Table of Contents
Introduction: A New Era of Seamless Patching
If you’ve ever managed Windows updates in an enterprise environment, you know the pain: security patches mean forced reboots, disrupting workflows, and frustrating users. Microsoft’s Windows Hotpatch changes that game for Windows 11 Enterprise. Imagine applying critical security updates without rebooting—that’s exactly what Hotpatch delivers.
The Challenge: Traditional Patching vs. Productivity
Security updates are non-negotiable. But they come at a cost:
- 🔄 Frequent reboots
- ⏳ Lost productivity
- 😠 User dissatisfaction
- 🛡️ Delayed patching = increased vulnerability
For global teams or 24/7 operations, coordinating reboots is a logistical nightmare. That’s where Windows Hotpatch steps in.
In this post, we’ll explore:
- What is Windows Hotpatch?
- Why does it matter for IT admins and end-users?
- How to configure Hotpatch with Microsoft Intune?
- Key prerequisites and limitations you need to know.
What is Windows Hotpatch?
Hotpatch is Microsoft’s innovative update mechanism that injects security fixes directly into memory, eliminating the need for a restart. Originally used in Azure-based Windows Server, Hotpatch is now available for Windows 11 Enterprise (version 24H2 and later).
How It Works
- Quarterly Baseline Updates: These cumulative updates include security fixes, features, and enhancements. They require a reboot.
- Monthly Hotpatch Updates: Delivered in the two months following a baseline update, these are security-only patches applied in real-time—no reboot required.
This cadence reduces reboots from 12 per year to just 4, a 66% reduction in downtime.
📅 Hotpatch update calendar (2025)
- Baseline months (restart required): January, April, July, October
- Hotpatch months (no restart): other months within each quarter
This quarterly baseline + two‑month hotpatch cadence is the Windows 11 client servicing model for Hotpatch. [learn.microsoft.com], [petervanderwoude.nl]
| Month | Type | Notes |
|---|---|---|
| January | Baseline (with reboot) | Installs the quarterly cumulative baseline, then becomes eligible for the Feb–Mar Hotpatch. |
| February | Hotpatch (no reboot) | Security fixes only, applied live in memory. |
| March | Hotpatch (no reboot) | Security fixes only, applied live in memory. |
| April | Baseline (with reboot) | Resets base; enables May–Jun Hotpatch. |
| May | Hotpatch (no reboot) | Security fixes only, applied live in memory. |
| June | Hotpatch (no reboot) | Security fixes only, applied live in memory. |
| July | Baseline (with reboot) | Resets base; enables Aug–Sep Hotpatch. |
| August | Hotpatch (no reboot) | Security fixes only, applied live in memory. |
| September | Hotpatch (no reboot) | Security fixes only, applied live in memory. |
| October | Baseline (with reboot) | Resets base; enables Nov–Dec Hotpatch. |
| November | Hotpatch (no reboot) | Security fixes only. |
| December | Hotpatch (no reboot) | Security fixes only. |
Note: If you upgrade to Windows 11, version 25H2 outside a baseline month, or fresh install a Windows 11, version 24H2 from an ISO that is older than the current baseline window, devices will temporarily switch to standard (restart‑required) security updates until the next baseline window. This may result in divergence of OS build version for the same version of Windows 11 in the environment.
Why Hotpatch Matters
- Zero Disruption: End-users continue working while updates apply silently.
- Faster Security Response: Critical vulnerabilities (such as zero-day threats) can be patched more quickly, decreasing your attack surface without waiting for a maintenance window.
- Improved Compliance: Easier to maintain patching SLAs without scheduling downtime, especially in globally distributed environments.
The reduced downtime as offered by Windows Hotpatch is crucial for industries like healthcare, finance, retail & logistics, where uptime is mission-critical.
Prerequisites for Hotpatch
Before you jump in, ensure your environment meets these requirements:
- OS: Windows 11 Enterprise, version 24H2 or later.
- Licensing: Windows Enterprise E3/E5, Microsoft 365 A3/A5, or Windows 365 Enterprise.
- Security: Virtualization-Based Security (VBS) must be enabled.
- Baseline Update: Latest quarterly baseline installed.
- Management: Managed devices, either enrolled with Windows Autopatch or managed with WUfB via Microsoft Intune.
- Architecture: x64 (Intel/AMD). ARM64 support is in preview. [learn.microsoft.com], [techcommun…rosoft.com]
Configuring Hotpatch via Microsoft Intune: Step-by-Step
Hotpatch integrates seamlessly with Microsoft Intune. You can either enroll devices to the Windows Autopatch service in Microsoft Intune for Microsoft to take care of patching on your behalf, or if you continue to use Windows Update for Business (WUfB) with MIcrosoft Intune for your patching needs, read below to walk you through how to enable Windows Hotpatch with the WUfB Quality Update policy.
✅ Steps to Configure Hotpatch Policy:
Logged in to the Intune admin console:
(1) Navigate to Devices ▸ Windows updates ▸ Quality updates, click on +Create policy
(2) Provide the Basics (policy name/description)
(3) Configure the following settings:
- ✅ Allow cumulative quality updates for security
- ✅ Enable Hotpatching (apply updates without restart)
(4) Assign the policy to relevant Entra ID groups
(5) Review and create the policy

Heads‑up: Since June 23, 2025, new Windows quality update policies have Hotpatch enabled by default when the device meets prerequisites (existing policies unchanged).
Verification Tip: How to confirm Hotpatch policy is applied on an endpoint
Check configured update policies on target devices to confirm Hotpatch is active.
Steps to View Configured Update Policies on Windows 11 Devices
- Open Settings: Press Windows + I or click the Start menu and select Settings.
- Navigate to Windows Update: In the left-hand menu, click Windows Update.
- Go to Advanced Options: On the right pane, click Advanced options.
- Click on Configured Update Policies: Scroll down and select Configured update policies.
- Review the List of Policies: You’ll see a list of all update policies applied to the device, including whether Hotpatching is enabled.

Operational notes & gotchas
- UI path & policy: Enable Hotpatch in a Windows quality update policy; your existing update rings keep working alongside. [learn.microsoft.com]
- Reporting: Use the Hotpatch quality update report for per‑policy trending (Up‑to‑date, Hotpatched, Not ready, etc.). Data refreshes roughly every 4 hours. [learn.microsoft.com]
- Prereq recap: Windows 11 Enterprise 24H2+, VBS on, latest baseline installed, Intune + Windows Autopatch. ARM64 requires CHPE to be disabled (preview).
Limitations to Consider
While Hotpatch is powerful, it’s not a silver bullet:
- Only supports security updates (no .NET or non-security patches)
- Quarterly reboots are still required
- Arm64 support is in preview
- No automatic rollback for failed patches
- Possible reporting gaps in some security tools
Conclusion: Embrace Reboot-Free Security
Windows Hotpatch is a leap forward in update management—especially for organizations that prioritize uptime and user experience. By reducing reboot frequency and accelerating patch deployment, it empowers IT teams to be proactive and efficient.
If you’re managing a modern Windows environment, now is the time to explore Hotpatch. Test it, deploy it, and share feedback to help shape its future.
2 Trackbacks / Pingbacks
Comments are closed.