automatically restore any missing groups that are required by the service. When a missing deployment group is restored, and the policies are also missing, the policies be restored to the deployment groups.
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -36,12 +36,12 @@ Updates undergo vigorous internal testing and are first released to members of T
|
||||
|
||||
## End user experience
|
||||
|
||||
Teams will check for updates every few hours behind the scenes, download the updates, and then will wait for the computer to be idle for at least 40 minutes before automatically installing the update.
|
||||
Teams will check for updates every few hours behind the scenes, download the updates, and then will wait for the computer to be idle for at least 40 minutes before automatically installing the update.
|
||||
|
||||
When an update is available, the following are required to be able to download the update:
|
||||
When an update is available, the following are required to be able to download the update:
|
||||
|
||||
- The user must be signed into both the device and Teams.
|
||||
- The device must have an internet connection.
|
||||
- The device must have an internet connection.
|
||||
- The device must be able to access the required network endpoints to reach the Teams update service.
|
||||
|
||||
> [!NOTE]
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -22,7 +22,7 @@ If you're looking to unenroll your tenant from Windows Autopatch, this article d
|
||||
> [!IMPORTANT]
|
||||
> You must be a Global Administrator to unenroll your tenant.
|
||||
|
||||
Unenrolling from Windows Autopatch requires manual actions from both you and from the Windows Autopatch Service Engineering Team. The Windows Autopatch Service Engineering Team will:
|
||||
Unenrolling from Windows Autopatch requires manual actions from both you and from the Windows Autopatch Service Engineering Team. The Windows Autopatch Service Engineering Team will:
|
||||
|
||||
- Remove Windows Autopatch access to your tenant.
|
||||
- Exclude your devices from the Windows Autopatch service. Excluding your devices from Windows Autopatch won't remove your devices from Intune, Microsoft Entra ID or Configuration Manager. The Windows Autopatch Service Engineering Team follows the same process and principles as laid out in [Exclude a device](../operate/windows-autopatch-exclude-device.md).
|
||||
@ -51,7 +51,7 @@ Unenrolling from Windows Autopatch requires manual actions from both you and fro
|
||||
**To unenroll from Windows Autopatch:**
|
||||
|
||||
1. [Submit a support request](../operate/windows-autopatch-support-request.md) and request to unenroll from the Windows Autopatch service.
|
||||
1. The Windows Autopatch Service Engineering Team communicates with your IT Administrator to confirm your intent to unenroll from the service.
|
||||
1. The Windows Autopatch Service Engineering Team communicates with your IT Administrator to confirm your intent to unenroll from the service.
|
||||
1. You have 14 days to review and confirm the communication sent by the Windows Autopatch Service Engineering Team.
|
||||
2. The Windows Autopatch Service Engineering Team can proceed sooner than 14 days if your confirmation arrives sooner.
|
||||
1. The Windows Autopatch Service Engineering Team proceeds with the removal of all items listed under [Microsoft's responsibilities during unenrollment](#microsofts-responsibilities-during-unenrollment).
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- tier2
|
||||
@ -35,7 +35,7 @@ This guide:
|
||||
|
||||
## Determine your objectives
|
||||
|
||||
This section details some common objectives when using Windows Autopatch.
|
||||
This section details some common objectives when using Windows Autopatch.
|
||||
|
||||
Once an organization is onboarded, Windows Autopatch automatically creates multiple progressive deployment rings and applies the latest updates according to Windows Autopatch recommended practices and your organization's custom configuration. While there are options to adjust configurations such as quality update cadence, the service provides you with a baseline to begin establishing your update objectives.
|
||||
|
||||
@ -46,7 +46,7 @@ Use Windows Autopatch to solve the following challenges:
|
||||
- Achieving a consistent update success rate
|
||||
- Standardize and optimize the configuration for devices, policies, tools and versions across their environment
|
||||
- Transition to modern update management by configuring Intune and Windows Update for Business
|
||||
- Make update processes more efficient and less reliant on IT admin resources
|
||||
- Make update processes more efficient and less reliant on IT admin resources
|
||||
- Address vulnerabilities and Windows quality updates as soon as possible to improve security
|
||||
- Assist with compliance to align with industry standards
|
||||
- Invest more time on value-add IT projects rather than monthly updates
|
||||
@ -112,7 +112,7 @@ If you're an existing Windows Update for Business (WUfB) or Configuration Manage
|
||||
|
||||
Customers who are using Windows Update for Business (WUfB) or Configuration Manager can quickly adopt Windows Autopatch and take advantage of the key benefits that Windows Autopatch provides.
|
||||
|
||||
When moving from Windows Update for Business (WUfB) or Configuration Manager to Windows Autopatch, you can enhance and optimize the update experience that you're already familiar with.
|
||||
When moving from Windows Update for Business (WUfB) or Configuration Manager to Windows Autopatch, you can enhance and optimize the update experience that you're already familiar with.
|
||||
|
||||
Once migrated, there are several configuration tasks that you no longer need to carry out:
|
||||
|
||||
@ -180,7 +180,7 @@ When you migrate from Configuration Manager to Windows Autopatch, the fastest pa
|
||||
| **1** | Turn on co-management | If you're using co-management across Configuration Manager and your managed devices, you meet the key requirements to use Windows Autopatch.<br><br>If you don't have co-management, see [How to use co-management in Configuration Manager](/mem/configmgr/comanage/how-to-enable) |
|
||||
| **2** | Use required co-management workloads | Using Windows Autopatch requires that your managed devices use the following three co-management workloads:<ul><li>Windows Update policies workload</li><li>Device configuration workload</li><li>Office Click-to-Run apps workload</li></ul><br>If you have these workloads configured, you meet the key requirements to use Windows Autopatch. If you don't have these workloads configured, review [How to switch Configuration Manager workloads to Intune](/mem/configmgr/comanage/how-to-switch-workloads) |
|
||||
| **3** | Prepare your policies | You should consider any existing policy configurations in your Configuration Manager (or on-premises) environment that could impact your deployment of Windows Autopatch. For more information, review [General considerations](#general-considerations) |
|
||||
| **4** | Ensure Configuration Manager collections or Microsoft Entra device groups readiness | To move devices to Windows Autopatch, you must register devices with the Windows Autopatch service. To do so, use either Microsoft Entra device groups, or Configuration Manager collections. Ensure you have either Microsoft Entra device groups or Configuration Manager collections that allow you to evaluate, pilot and then migrate to the Windows Autopatch service. For more information, see [Register your devices](../deploy/windows-autopatch-register-devices.md#before-you-begin). |
|
||||
| **4** | Ensure Configuration Manager collections or Microsoft Entra device groups readiness | To move devices to Windows Autopatch, you must register devices with the Windows Autopatch service. To do so, use either Microsoft Entra device groups, or Configuration Manager collections. Ensure you have either Microsoft Entra device groups or Configuration Manager collections that allow you to evaluate, pilot and then migrate to the Windows Autopatch service. For more information, see [Register your devices](../deploy/windows-autopatch-register-devices.md#before-you-begin). |
|
||||
|
||||
### Optimized deployment path: Configuration Manager to Windows Autopatch
|
||||
|
||||
@ -196,7 +196,7 @@ Once you have assessed your readiness state to ensure you're aligned to Windows
|
||||
|
||||
## General considerations
|
||||
|
||||
As part of your planning process, you should consider any existing enterprise configurations in your environment that could affect your deployment of Windows Autopatch.
|
||||
As part of your planning process, you should consider any existing enterprise configurations in your environment that could affect your deployment of Windows Autopatch.
|
||||
|
||||
Many organizations have existing policies and device management infrastructure, for example:
|
||||
|
||||
@ -271,7 +271,7 @@ For example, Configuration Manager Software Update Policy settings exclude Autop
|
||||
|
||||
#### Servicing profiles for Microsoft 365 Apps for enterprise
|
||||
|
||||
You can use automation to deliver monthly updates to Microsoft 365 Apps for enterprise directly from the Office Content Delivery Network (CDN) using [Servicing profiles](/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise#compatibility-with-servicing-profiles). A servicing profile takes precedence over other policies, such as a Microsoft Intune policy or the Office Deployment Tool. The servicing profile affects all devices that meet the [device eligibility requirements](/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise#device-eligibility) regardless of existing management tools in your environment.
|
||||
You can use automation to deliver monthly updates to Microsoft 365 Apps for enterprise directly from the Office Content Delivery Network (CDN) using [Servicing profiles](/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise#compatibility-with-servicing-profiles). A servicing profile takes precedence over other policies, such as a Microsoft Intune policy or the Office Deployment Tool. The servicing profile affects all devices that meet the [device eligibility requirements](/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise#device-eligibility) regardless of existing management tools in your environment.
|
||||
|
||||
You can consider retargeting servicing profiles to non-Windows Autopatch devices or if you plan to continue using them, you can [block Windows Autopatch delivered Microsoft 365 App updates](/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise#allow-or-block-microsoft-365-app-updates) for Windows Autopatch-enrolled devices.
|
||||
|
||||
@ -286,14 +286,14 @@ Part of your planning might require articulating the business benefits of moving
|
||||
|
||||
## Stakeholder communications
|
||||
|
||||
Change management relies on clear and helpful communication about upcoming changes. The best way to have a smooth deployment is to make sure end users and stakeholders are aware of all changes and disruptions. Your rollout communication plan should include all pertinent information, how to notify users, and when to communicate.
|
||||
Change management relies on clear and helpful communication about upcoming changes. The best way to have a smooth deployment is to make sure end users and stakeholders are aware of all changes and disruptions. Your rollout communication plan should include all pertinent information, how to notify users, and when to communicate.
|
||||
|
||||
- Identify groups impacted by the Autopatch deployment
|
||||
- Identify key stakeholders in the impacted groups
|
||||
- Determine the types of communications needed
|
||||
- Develop your messaging based on the [Recommended deployment steps](#recommended-deployment-steps)
|
||||
- Create your stakeholder and communication plan schedule based on the [Recommended deployment steps](#recommended-deployment-steps)
|
||||
- Have communications drafted and reviewed, and consider your delivery channels such as:
|
||||
- Have communications drafted and reviewed, and consider your delivery channels such as:
|
||||
- Social media posts
|
||||
- Internal messaging app (for example, Microsoft Teams)
|
||||
- Internal team site
|
||||
@ -319,7 +319,7 @@ If you need assistance with your Windows Autopatch deployment journey, you have
|
||||
- [Tenant enrollment support request](../prepare/windows-autopatch-enrollment-support-request.md)
|
||||
- [General support request](../operate/windows-autopatch-support-request.md)
|
||||
|
||||
First contact your Microsoft Account team who can work with you to establish any guidance or support you might need. If you don't have a Microsoft Account Team contact or wish to explore other routes, Microsoft FastTrack offers Microsoft 365 deployment guidance for customers with 150 or more licenses of an eligible subscription at no additional cost. Finally, you can also log a support request with the Windows Autopatch Service Engineering Team.
|
||||
First contact your Microsoft Account team who can work with you to establish any guidance or support you might need. If you don't have a Microsoft Account Team contact or wish to explore other routes, Microsoft FastTrack offers Microsoft 365 deployment guidance for customers with 150 or more licenses of an eligible subscription at no additional cost. Finally, you can also log a support request with the Windows Autopatch Service Engineering Team.
|
||||
|
||||
### Windows Autopatch Private Community (APC)
|
||||
|
||||
@ -333,6 +333,6 @@ Once you're underway with your deployment, consider joining the [Windows Autopat
|
||||
- Teams discussions
|
||||
- Previews
|
||||
|
||||
### Windows Autopatch Technology Adoption Program (TAP)
|
||||
### Windows Autopatch Technology Adoption Program (TAP)
|
||||
|
||||
If you have at least 500 devices enrolled in the service, and will test and give Microsoft feedback at least once a year, consider signing up to the [Windows Autopatch Technology Adoption Program (TAP)](https://aka.ms/JoinWindowsAutopatchTAP) to try out new and upcoming Windows Autopatch features.
|
||||
|
@ -7,7 +7,7 @@ metadata:
|
||||
ms.date: 12/04/2023
|
||||
audience: itpro
|
||||
ms.localizationpriority: medium
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
ms.reviwer: hathind
|
||||
@ -28,9 +28,9 @@ sections:
|
||||
Windows Autopatch supports Windows 365 for Enterprise. Windows 365 for Business isn't supported.
|
||||
- question: Does Windows Autopatch support Windows Education (A3/A5) or Windows Front Line Worker (F3) licensing?
|
||||
answer: |
|
||||
Autopatch isn't available for 'A'. Windows Autopatch supports some 'F' series licensing. For more information, see [More about licenses](../prepare/windows-autopatch-prerequisites.md#more-about-licenses).
|
||||
Autopatch isn't available for 'A'. Windows Autopatch supports some 'F' series licensing. For more information, see [More about licenses](../prepare/windows-autopatch-prerequisites.md#more-about-licenses).
|
||||
- question: Will Windows Autopatch support local domain join Windows 10?
|
||||
answer: |
|
||||
answer: |
|
||||
Windows Autopatch doesn't support local (on-premises) domain join. Windows Autopatch supports [Hybrid AD join](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or pure [Microsoft Entra join](/azure/active-directory/devices/concept-azure-ad-join-hybrid).
|
||||
- question: Will Windows Autopatch be available for state and local government customers?
|
||||
answer: |
|
||||
@ -46,8 +46,8 @@ sections:
|
||||
- [Azure Active Directory (Azure AD) Premium](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses)
|
||||
- [Hybrid Azure AD-Joined](/azure/active-directory/devices/concept-azure-ad-join-hybrid) or [Azure AD-joined only](/azure/active-directory/devices/concept-azure-ad-join-hybrid)
|
||||
- [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune)
|
||||
|
||||
Additional prerequisites for devices managed by Configuration Manager:
|
||||
|
||||
Additional prerequisites for devices managed by Configuration Manager:
|
||||
|
||||
- [Configuration Manager Co-management requirements](../prepare/windows-autopatch-prerequisites.md#configuration-manager-co-management-requirements)
|
||||
- [A supported version of Configuration Manager](/mem/configmgr/core/servers/manage/updates#supported-versions)
|
||||
@ -77,11 +77,11 @@ sections:
|
||||
- question: Can you change the policies and configurations created by Windows Autopatch?
|
||||
answer: |
|
||||
No. Don't change, edit, add to, or remove any of the configurations. Doing so might cause unintended configuration conflicts and impact the Windows Autopatch service. For more information about policies and configurations, see [Changes made at tenant enrollment](/windows/deployment/windows-autopatch/references/windows-autopatch-changes-to-tenant).
|
||||
- question: How can I represent our organizational structure with our own deployment cadence?
|
||||
- question: How can I represent our organizational structure with our own deployment cadence?
|
||||
answer: |
|
||||
[Windows Autopatch groups](../deploy/windows-autopatch-groups-overview.md) helps you manage updates in a way that makes sense for your businesses. For more information, see [Windows Autopatch groups overview](../deploy/windows-autopatch-groups-overview.md) and [Manage Windows Autopatch groups](../deploy/windows-autopatch-groups-manage-autopatch-groups.md).
|
||||
- name: Update management
|
||||
questions:
|
||||
questions:
|
||||
- question: What systems does Windows Autopatch update?
|
||||
answer: |
|
||||
- Windows 10/11 quality updates: Windows Autopatch manages all aspects of deployment rings.
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
@ -27,8 +27,8 @@ Rather than maintaining complex digital infrastructure, businesses want to focus
|
||||
- **Close the security gap**: Windows Autopatch keeps software current, there are fewer vulnerabilities and threats to your devices.
|
||||
- **Close the productivity gap**: Windows Autopatch adopts features as they're made available. End users get the latest tools to amplify their collaboration and work.
|
||||
- **Optimize your IT admin resources**: Windows Autopatch automates routine endpoint updates. IT pros have more time to create value.
|
||||
- **On-premises infrastructure**: Transitioning to the world of software as a service (SaaS) allows you to minimize your investment in on-premises hardware since updates are delivered from the cloud.
|
||||
- **Onboard new services**: Windows Autopatch makes it easy to enroll and minimizes the time required from your IT Admins to get started.
|
||||
- **On-premises infrastructure**: Transitioning to the world of software as a service (SaaS) allows you to minimize your investment in on-premises hardware since updates are delivered from the cloud.
|
||||
- **Onboard new services**: Windows Autopatch makes it easy to enroll and minimizes the time required from your IT Admins to get started.
|
||||
- **Minimize end user disruption**: Windows Autopatch releases updates in sequential deployment rings, and responding to reliability and compatibility signals, user disruptions due to updates are minimized.
|
||||
|
||||
Windows Autopatch helps you minimize the involvement of your scarce IT resources in the planning and deployment of updates for Windows, Microsoft 365 Apps, Microsoft Edge or Teams. Windows Autopatch uses careful rollout sequences and communicates with you throughout the release, allowing your IT Admins can focus on other activities and tasks.
|
||||
|
@ -8,7 +8,7 @@ ms.topic: reference
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- tier2
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -22,7 +22,7 @@ Before you enroll in Windows Autopatch, there are settings, and other parameters
|
||||
> [!IMPORTANT]
|
||||
> You must be a Global Administrator to enroll your tenant.
|
||||
|
||||
The Readiness assessment tool, accessed in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), checks management or configuration-related settings. This tool allows you to check the relevant settings, and details steps to fix any settings that aren't configured properly for Windows Autopatch.
|
||||
The Readiness assessment tool, accessed in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), checks management or configuration-related settings. This tool allows you to check the relevant settings, and details steps to fix any settings that aren't configured properly for Windows Autopatch.
|
||||
|
||||
## Step 1: Review all prerequisites
|
||||
|
||||
@ -69,7 +69,7 @@ The following are the Microsoft Entra settings:
|
||||
|
||||
### Check results
|
||||
|
||||
For each check, the tool reports one of four possible results:
|
||||
For each check, the tool reports one of four possible results:
|
||||
|
||||
| Result | Meaning |
|
||||
| ----- | ----- |
|
||||
@ -80,7 +80,7 @@ For each check, the tool reports one of four possible results:
|
||||
|
||||
## Step 3: Fix issues with your tenant
|
||||
|
||||
If the Readiness assessment tool is displaying issues with your tenant, see [Fix issues found by the Readiness assessment tool](../prepare/windows-autopatch-fix-issues.md) for more information on how to remediate.
|
||||
If the Readiness assessment tool is displaying issues with your tenant, see [Fix issues found by the Readiness assessment tool](../prepare/windows-autopatch-fix-issues.md) for more information on how to remediate.
|
||||
|
||||
## Step 4: Enroll your tenant
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- tier2
|
||||
|
@ -8,7 +8,7 @@ ms.topic: how-to
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: reference
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- highpri
|
||||
@ -20,16 +20,16 @@ ms.collection:
|
||||
> [!IMPORTANT]
|
||||
> This feature is in **public preview**. The feature is being actively developed and might not be complete.
|
||||
|
||||
During Readiness checks, if there are devices with conflicting registry configurations, notifications are listed in the **Not ready** tab. The notifications include a list of alerts that explain why the device isn't ready for updates. Instructions are provided on how to resolve the issue(s). You can review any device marked as **Not ready** and remediate them to a **Ready** state.
|
||||
During Readiness checks, if there are devices with conflicting registry configurations, notifications are listed in the **Not ready** tab. The notifications include a list of alerts that explain why the device isn't ready for updates. Instructions are provided on how to resolve the issue(s). You can review any device marked as **Not ready** and remediate them to a **Ready** state.
|
||||
|
||||
Windows Autopatch monitors conflicting configurations. You’re notified of the specific registry values that prevent Windows from updating properly. These registry keys should be removed to resolve the conflict. However, it’s possible that other services write back the registry keys. It’s recommended that you review common sources for conflicting configurations to ensure your devices continue to receive Windows Updates.
|
||||
Windows Autopatch monitors conflicting configurations. You’re notified of the specific registry values that prevent Windows from updating properly. These registry keys should be removed to resolve the conflict. However, it’s possible that other services write back the registry keys. It’s recommended that you review common sources for conflicting configurations to ensure your devices continue to receive Windows Updates.
|
||||
|
||||
The most common sources of conflicting configurations include:
|
||||
|
||||
- Active Directory Group Policy (GPO)
|
||||
- Configuration Manager Device client settings
|
||||
- Windows Update for Business (WUfB) policies
|
||||
- Manual registry updates
|
||||
- Manual registry updates
|
||||
- Local Group Policy settings applied during imaging (LGPO)
|
||||
|
||||
## Registry keys inspected by Autopatch
|
||||
@ -51,18 +51,18 @@ Windows Autopatch recommends removing the conflicting configurations. The follow
|
||||
|
||||
### Intune Remediation
|
||||
|
||||
Navigate to Intune Remediations and create a remediation using the following examples. It’s recommended to create a single remediation per value to understand if the value persists after removal.
|
||||
Navigate to Intune Remediations and create a remediation using the following examples. It’s recommended to create a single remediation per value to understand if the value persists after removal.
|
||||
|
||||
If you use either [**Detect**](#detect) and/or [**Remediate**](#remediate) actions, ensure to update the appropriate **Path** and **Value** called out in the Alert. For more information, see [Remediations](/mem/intune/fundamentals/remediations).
|
||||
|
||||
#### Detect
|
||||
|
||||
```powershell
|
||||
if((Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate).PSObject.Properties.Name -contains 'DoNotConnectToWindowsUpdateInternetLocations') {
|
||||
Exit 1
|
||||
} else {
|
||||
exit 0
|
||||
}
|
||||
if((Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate).PSObject.Properties.Name -contains 'DoNotConnectToWindowsUpdateInternetLocations') {
|
||||
Exit 1
|
||||
} else {
|
||||
exit 0
|
||||
}
|
||||
```
|
||||
|
||||
| Alert details | Description |
|
||||
@ -73,9 +73,9 @@ if((Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate).PS
|
||||
#### Remediate
|
||||
|
||||
```powershell
|
||||
if((Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate).PSObject.Properties.Name -contains 'DoNotConnectToWindowsUpdateInternetLocations') {
|
||||
Remove-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" -Name "DoNotConnectToWindowsUpdateInternetLocations"
|
||||
}
|
||||
if((Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate).PSObject.Properties.Name -contains 'DoNotConnectToWindowsUpdateInternetLocations') {
|
||||
Remove-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate" -Name "DoNotConnectToWindowsUpdateInternetLocations"
|
||||
}
|
||||
```
|
||||
|
||||
| Alert details | Description |
|
||||
@ -121,7 +121,7 @@ Windows Registry Editor Version 5.00
|
||||
"DoNotConnectToWindowsUpdateInternetLocations"=-
|
||||
"DisableWindowsUpdateAccess"=-
|
||||
"WUServer"=-
|
||||
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
|
||||
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
|
||||
"UseWUServer"=-
|
||||
"NoAutoUpdate"=-
|
||||
```
|
||||
@ -145,7 +145,7 @@ Group Policy management is the most popular client configuration tool in most or
|
||||
Configuration Manager is a common enterprise management tool that, among many things, can help manage Windows Updates. For this reason, we see many environments misconfigured when moving to either a 100% cloud or co-managed workloads even when the workloads are configured correctly. The client settings are often missed. For more information, see [About client settings and software updates](/mem/configmgr/core/clients/deploy/about-client-settings#software-updates).
|
||||
|
||||
1. Go the **Microsoft Endpoint Configuration Manager Console**.
|
||||
1. Navigate to **Administration** > **Overview** > **Client Settings**.
|
||||
1. Navigate to **Administration** > **Overview** > **Client Settings**.
|
||||
1. Ensure **Software Updates** isn’t configured. If configured, it’s recommended to remove these settings to prevent conflicts with Windows Autopatch.
|
||||
|
||||
## Third-party solutions
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
title: Driver and firmware updates for Windows Autopatch Public Preview Addendum
|
||||
description: This article explains how driver and firmware updates are managed in Autopatch
|
||||
ms.date: 06/26/2023
|
||||
ms.date: 06/26/2023
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
msreviewer: hathind
|
||||
---
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- tier2
|
||||
|
@ -8,7 +8,7 @@ ms.topic: conceptual
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: adnich
|
||||
ms.collection:
|
||||
- tier2
|
||||
@ -57,7 +57,7 @@ The following policies contain settings that apply to both Windows quality and f
|
||||
|
||||
## Windows feature update policies
|
||||
|
||||
The service deploys policies using Microsoft Intune to control how Windows feature updates are deployed to devices.
|
||||
The service deploys policies using Microsoft Intune to control how Windows feature updates are deployed to devices.
|
||||
|
||||
### Windows feature updates for Windows 10 and later
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.topic: whats-new
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
---
|
||||
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
title: What's new 2023
|
||||
description: This article lists the 2023 feature releases and any corresponding Message center post numbers.
|
||||
ms.date: 12/14/2023
|
||||
ms.date: 12/14/2023
|
||||
ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
ms.topic: whats-new
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -6,9 +6,9 @@ ms.service: windows-client
|
||||
ms.subservice: itpro-updates
|
||||
ms.topic: whats-new
|
||||
ms.localizationpriority: medium
|
||||
author: tiaraquan
|
||||
author: tiaraquan
|
||||
ms.author: tiaraquan
|
||||
manager: dougeby
|
||||
manager: aaroncz
|
||||
ms.reviewer: hathind
|
||||
ms.collection:
|
||||
- highpri
|
||||
|
@ -229,7 +229,7 @@ An issue, known as _SMBLoris_, which could result in denial of service, has been
|
||||
|
||||
Windows Defender Security Center is now called **Windows Security Center**.
|
||||
|
||||
You can still get to the app in all the usual ways. Ask Cortana to open Windows Security Center(WSC) or interact with the taskbar icon. WSC lets you manage all your security needs, including **Microsoft Defender Antivirus** and **Windows Defender Firewall**.
|
||||
You can still get to the app in all the usual ways. WSC lets you manage all your security needs, including **Microsoft Defender Antivirus** and **Windows Defender Firewall**.
|
||||
|
||||
The WSC service now requires antivirus products to run as a protected process to register. Products that haven't yet implemented this functionality won't appear in the Windows Security Center user interface, and Microsoft Defender Antivirus will remain enabled side-by-side with these products.
|
||||
|
||||
|
@ -46,7 +46,6 @@ The following features and functionalities have been removed from the installed
|
||||
|MBAE service metadata|The MBAE app experience is replaced by an MO UWP app. Metadata for the MBAE service is removed. | 20H2 |
|
||||
| Connect app | The **Connect** app for wireless projection using Miracast is no longer installed by default, but is available as an optional feature. To install the app, select **Settings** > **Apps** > **Optional features** > **Add a feature**, and then install the **Wireless Display** app. | 2004 |
|
||||
| Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) ended on August 13, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 2004 |
|
||||
| Cortana | Cortana has been updated and enhanced in the Windows 10 May 2020 Update. With [these changes](/windows/whats-new/whats-new-windows-10-version-2004#cortana), some previously available consumer skills such as music, connected home, and other non-Microsoft skills are no longer available. | 2004 |
|
||||
| Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 |
|
||||
| Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for noncellular devices.| 2004 |
|
||||
| PNRP APIs| The Peer Name Resolution Protocol (PNRP) cloud service was removed in Windows 10, version 1809. We're planning to complete the removal process by removing the corresponding APIs. | 1909 |
|
||||
|
@ -52,7 +52,10 @@ For more information about tools to evaluate readiness, see [Determine eligibili
|
||||
|
||||
## OS requirements
|
||||
|
||||
Eligible Windows 10 devices must be on version 2004 or later, and have installed the September 14, 2021 security update or later, to upgrade directly to Windows 11.
|
||||
To upgrade directly to Windows 11, eligible Windows 10 devices must meet both of the following criteria:
|
||||
|
||||
- Running Windows 10, version 2004 or later.
|
||||
- Installed the September 14, 2021 security update or later.
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
@ -68,7 +71,6 @@ Some features in Windows 11 have requirements beyond the minimum [hardware requi
|
||||
- **Auto HDR**: requires an HDR monitor.
|
||||
- **BitLocker to Go**: requires a USB flash drive. This feature is available in Windows Pro and above editions.
|
||||
- **Client Hyper-V**: requires a processor with second-level address translation (SLAT) capabilities. This feature is available in Windows Pro editions and greater.
|
||||
- **Cortana**: requires a microphone and speaker and is currently available on Windows 11 for Australia, Brazil, Canada, China, France, Germany, India, Italy, Japan, Mexico, Spain, United Kingdom, and United States.
|
||||
- **DirectStorage**: requires an NVMe SSD to store and run games that use the Standard NVM Express Controller driver and a DirectX12 GPU with Shader Model 6.0 support.
|
||||
- **DirectX 12 Ultimate**: available with supported games and graphics chips.
|
||||
- **Presence**: requires sensor that can detect human distance from device or intent to interact with device.
|
||||
|
Loading…
x
Reference in New Issue
Block a user