12 KiB
title, description, ms.date, ms.service, ms.subservice, ms.topic, ms.localizationpriority, author, ms.author, manager, ms.reviewer, ms.collection
title | description | ms.date | ms.service | ms.subservice | ms.topic | ms.localizationpriority | author | ms.author | manager | ms.reviewer | ms.collection | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Hotpatch updates | Use Hotpatch updates to receive security updates without restarting your device | 04/11/2025 | windows-client | autopatch | how-to | medium | tiaraquan | tiaraquan | aaroncz | adnich |
|
Hotpatch updates
Hotpatch updates are designed to reduce downtime and disruptions. Hotpatch updates are Monthly B release security updates that install and take effect without requiring you to restart the device. By minimizing the need to restart, these updates help ensure faster compliance, making it easier for organizations to maintain security while keeping workflows uninterrupted.
Hotpatch is an extension of Windows Update and requires Autopatch to create and deploy hotpatches to devices enrolled in the Autopatch quality update policy.
Key benefits
- Hotpatch updates streamline the installation process and enhance compliance efficiency.
- No changes are required to your existing update ring configurations. Your existing ring configurations are honored alongside Hotpatch policies.
- The Hotpatch quality update report provides a per policy level view of the current update statuses for all devices that receive Hotpatch updates.
Prerequisites
To benefit from Hotpatch updates, devices must meet the following prerequisites:
- For licensing requirements, see Prerequisites
- Windows 11 Enterprise version 24H2 or later
- Devices must be on the latest baseline release version to qualify for Hotpatch updates. Microsoft releases Baseline updates quarterly as standard cumulative updates. For more information on the latest schedule for these releases, see Release notes for Hotpatch.
- Microsoft Intune to manage hotpatch update deployment with the Windows quality update policy with hotpatch turned on.
Operating system configuration prerequisites
To prepare a device to receive Hotpatch updates, configure the following operating system settings on the device. You must configure these settings for the device to be offered the Hotpatch update and to apply all Hotpatch updates.
Virtualization based security (VBS)
VBS must be turned on for a device to be offered Hotpatch updates. For information on how to set and detect if VBS is enabled, see Virtualization-based Security (VBS).
Note
Devices might be temporarily ineligible because they don’t have VBS enabled or aren’t currently on the latest baseline release. To ensure that all your Windows devices are configured properly to be eligible for hotpatch updates, see Troubleshoot hotpatch updates.
Arm 64 devices must disable compiled hybrid PE usage (CHPE) (Arm 64 CPU Only)
Important
Arm 64 devices are in public preview. It's being actively developed and might not be complete. They're made available on a "Preview" basis. You can test and use these features in production environments and scenarios and provide feedback.
This requirement only applies to Arm 64 CPU devices when using Hotpatch updates. Hotpatch updates aren't compatible with servicing CHPE OS binaries located in the %SystemRoot%\SyChpe32
folder.
To ensure all the Hotpatch updates are applied, you must set the CHPE disable flag and restart the device to disable CHPE usage. You only need to set this flag one time. The registry setting remains applied through updates.
Important
This setting is required because it forces the operating system to use the emulation x86-only binaries instead of CHPE binaries on Arm 64 devices. CHPE binaries include native Arm 64 code to improve performance, excluding the CHPE binaries might affect performance or compatibility. Be sure to test application compatibility and performance before rolling out Hotpatch updates widely on Arm 64 CPU based devices.
To disable CHPE, create and/or set the following DWORD registry key:
Path: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management
DWORD key value: HotPatchRestrictions=1
Note
There are no plans to support hotpatch updates on Arm64 devices with CHPE enabled. Disabling CHPE is required only for Arm64 devices. AMD and Intel CPUs don’t have CHPE.
If you choose to no longer use Hotpatch updates, clear the CHPE disable flag (HotPatchRestrictions=0
) then restart the device to turn on CHPE usage.
Ineligible devices
Devices that don't meet one or more prerequisites automatically receive the Latest Cumulative Update (LCU) instead. Latest Cumulative Update (LCU) contains monthly updates that supersede the previous month's updates containing both security and nonsecurity releases.
LCUs requires you to restart the device, but the LCU ensures that the device remains fully secure and compliant.
Note
If devices aren't eligible for Hotpatch updates, these devices are offered the LCU. The LCU keeps your configured Update ring settings, it doesn't change the settings.
Release cycles
For more information about the release calendar for hotpatch updates, see Release notes for Hotpatch.
- Baseline: Includes the latest security fixes, cumulative new features, and enhancements. Restart required.
- Hotpatch: Includes security updates. No restarted required.
Quarter | Baseline updates (requires restart) | Hotpatch (no restart required) |
---|---|---|
1 | January | February and March |
2 | April | May and June |
3 | July | August and September |
4 | October | November and December |
Hotpatch on Windows 11 Enterprise or Windows Server 2025
Note
Hotpatch is also available on Windows Server and Windows 365. For more information, see Hotpatch for Windows Server Azure Edition.
Hotpatch updates are similar between Windows 11 and Windows Server 2025.
- Windows Autopatch manages Windows 11 updates
- Azure Update Manager and optional Azure Arc subscription for Windows 2025 Datacenter/Standard Editions (on-premises) manages Windows Server 2025 Datacenter Azure Edition. For more information, on Windows Server and Windows 365, see Hotpatch for Windows Server Azure Edition.
The calendar dates, eight hotpatch months, and four baseline months, planned each year are the same for all the hotpatch-supported operating systems (OS). It’s possible for additional baseline months for one OS (for example, Windows Server 2022), while there are hotpatch months for another OS, such as Server 2025 or Windows 11, version 24H2. Review the release notes from Windows release health to keep up to date.
Enroll devices to receive Hotpatch updates
Note
If you're using Autopatch groups and want your devices to receive Hotpatch updates, you must create a Hotpatch policy and assign devices to it. Turning on Hotpatch updates doesn't change the deferral setting applied to devices within an Autopatch group.
To enroll devices to receive Hotpatch updates:
- Go to the Intune admin center.
- Select Devices from the left navigation menu.
- Under the Manage updates section, select Windows updates.
- Go to the Quality updates tab.
- Select Create, and select Windows quality update policy.
- Under the Basics section, enter a name for your new policy and select Next.
- Under the Settings section, set "When available, apply without restarting the device ("Hotpatch") to Allow. Then, select Next.
- Select the appropriate Scope tags or leave as Default. Then, select Next.
- Assign the devices to the policy and select Next.
- Review the policy and select Create.
These steps ensure that targeted devices, which are eligible to receive Hotpatch updates, are configured properly. Ineligible devices are offered the latest cumulative updates (LCU).
Note
Turning on Hotpatch updates doesn't change the existing deadline-driven or scheduled install configurations on your managed devices. Deferral and active hour settings still apply.
Roll back a hotpatch update
Automatic rollback of a Hotpatch update isn’t supported but you can uninstall them. If you experience an unexpected issue with hotpatch updates, you can investigate by uninstalling the hotpatch update and installing the latest standard cumulative update (LCU) and restart. Uninstalling a hotpatch update is quick, however, it does require a device restart.
Troubleshoot hotpatch updates
Step 1: Verify the device is eligible for hotpatch updates and on a hotpatch baseline before the hotpatch update is installed
Hotpatching follows the hotpatch release cycle. Review the prerequisites to ensure the device is eligible for hotpatch updates. For information on devices that don’t meet the prerequisites, see Ineligible devices.
For the latest release schedule, see the hotpatch release notes. For information on Windows update history, see Windows 11, version 24H2 update history.
Step 2: Verify the device has Virtualization-based security (VBS) turned on
- Select Start, and enter
System information
in the Search. - Select System information from the results.
- Under System summary, under the Item column, find Virtualization-based security.
- Under the Value column, ensure it states Running.
Step 3: Verify the device is properly configured to turn on hotpatch updates
- In Intune, review your configured policies within Autopatch to see which groups of devices are targeted with a hotpatch policy by going to the Windows Update > Quality Updates page.
- Ensure the hotpatch update policy is set to Allow.
- On the device, select Start > Settings > Windows Update > Advanced options > Configured update policies > find Enable hotpatching when available. This setting indicates that the device is enrolled in hotpatch updates as configured by Autopatch.
Step 4: Disable compiled hybrid PE usage (CHPE) (Arm64 CPU only)
For more information, see Arm 64 devices must disable compiled hybrid PE usage (CHPE) (Arm 64 CPU Only).
Step 5: Use Event viewer to verify the device has hotpatch updates turned on
- Right-click on the Start menu, and select Event viewer.
- Search for AllowRebootlessUpdates in the filter. If AllowRebootlessUpdates is set to
1
, the device is enrolled in the Autopatch update policy and has hotpatch updates turned on:
"data": { "payload": "{\"Orchestrator\":{\"UpdatePolicy\":{\"Update/AllowRebootlessUpdates\":true}}}", "isEnrolled": 1, "isCached": 1, "vbsState": 2,
Step 6: Check Windows Logs for any hotpatch errors
Hotpatch updates provide an inbox monitor service that checks for the health of the updates installed on the device. If the monitor service detects an error, the service logs an event in the Windows Application Logs. If there's a critical error, the device installs the standard (LCU) update to ensure the device is fully secure.
- Right-click on the Start menu, and select Event viewer.
- Search for hotpatch in the filter to view the logs.