diff --git a/windows/deployment/windows-autopatch/TOC.yml b/windows/deployment/windows-autopatch/TOC.yml new file mode 100644 index 0000000000..c6fe58c845 --- /dev/null +++ b/windows/deployment/windows-autopatch/TOC.yml @@ -0,0 +1,64 @@ +- name: Windows Autopatch + href: index.yml + items: + - name: Overview + href: + items: + - name: What is Windows Autopatch? + href: overview/windows-autopatch-overview.md + - name: FAQ + href: overview/windows-autopatch-faq.md + - name: Prepare + href: prepare/index.md + items: + - name: Prerequisites + href: prepare/windows-autopatch-prerequisites.md + - name: Configure your network + href: prepare/windows-autopatch-configure-network.md + - name: Enroll your tenant + href: prepare/windows-autopatch-enroll-tenant.md + - name: Fix issues found by the Readiness assessment tool + href: prepare/windows-autopatch-fix-issues.md + - name: Deploy + href: deploy/index.md + items: + - name: Add and verify admin contacts + href: deploy/windows-autopatch-admin-contacts.md + - name: Register your devices + href: deploy/windows-autopatch-register-devices.md + - name: Operate + href: operate/index.md + items: + - name: Update management + href: operate/windows-autopatch-update-management.md + items: + - name: Windows quality updates + href: operate/windows-autopatch-wqu-overview.md + items: + - name: Windows quality end user experience + href: operate/windows-autopatch-wqu-end-user-exp.md + - name: Windows quality update signals + href: operate/windows-autopatch-wqu-signals.md + - name: Windows quality update communications + href: operate/windows-autopatch-wqu-communications.md + - name: Conflicting and unsupported policies + href: operate/windows-autopatch-wqu-unsupported-policies.md + - name: Microsoft 365 Apps for enterprise + href: operate/windows-autopatch-microsoft-365-apps-enterprise.md + - name: Microsoft Edge + href: operate/windows-autopatch-edge.md + - name: Microsoft Teams + href: operate/windows-autopatch-teams.md + - name: Deregister a devices + href: operate/windows-autopatch-deregister-devices.md + - name: Submit a support request + href: operate/windows-autopatch-support-request.md + - name: Reference + href: + items: + - name: Privacy + href: references/windows-autopatch-privacy.md + - name: Windows Autopatch preview addendum + href: references/windows-autopatch-preview-addendum.md + + diff --git a/windows/deployment/windows-autopatch/deploy/index.md b/windows/deployment/windows-autopatch/deploy/index.md new file mode 100644 index 0000000000..b91c6a7098 --- /dev/null +++ b/windows/deployment/windows-autopatch/deploy/index.md @@ -0,0 +1,20 @@ +--- +title: Deploying with Windows Autopatch +description: Landing page for the deploy section +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: conceptual +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Deploying with Windows Autopatch + +The following articles describe the steps you must take to deploy your devices with Windows Autopatch: + +1. [Add and verify admin contacts](windows-autopatch-admin-contacts.md) +1. [Register devices](windows-autopatch-register-devices.md) diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-admin-contacts.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-admin-contacts.md new file mode 100644 index 0000000000..47d7b8677c --- /dev/null +++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-admin-contacts.md @@ -0,0 +1,44 @@ +--- +title: Add and verify admin contacts +description: This article explains how to add and verify admin contacts +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: how-to +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Add and verify admin contacts + +There are several ways that Windows Autopatch service communicates with customers. To streamline communication and ensure we're checking with the right people when you [submit a support request](../operate/windows-autopatch-support-request.md), you must provide a set of admin contacts when you onboard with Windows Autopatch. + +> [!IMPORTANT] +> You might have already added these contacts in the Microsoft Endpoint Manager admin center during the enrollment process. If so, take a moment now to double-check that the contact list is accurate, since the Windows Autopatch Service Engineering Team must be able to reach them if a severe incident occurs. + +You must have an admin contact for each specified area of focus. The Windows Autopatch Service Engineering Team will contact these individuals for assistance with troubleshooting your support request. Admin contacts should be the best person or group that can answer questions and make decisions for different [areas of focus](#area-of-focus). + +> [!IMPORTANT] +> Whoever you choose as admin contacts, they must have the knowledge and authority to make decisions for your Windows Autopatch environment. The Windows Autopatch Service Engineering Team will contact these admin contacts for questions involving support requests. + +## Area of focus + +Your admin contacts will receive notifications about support request updates and new messages. These areas include the following: + +| Area of focus | Description | +| ----- | ----- | +| Devices | | +| Updates | | + +**To add admin contacts:** + +1. Sign into [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). +1. Under **Tenant administration** in the **Windows Autopatch** section, select **Admin contacts**. +1. Select **+Add**. +1. Enter the contact details including name, email, phone number and preferred language. For a support ticket, the ticket's primary contact's preferred language will determine the language used for email communications. +1. Select an [Area of focus](#area-of-focus) and enter details of the contact's knowledge and authority in the specified area of focus. +1. Select **Save** to add the contact. +1. Repeat for each area of focus. diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md new file mode 100644 index 0000000000..7a6f929085 --- /dev/null +++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md @@ -0,0 +1,94 @@ +--- +title: Register your devices +description: This article details how to register devices in Autopatch +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: how-to +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Register your devices + +Before Microsoft can manage your devices in Windows Autopatch, you must have devices registered with the service. + +## Before you begin + +Windows Autopatch to take over software updates management of supported devices as soon as an IT admin decides to have their tenant managed by Windows Autopatch. Windows Autopatch update management scope includes: + +- [Windows quality updates](../operate/windows-autopatch-wqu-overview.md) +- [Microsoft 365 Apps for enterprise updates](../operate/windows-autopatch-microsoft-365-apps-enterprise.md) +- [Microsoft Edge updates](../operate/windows-autopatch-edge.md) +- [Microsoft Teams updates](../operate/windows-autopatch-teams.md) + +You must choose what devices to manage with Windows Autopatch by adding either devices through direct membership or by adding other Azure Active Directory (Azure AD) dynamic groups into the Azure Active Directory assigned **Windows Autopatch Device Registration** group. Windows Autopatch runs every hour to discover new devices added to this group. Once new devices are discovered, Windows Autopatch attempts to register these devices into its service. + +To be eligible for Windows Autopatch management, devices must meet a minimum set of required software-based prerequisites: + +## Prerequisites + +- Supported Windows OS Enterprise edition version. +- Either hybrid or Azure AD joined (personal devices aren't supported). +- Managed by Microsoft Endpoint Manager (either Microsoft Endpoint Manager-Intune or Microsoft Endpoint Manager-Configuration Manager Co-management). +- Microsoft Endpoint Manager-Configuration Manager Co-management workloads (Windows Updates policies, Device configuration and Office Click-to-run) must be set to Pilot Intune or Intune. +- Last Intune device check-in completed within the last 28 days. + +For more information about each prerequisite check, see the [Prerequisites](../prepare/windows-autopatch-prerequisites.md) article. + +## About Devices Ready and Not Ready tabs + +Windows Autopatch introduces a new user interface to help IT admins manage devices and troubleshoot device readiness statuses seamlessly with actionable in-UI device readiness reports for unregistered devices or unhealthy devices. + +| Tab | Purpose | +| ----- | ----- | +| Ready tab | The purpose of the Ready tab is to show devices that were successfully registered to the Windows Autopatch service and that have met device health requirements. | +| Not ready tab | The purpose of the Not ready tab is to show devices that didn't successfully register into the Windows Autopatch service, or didn't pass one of the device readiness checks. This tab is intended to help customers identify and remediate devices that don't meet device readiness checks.

Devices successfully registered and healthy don't show up in the Not ready tab. | + +## Built-in roles required for device registration + +A role defines the set of permissions granted to users assigned to that role. You can use one of the following built-in roles in Windows Autopatch to register devices: + +- Global Administrator +- Intune Service Administrator +- Modern Workplace Intune Administrator + +> [!NOTE] +> The Modern Workplace Intune Admin role is a custom created role in Windows Autopatch. This role can assign administrators to Endpoint Manager roles, and allows you to create and configure custom Endpoint Manager roles. + +## Steps to register devices + +**To register devices into Windows Autopatch:** + +1. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/). +2. Select **Windows Autopatch** from the left navigation menu. +3. Select **Devices**. +4. Select the **Ready** tab, then select the **Windows Autopatch Device Registration** hyperlink. The Azure Active Directory group blade opens. +5. Add either devices through direct membership or other Azure Active Directory dynamic or assigned groups as nested groups in the **Windows Autopatch Device Registration** group. + +Once devices or Azure AD groups containing devices are added to the **Windows Autopatch Device Registration** group, Windows Autopatch discovers these devices and runs device-level prerequisite checks to try to register them. + +## Other device lifecycle management scenarios + +There are a few more device lifecycle management scenarios to consider when planning to register devices in Windows Autopatch. + +### Device refresh + +If a device was previously registered into the Windows Autopatch service, but it needs to be reimaged, you must run one of the device provisioning processes available in Microsoft Endpoint Manager to reimage the device. + +The device will be rejoined to Azure AD (either Hybrid or Azure AD-only). Then, re-enrolled into Intune as well. No further action is required from you or the Windows Autopatch service, because the Azure AD device ID record of that device remains the same. + +### Device repair and hardware replacement + +If you need to repair a device that was previously registered into the Windows Autopatch service, by replacing the motherboard, non-removable network interface cards (NIC) or hard drive, you must re-register the device into the Windows Autopatch service, because a new hardware ID is generated when there are major hardware changes, such as: + +- SMBIOS UUID (motherboard) +- MAC address (non-removable NICs) +- OS hard drive's serial, model, manufacturer information + +When one of these hardware changes occurs, Azure AD creates a new device ID record for that device, even if it's technically the same device. + +Any device that needs to be registered into the Windows Autopatch service must be added into the **Windows Autopatch Device Registration** Azure AD assigned group. Devices can only be added to this group if they have an Azure AD device record ID. Windows Autopatch scans the Azure AD group to discover the new device and brings it in to be registered. diff --git a/windows/deployment/windows-autopatch/index.yml b/windows/deployment/windows-autopatch/index.yml new file mode 100644 index 0000000000..888ce01b0c --- /dev/null +++ b/windows/deployment/windows-autopatch/index.yml @@ -0,0 +1,39 @@ +### YamlMime:Landing + +title: Windows Autopatch documentation # < 60 chars +summary: Windows Autopatch is a cloud service that automates Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams updates to improve security and productivity across your organization. # < 160 chars + +metadata: + title: Windows Autopatch documentation # Required; page title displayed in search results. Include the brand. < 60 chars. + description: Windows Autopatch is a cloud service that automates Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams updates to improve security and productivity across your organization. # Required; article description that is displayed in search results. < 160 chars. + keywords: device, app, update, management + ms.service: w11 #Required; service per approved list. service slug assigned to your service by ACOM. + ms.topic: landing-page # Required + author: tiaraquan #Required; your GitHub user alias, with correct capitalization. + ms.author: tiaraquan #Required; microsoft alias of author; optional team alias. + ms.date: 05/30/2022 #Required; mm/dd/yyyy format. + ms.custom: intro-hub-or-landing + +# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new + +landingContent: +# Cards and links should be based on top customer tasks or top subjects +# Start card title with a verb + # Card (optional) + - title: About Windows Autopatch + linkLists: + - linkListType: overview + links: + - text: What is Windows Autopatch? + url: ./overview/windows-autopatch-overview.md + - text: Windows Autopatch FAQ + url: ./overview/windows-autopatch-faq.md + + # Card (optional) + - title: Articles and blog posts + linkLists: + - linkListType: learn + links: + - text: "[Blog] Get current and stay current with Windows Autopatch" + url: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/get-current-and-stay-current-with-windows-autopatch/ba-p/3271839 + diff --git a/windows/deployment/windows-autopatch/media/release-process-timeline.png b/windows/deployment/windows-autopatch/media/release-process-timeline.png new file mode 100644 index 0000000000..9aab1d73cf Binary files /dev/null and b/windows/deployment/windows-autopatch/media/release-process-timeline.png differ diff --git a/windows/deployment/windows-autopatch/media/update-communications.png b/windows/deployment/windows-autopatch/media/update-communications.png new file mode 100644 index 0000000000..e4eceeccd6 Binary files /dev/null and b/windows/deployment/windows-autopatch/media/update-communications.png differ diff --git a/windows/deployment/windows-autopatch/media/windows-quality-force-update.png b/windows/deployment/windows-autopatch/media/windows-quality-force-update.png new file mode 100644 index 0000000000..147d61e752 Binary files /dev/null and b/windows/deployment/windows-autopatch/media/windows-quality-force-update.png differ diff --git a/windows/deployment/windows-autopatch/media/windows-quality-typical-update-experience.png b/windows/deployment/windows-autopatch/media/windows-quality-typical-update-experience.png new file mode 100644 index 0000000000..830f9f1428 Binary files /dev/null and b/windows/deployment/windows-autopatch/media/windows-quality-typical-update-experience.png differ diff --git a/windows/deployment/windows-autopatch/media/windows-quality-update-grace-period.png b/windows/deployment/windows-autopatch/media/windows-quality-update-grace-period.png new file mode 100644 index 0000000000..043e275574 Binary files /dev/null and b/windows/deployment/windows-autopatch/media/windows-quality-update-grace-period.png differ diff --git a/windows/deployment/windows-autopatch/operate/index.md b/windows/deployment/windows-autopatch/operate/index.md new file mode 100644 index 0000000000..44954ce00f --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/index.md @@ -0,0 +1,25 @@ +--- +title: Operating with Windows Autopatch +description: Landing page for the operate section +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: conceptual +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Operating with Windows Autopatch + +This section includes information about Windows Autopatch update management, types of updates managed by Windows Autopatch, and how to contact the Windows Autopatch Service Engineering Team: + +- [Update management](windows-autopatch-update-management.md) +- [Windows quality updates](windows-autopatch-wqu-overview.md) +- [Microsoft 365 Apps for enterprise updates](windows-autopatch-microsoft-365-apps-enterprise.md) +- [Microsoft Edge updates](windows-autopatch-edge.md) +- [Microsoft Teams updates](windows-autopatch-teams.md) +- [Deregister devices](windows-autopatch-deregister-devices.md) +- [Submit a support request](windows-autopatch-support-request.md) diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-deregister-devices.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-deregister-devices.md new file mode 100644 index 0000000000..0f18908fb4 --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-deregister-devices.md @@ -0,0 +1,43 @@ +--- +title: Deregister a device +description: This article explains how to deregister devices +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: how-to +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Deregister a device + +To avoid end-user disruption, device de-registration in Windows Autopatch only deletes the Windows Autopatch device record itself. Device de-registration can't delete Microsoft Intune and/or the Azure Active Directory device records. Microsoft assumes you'll keep managing those devices yourself in some capacity. + +**To deregister a device:** + +1. Sign into the [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). +1. Select **Windows Autopatch** in the left navigation menu. +1. Select **Devices**. +1. In either **Ready** or **Not ready** tab, select the device(s) you want to deregister. +1. Once a device or multiple devices are selected, select **Device actions**, then select **Deregister device**. + +## Excluded devices + +When you deregister a device from the Windows Autopatch service, the device is flagged as "excluded". Windows Autopatch doesn't try to re-register the device into the service again, because the de-registration command doesn't trigger device membership removal from the **Windows Autopatch Device Registration** Azure Active Directory group. This is due to a direct membership removal limitation present in Azure Active Directory dynamic groups. + +If you want to re-register a device that was previously deregistered from Windows Autopatch, you must [submit a support request](../operate/windows-autopatch-support-request.md) with the Windows Autopatch Service Engineering Team to request the removal of the "excluded" flag set during the de-registration process. After the Windows Autopatch Service Engineering Team removes the flag, you can re-register a device or a group of devices. + +## Hiding unregistered devices + +You can hide unregistered devices you don't expect to be remediated anytime soon. + +**To hide unregistered devices:** + +1. Sign into the [Microsoft Endpoint Manager](https://endpoint.microsoft.com/). +1. Select **Windows Autopatch** in the left navigation menu. +1. Select **Devices**. +1. In the **Not ready** tab, select an unregistered device or a group of unregistered devices you want to hide then select **Status == All**. +1. Unselect the **Registration failed** status checkbox from the list. diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-edge.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-edge.md new file mode 100644 index 0000000000..3f0a1a95c6 --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-edge.md @@ -0,0 +1,42 @@ +--- +title: Microsoft Edge +description: This article explains how Microsoft Edge updates are managed in Windows Autopatch +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: conceptual +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Microsoft Edge + +Windows Autopatch uses the [Stable channel](/deployedge/microsoft-edge-channels%22%20/l%20%22stable-channel) of Microsoft Edge. + +## Device eligibility + +For a device to be eligible for Microsoft Edge updates as a part of Windows Autopatch, they must meet the following criteria: + +- The device must be powered on and have an internet connection. +- There are no policy conflicts between Windows Autopatch policies and customer policies. +- The device must be able to access the required network endpoints to reach the Microsoft Edge update service. +- If Microsoft Edge is open, it must restart for the update process to complete. + +## Update release schedule + +Microsoft Edge will check for updates every 10 hours. Quality updates occur weekly by default. Feature updates occur automatically every four weeks and are rolled out [progressively](/deployedge/microsoft-edge-update-progressive-rollout) by the Microsoft Edge product group to ensure the best experience for customers. All users will see the update within a few days of the initial release. + +Browser updates with critical security fixes will have a faster rollout cadence than updates that don't have critical security fixes to ensure prompt protection from vulnerabilities. + +Devices in the Test device group receive feature updates from the [Beta channel](/deployedge/microsoft-edge-channels#beta-channel). This channel is fully supported and automatically updated with new features approximately every four weeks. + +## Pausing and resuming updates + +Currently, Windows Autopatch can't pause or resume Microsoft Edge updates. + +## Incidents and outages + +If you're experiencing issues related to Microsoft Edge updates, [submit a support request](../operate/windows-autopatch-support-request.md). diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise.md new file mode 100644 index 0000000000..b9661b4170 --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-microsoft-365-apps-enterprise.md @@ -0,0 +1,108 @@ +--- +title: Microsoft 365 Apps for enterprise +description: This article explains how Microsoft 365 Apps for enterprise updates are managed in Windows Autopatch +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: conceptual +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Microsoft 365 Apps for enterprise + +## Service level objective + +Windows Autopatch aims to keep at least 90% of eligible devices on a [supported version](/deployoffice/overview-update-channels#support-duration-for-monthly-enterprise-channel) of the Monthly Enterprise Channel (MEC) for [Enterprise Standard Suite](/deployoffice/about-microsoft-365-apps) (Access, Excel, OneNote, Outlook, PowerPoint, and Word). Microsoft 365 Apps deployed on the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview) are supported for two months. + +> [!NOTE] +> [Microsoft Teams](../operate/windows-autopatch-teams.md) uses a different update channel from the rest of Microsoft 365 Apps. + +## Device eligibility + +For a device to be eligible for Microsoft 365 Apps for enterprise updates, as a part of Windows Autopatch, they must meet the following criteria: + +- Microsoft 365 Apps for enterprise 64-bit must be installed. +- There are no policy conflicts between Microsoft Autopatch policies and customer policies. +- The device must have checked into the Intune service in the last five days. + +## Update release schedule + +All devices registered for Windows Autopatch will receive updates from the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview). This practice provides your users with new features each month, and they'll receive just one update per month on a predictable release schedule. Updates are released on the second Tuesday of the month; these updates can include feature, security, and quality updates. These updates occur automatically and are pulled directly from the Office Content Delivery Network (CDN). + +Unlike Windows update, the Office CDN doesn't make the update available to all devices at once. Over the course of the release, the Office CDN gradually makes the update available to the whole population of devices. Windows Autopatch doesn't control the order in which updates are offered to devices across your estate. After the update has been downloaded, there's a three-day [update deadline](/deployoffice/configure-update-settings-microsoft-365-apps) that specifies how long the user has until the user must apply the update. + +## Update rings + +Since the Office CDN determines when devices are offered updates, Windows Autopatch doesn't use rings to control the rollout of these updates. + +## End user experience + +There are two parts of the end user experience that are configured by Windows Autopatch: + +- Behavior during updates +- Office client + +### Behavior during updates + +Updates can only be applied when Microsoft 365 Apps aren't running. Therefore, notifications usually appear because the user is working in a Microsoft 365 App, such as Microsoft Outlook, and hasn't closed it in several days. + +Once the device has downloaded the update, users are given notifications leading up to the deadline. They'll receive the following message in the notification area in Windows, reminding them that updates are ready to be applied. + +*Updates ready to be applied +Updates are required by your system admin are blocked by one or more apps. Office will restart at mm/dd/yyyy h:mm AM/PM to apply updates.* + +Alternatively, users can select **Update now** to apply the updates. The user is then prompted to close all open Office programs. After the updates are applied, the message disappears. + +If the deadline arrives and the updates still aren't applied, users see a dialog box that warns them that they have 15 minutes before the updates are applied. + +This warning gives users 15 minutes to save and close any work. When the countdown reaches 00∶00, any open Office programs are closed, and the updates are applied. + +### Office client app configuration + +To ensure that users are receiving automatic updates, Windows Autopatch prevents the user from opting out of automatic updates. + +## Update controls + +If Windows Autopatch detects issues between versions of Microsoft 365 Apps for enterprise, we might pause the update by forcing Microsoft 365 Apps to stay on a specific version. + +Windows Autopatch will either: + +- Choose to stay on the previous version for rings that haven't received the update yet. +- Force all devices to roll back to the previous version. + +> [!NOTE] +> Windows Autopatch doesn't currently allow customers to force their devices to stay on a previous version or rollback to a previous version. + +Since Windows quality updates are bundled together into a single release in the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview), we can't roll back only a portion of the update for Microsoft 365 Apps for enterprise. + +## Conflicting and unsupported policies + +Deploying any of the following policies to a managed device will make that device ineligible for management since the device will prevent us from delivering the service as designed. + +### Update policies + +Window Autopatch deploys mobile device management (MDM) policies to configure Microsoft 365 Apps and requires a specific configuration. If any [Microsoft 365 Apps update settings](/deployoffice/configure-update-settings-microsoft-365-apps) are deployed which conflict with our policies, then the device won't be eligible for management. + +| Update setting | Value | Usage reason | +| ----- | ----- | ----- | +| Set updates to occur automatically | Enabled | Enable automatic updates | +| Specify a location to look for updates | Blank | Don't use this setting since it overwrites the update branch | +| Update branch | Monthly Enterprise | Supported branch for Windows Autopatch | +| Specify the version of Microsoft 365 Apps to update to | Variable | Used to roll back to a previous version if an error occurs | +| Set a deadline by when updates must be applied | 3 | Update deadline | +| Hide update notifications from users | Turned off | Users should be notified when Microsoft 365 Apps are being updated | +| Hide the option to turn on or off automatic Office updates | Turned on | Prevents users from disabling automatic updates | + +## Microsoft 365 Apps servicing profiles + +A service profile takes precedence over other management tools, such as Microsoft Endpoint Manager or the Office Deployment Tool. This means that the servicing profile will affect all devices that meet the above requirements regardless of existing management tools in your environment. So, if you're targeting a managed device with a servicing profile it will be ineligible for Microsoft 365 App update management. + +## Incidents and outages + +If devices in your tenant aren't meeting the [service level objective](#service-level-objective) for Microsoft 365 Apps for enterprise updates, an incident will be raised. The Windows Autopatch Service Engineering Team will work to bring the devices back into compliance. + +If you're experiencing issues related to Microsoft 365 Apps for enterprise updates, [submit a support request](../operate/windows-autopatch-support-request.md). diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request.md new file mode 100644 index 0000000000..f6e0614363 --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-support-request.md @@ -0,0 +1,71 @@ +--- +title: Submit a support request +description: Details how to contact the Windows Autopatch Service Engineering Team and submit support requests +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: how-to +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Submit a support request + +> [!IMPORTANT] +> Make sure you've [added and verified your admin contacts](../deploy/windows-autopatch-admin-contacts.md). The Windows Autopatch Service Engineering Team will contact these individuals for assistance with troubleshooting issues. + +You can submit support tickets to Microsoft using the Windows Autopatch admin center. Email is the recommended approach to interact with the Windows Autopatch Service Engineering Team. + +## Submit a new support request + +Support requests are triaged and responded to as they're received. + +**To submit a new support request:** + +1. Sign into [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant administration** menu. +1. In the **Windows Autopatch** section, select **Service requests**. +1. In the **Service requests** section, select **+ New support request**. +1. Enter your question(s) and/or a description of the problem. +1. Review all the information you provided for accuracy. +1. When you're ready, select **Create**. + +## Manage an active support request + +The primary contact for the support request will receive email notifications when a case is created, assigned to a service engineer to investigate, and mitigated. If, at any point, you have a question about the case, the best way to get in touch is to reply directly to one of those emails. If we have questions about your request or need more details, we'll email the primary contact listed on the support requests. + +## View all your active support requests + +You can see the summary status of all your support requests. At any time, you can use the portal to see all active support requests in the last six months. + +**To view all your active support requests:** + +1. Sign into [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant Administration** menu. +1. In the **Windows Autopatch** section, select **Service request**. +1. From this view, you can export the summary view or select any case to view the details. + +## Edit support request details + +You can edit support request details, for example, updating the primary case contact. + +**To edit support request details:** + +1. Sign into [Microsoft Endpoint Manager](https://endpoint.microsoft.com/) and navigate to the **Tenant Administration** menu. +1. In the **Windows Autopatch** section, select **Service request**. +1. In the **Service requests** section, use the search bar or filters to find the case you want to edit. +1. Select the case to open the request's details. +1. Scroll to the bottom of the request details and select **Edit**. +1. Update the editable information, add attachments to the case, or add a note for the Windows Autopatch Service Engineering Team. +1. Select **Save**. + +Once a support request is mitigated, it can no longer be edited. If a request has been mitigated for less than 24 hours, you'll see the option to reactivate instead of edit. Once reactivated, you can again edit the request. + +## Microsoft FastTrack + +[Microsoft FastTrack](https://www.microsoft.com/en-us/fasttrack) offers Microsoft 365 deployment guidance for customers with 150 or more licenses of an eligible subscription at no additional cost. FastTrack Specialists can help customers work through the Windows Autopatch technical prerequisites described in the [FAQ](../overview/windows-autopatch-faq.md). For more information, visit the [FastTrack website](https://www.microsoft.com/en-ca/fasttrack?rtc=1). + +Customers who need help with Microsoft 365 workloads can sign in to https://fasttrack.microsoft.com/ with a valid Azure ID and submit a Request for Assistance. + + Contact your Microsoft account team if you need additional assistance. diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-teams.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-teams.md new file mode 100644 index 0000000000..8cf360c310 --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-teams.md @@ -0,0 +1,53 @@ +--- +title: Microsoft Teams +description: This article explains how Microsoft Teams updates are managed in Windows Autopatch +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: conceptual +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Microsoft Teams + +Windows Autopatch uses the [standard automatic update channel](/microsoftteams/teams-client-update#can-admins-deploy-updates-instead-of-teams-auto-updating) for Microsoft Teams. + +## Device eligibility + +For a device to be eligible for automated Teams updates as a part of Windows Autopatch they must meet the following criteria: + +- Microsoft Teams must be installed on the device. +- The user must be signed into both the device and Teams. +- The device must be able to access the Teams update service [network endpoints](../prepare/windows-autopatch-configure-network.md). +- Once the update is downloaded, the user must be logged in with the device in an idle state for at least 40 minutes to ensure that Teams can automatically update. + +## Update release schedule + +The Teams desktop client updates are released once a month for all users, and twice a month for members of the Technology Adoption Program (TAP). + +Updates undergo vigorous internal testing and are first released to members of TAP for validation. The update usually takes place on a Monday. If a critical update is needed, Teams will bypass this schedule and release the update as soon as it's available. + +## End user experience + +Teams will check for updates every few hours behind the scenes, download the updates, and then will wait for the computer to be idle for at least 40 minutes before automatically installing the update. + +When an update is available, the following are required to be able to download the update: + +- The user must be signed into both the device and Teams. +- The device must have an internet connection. +- The device must be able to access the required network endpoints to reach the Teams update service. + +> [!NOTE] +> If a user is on a version of Teams that is out of date, Teams will force the user to update prior to allowing them to use the application. + +## Pausing and resuming updates + +Windows Autopatch can't pause or resume Teams updates. + +## Incidents and outages + +If you're experiencing issues related to Teams updates, [submit a support request](../operate/windows-autopatch-support-request.md). diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-update-management.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-update-management.md new file mode 100644 index 0000000000..fb113c593d --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-update-management.md @@ -0,0 +1,69 @@ +--- +title: Update management +description: This article provides an overview of how updates are handled in Autopatch +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: overview +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Update management + +Keeping your devices up to date is a balance of speed and stability. Windows Autopatch connects all devices to a modern cloud-based infrastructure to manage updates. + +## Update types + +| Update type | Description | +| ----- | ----- | +| Window quality update | Windows Autopatch uses four update rings to manage Windows quality updates. For more detailed information, see [Windows quality updates](../operate/windows-autopatch-wqu-overview.md). | +| Anti-virus definition | Updated with each scan. | +| Microsoft 365 Apps for enterprise | For more information, see Microsoft 365 Apps for enterprise. | +| Microsoft Edge | For more information, see [Microsoft Edge](../operate/windows-autopatch-edge.md). | +| Microsoft Teams | For more information, see [Microsoft Teams](../operate/windows-autopatch-teams.md). | + +## Update rings + +> [!NOTE] +> Update rings only apply to Windows quality updates. + +During enrollment, Windows Autopatch creates four Azure Active Directory groups that are used to segment devices into update rings: + +1. Modern Workplace Devices - Test +2. Modern Workplace Devices - First +3. Modern Workplace Devices - Fast +4. Modern Workplace Devices - Broad + +Each of the update rings has a different purpose and assigned a set of policies to control the rollout of updates in each management area. + +When a device is enrolled into the Windows Autopatch service, the device is assigned to an update ring so that we have the right distributions across your estate. The distribution of each ring is designed to release to as few devices as possible to get the signals needed to make a quality evaluation of a given release. + +> [!NOTE] +> You can't create additional rings for managed devices and must use the four rings provided by Windows Autopatch. + +| Ring | Default device count | Description +| ----- | ----- | ----- | +| Test | zero | Windows Autopatch doesn't automatically add devices to this ring. You must manually add devices to the Test ring. The recommended number of devices in this ring, based upon your environment size, is as follows:

Devices in this group are intended for your IT Administrators and testers since changes are released here first. This release schedule provides your organization the opportunity to validate updates prior to reaching production users. | +| First | 1% | The First ring is the first group of production users to receive a change.

This group is the first set of devices to send data to Windows Autopatch and are used to generate a health signal across all customers. For example, we can generate a statistically significant signal saying that critical errors are trending up in a specific release for all customers but can't be confident that it's doing so in your environment.

Since Windows Autopatch doesn't yet have sufficient data to inform a release decision, devices in this ring might experience outages if there are scenarios that weren't covered during testing in the Test ring. | +| Fast | 9% | The Fast ring is the second group of production users to receive changes. The signals from the First ring are considered as a part of the release process to the Broad ring.

The goal with this ring is to cross the 500-device threshold needed to generate statistically significant analysis at the tenant level. These extra devices allow Windows Autopatch to consider the effect of a release on the rest of your devices and evaluate if a targeted action for your tenant is needed.

| +| Broad | 90% | The Broad ring is the last group of users to receive changes. Since it contains most of the devices enrolled in Windows Autopatch, it favors stability over speed in deployment.| + +## Moving devices between rings + +If you want to move separate devices to different rings, repeat the following steps for each device: + +1. In Microsoft Endpoint Manager, select **Devices** in the left pane. +2. In the **Windows Autopatch** section, select **Devices**. +3. Select the devices you want to assign. All selected devices will be assigned to the ring you specify. +4. Select **Device actions** from the menu. +5. Select **Assign device to ring**. A fly-in opens. +6. Use the dropdown menu to select the ring to move devices to, and then select **Save**. The **Ring assigned by** column will change to **Pending**. + +When the assignment is complete, the **Ring assigned by** column will change to Admin (indicates that you made the change) and the **Ring** column will show the new ring assignment. + +> [!NOTE] +> You can't move devices to other rings if they're in the "error" or "pending" registration state.

If a device hasn't been properly removed, it could show a status of "ready." If you move such a device, it's possible that the move won't be complete. If you don't see the **Ring assigned by column** change to **Pending** in Step 5, check that the device is available by searching for it in Intune. For more information, see [Device details in Intune](/mem/intune/remote-actions/device-inventory). diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-wqu-communications.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-wqu-communications.md new file mode 100644 index 0000000000..f4eab55834 --- /dev/null +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-wqu-communications.md @@ -0,0 +1,45 @@ +--- +title: Windows quality update communications +description: This article explains Windows quality update communications +ms.date: 05/30/2022 +ms.prod: w11 +ms.technology: windows +ms.topic: conceptual +ms.localizationpriority: medium +author: tiaraquan +ms.author: tiaraquan +manager: dougeby +msreviewer: hathind +--- + +# Windows quality update communications + +There are three categories of communication that are sent out during a Windows quality update: + +- [Standard communications](#standard-communications) +- [Communications during release](#communications-during-release) +- [Incident communications](#incident-communications) + +Communications are posted to Message center, Service health dashboard, and the Windows Autopatch messages section of the Microsoft Endpoint Manager admin center as appropriate for the type of communication. + +:::image type="content" source="../media/update-communications.png" alt-text="Update communications timeline"::: + +## Standard communications + +| Communication | Location | Timing | Description | +| ----- | ----- | ----- | ----- | +| Release schedule |