Get patch-ed with Windows Autopatch

Get patch-ed with Windows Autopatch

In my previous blog post on Windows Autopatch, I have already mentioned the pre-requisites to be met in order to be eligible to use the new service offering from Microsoft.

Considering that your tenant meets the requirement listed and you are interested to try it out (if you haven’t already!), then this blog post is to help you get started with Windows Autopatch.

Confirm tenant eligibility for Windows Autopatch

In the MEM Admin center, navigate to Tenant administration and check if the Windows Autopatch category shows up with the Tenant enrollment option in there. (Refer to the image on the right below.)

Do not see the Windows Autopatch Tenant Enrolment option in your tenant? Check licensing requirements and active assignment of license.
Do not see the Windows Autopatch Tenant Enrolment option in your tenant? Check licensing requirements and active assignment of license.

If you don’t see the option (identical to the image on left), note that Windows Autopatch will not show up for a tenant which does not meet the licensing requirements.

It is important to note that just having the required license (Windows 10/11 Enterprise E3/E5 or Windows VDA in case you are not on the M365 E3/E5 licensing scheme) in the tenant arsenal is not enough as you need to have an active assignment of the license.

Once you make the necessary correction, refresh the MEM Admin center and you should now see the Windows Autopatch option coming up.

Network requirements for Windows Autopatch

Windows Autopatch service requires uninterrupted network connectivity to the below endpoints.

  • mmdcustomer.microsoft.com
  • mmdls.microsoft.com
  • logcollection.mmd.microsoft.com
  • support.mmd.microsoft.com

This is over and above the network requirements for Microsoft Intune.

I have updated my blog post titled Intune Windows Autopilot URLs Whitelist Requirement to include the Windows Autopatch network URLs as well, so if you want a consolidated view of all the required endpoints, you can check it from there.

Run Assessment to check tenant compatibility with Windows Autopatch

First thing first, you need to sign-in with an account having Global Admin credentials to perform the below steps.

  • Sign in to the MEM admin center, navigate to Tenant administration
  • Scroll down to Windows Autopatch > Tenant enrollment.

It starts with the Readiness assessment tool that runs the assessment check to show the tenant preparedness to start with Windows Autopatch service and provides remediation steps to fix any issues as detected.

  • Click on Run checks.
Run the Readiness assessment tool to check for tenant preparedness for Windows Autopatch.
Run the Readiness assessment tool to check for tenant preparedness for Windows Autopatch.

For each check, the Readiness assessment tool reports one of four possible results:

ReadyNo action is required and you can proceed with enrollment.
AdvisoryThese are issues found but will not act as a blocker for you to proceed with the enrollment. However, it is recommended to fix the issues highlighted as advisories before proceeding.
Not readyYou must fix these issues to proceed with enrollment. You won’t be able to enroll the tenant with Windows Autopatch unless you fix these issues.
ErrorThe Azure Active Directory (AD) role you’re using doesn’t have sufficient permissions to run this check.

There are many things that the check is performing.

  • It confirms that there is no Update ring policy currently existing in the tenant that targets to All devices or All users. If found, it will be flagged and need to be resolved as otherwise, it will conflict with the rings managed by Windows Autopatch.
  • Verifies that Unlicensed Admin is enabled in Intune to avoid a “lack of permissions” error while creating the required objects in Intune as part of the Windows Autopatch setup for the tenant.
  • It confirms that there is no existing Conditional Access policy that requires MFA for All Users. Otherwise, it will create a problem for MS to access the tenant via the Windows Autopatch service accounts that get created during tenant enrolment for the purpose of Windows Autopatch management of the tenant.
  • Checks that no existing usernames exist that can conflict with ones that Windows Autopatch reserves for its own use.
  • Checks whether Azure AD has security defaults enabled.
  • Checks for the necessary licenses.

For more details on the above, please check the MS documentation for the same.

As you can see in the below snap, the result of the assessment check for my tenant came as Not ready.

Windows Autopatch Readiness Assessment status Not ready? Click on View details to know the reason and get the remediation step for fixing.
Windows Autopatch Readiness Assessment status Not ready? Click on View details to know the reason and get the remediation step for fixing.

If you notice in the above snap, it shows that the tenant passed the assessment check for 4 criteria, flagged as an advisory for 2 criteria, and actually failed in 1 criterion.

To see the result in detail and find out which particular criteria failed, for which the result came as Not ready, you need to click on the View details button.

You can then see the actual parameters or criteria list against which the tenant is assessed to conclude if it is ready for Windows Autopatch service. Here in my case, you can see my tenant came up in Not ready assessment state as I did not have the Unlicensed Admin setting enabled on my tenant.

Windows Autopatch Readiness Assessment result details - Items flagged on click show Reason and How to remediate.
Windows Autopatch Readiness Assessment result details – Items flagged on click show Reason and How to remediate.

You need to click on the item and a blade appears from the right to show you the reason why the item is flagged and the remediation step to get the same resolved.

Note: You can probably choose to ignore the items flagged as Advisory but it is recommended that you check the reason for why the item is being flagged and if possible remediate the same at the earliest. However, as mentioned previously, these won't act as a potential blocker to stop you from enrolling the tenant in Windows Autopatch.

The tool does not check the workloads in Configuration Manager necessary for Windows Autopatch and as such the Co-Management parameter will always be flagged as an Advisory. You need to ensure that you have the correct co-management workload settings configured to support Windows Autopatch.

Once you complete the remediation steps, you need to come back to Tenant administration > Windows Autopatch > Tenant enrollment and re-run the assessment. If everything goes as expected, then you get to see the Ready status for the tenant and the Enroll button.

Windows Autopatch Readiness Assessment status Ready means you can start enrolling your tenant in the  Windows Autopatch service.
Windows Autopatch Readiness Assessment status Ready means you can start enrolling your tenant in the Windows Autopatch service.

Enroll your tenant in Windows Autopatch

By clicking on Enroll, you will proceed with the enrollment of your tenant to the Windows Autopatch service.

Provide consent to continue enrolling your tenant to Windows Autopatch.
Provide consent to continue enrolling your tenant to Windows Autopatch

You need to provide your consent to the above. Mark the checkbox and click on Agree to continue.

On the next page, you will need to provide user account details like Phone number, Email, Name, and Preferred Language. Once you have added the information, click on Complete.

Tenant enrolment to Windows Autopatch requires you to provide one admin contact information to whom Microsoft can reach out to if there is any issue related to your tenant for Windows Autopatch.
Tenant enrolment to Windows Autopatch requires you to provide one admin contact information to whom Microsoft can reach out to if there is any issue related to your tenant for Windows Autopatch.

The user account details you fill up here will be the ones who will be contacted by Microsoft if there occurs any issue related to Windows Autopatch for the tenant. Later you will have the option to add other IT admin accounts as well.

The process will begin setup of the Windows Autopatch service for the tenant and this will take a few minutes to complete. It is during this time that the required service account principles, policies, groups, etc. are getting created.

I have tried to list most of the objects that get created as part of this process as below. [Note that this may not be the comprehensive list containing all objects that are created as part of Windows Autopatch tenant enrolment!]

Windows Autopatch Cloud service accountsMsAdmin@yourdomain.onmicrosoft.com MsAdminInt@yourdomain.onmicrosoft.com
MsTest@yourdomain.onmicrosoft.com  
For additional details, check here.
Windows Autopatch Azure AD groupsWindows Autopatch Device Registration
Modern Workplace-All
Modern Workplace Service Accounts
Modern Workplace Devices-Windows Autopatch-Fast
Modern Workplace Devices-Windows Autopatch-Broad
Modern Workplace Service – Intune Admin All Modern Workplace Roles – Service Reader Modern Workplace Service – Intune Reader MMD
Modern Workplace – Windows 11 Pre-Release Test Devices
Modern Workplace Service – Intune Reader All
Modern Workplace Devices Dynamic – Windows 10
Modern Workplace Devices-Virtual Machine
Modern Workplace Devices Dynamic – Windows 11
Modern Workplace Device Profiles – Windows Autopatch
Modern Workplace Roles – Service Administrator
Modern Workplace Devices-Windows Autopatch-First
Modern Workplace Devices-All
Modern Workplace Devices-Windows Autopatch-Test
Windows Autopatch Conditional Access policyModern Workplace – Secure Workstation
Windows Autopatch Microsoft Endpoint Manager custom RBAC roleModern Workplace Intune Admin
Windows Autopatch Update ringsModern Workplace Update Policy [Broad]-[Windows Autopatch]
Modern Workplace Update Policy [Fast]-[Windows Autopatch]
Modern Workplace Update Policy [First]-[Windows Autopatch]
Modern Workplace Update Policy [Test]-[Windows Autopatch]
Windows Autopatch Feature updates for Windows 10 and later (preview) policiesModern Workplace DSS Policy [First]
Modern Workplace DSS Policy [Fast]
Modern Workplace DSS Policy [Broad]
Modern Workplace DSS Policy [Test]
Modern Workplace DSS Policy [Windows 11]
Windows Autopatch MEM device configuration profilesModern Workplace – Data Collection Modern Workplace – Edge Update ADMX Deployment Modern Workplace – Edge Update Channel Beta Modern Workplace – Edge Update Channel Stable Modern Workplace – Office ADMX Deployment Modern Workplace – Office Configuration v5 Modern Workplace – Office Update Configuration [Broad]
Modern Workplace – Office Update Configuration [Fast]
Modern Workplace – Office Update Configuration [First]
Modern Workplace – Office Update Configuration [Test]
Modern Workplace – Set MDM to Win Over GPO Modern Workplace – Telemetry Settings for Windows 10
Modern Workplace – Telemetry Settings for Windows 11
Modern Workplace – Windows Update Detection Frequency
Windows Autopatch Powershell deploymentModern Workplace – Autopatch Client Setup

These actions also get logged in the audit reporting of Azure AD and MEM, and you can see them as initiated by the actor Modern Workplace Management application.

If the process does not encounter any error (which it should not unless any service-side disruption pops up in the middle of nowhere), the Windows Autopatch enrollment for the tenant gets completed.

You can click on Continue post which you can start registering your devices to the service.

Now when you get back to Tenant administration > Windows Autopatch, you will not find the Tenant enrolment option anymore. Instead, you will find new options as below.

Post tenant enrolment, you won't find the tenant enrolment option when you go to path Tenant administration > Windows Autopatch in MEM Admin Center. Instead, you will find new options in there - Admin contacts, Support requests, and Release management.
Post tenant enrolment, you won’t find the tenant enrolment option when you go to path Tenant administration > Windows Autopatch in MEM Admin Center. Instead, you will find new options in there – Admin contacts, Support requests, and Release management.
  • Admin contact is from where you will be able to add additional IT admins accounts.
  • Support requests is from where you will be able to raise support ticket specific to Windows Autopatch.
  • Release management is from where you get to see what updates (quality/feature) is being pushed through the Autopatch service.
Windows Autopatch Release Management blade gives you an overview of the updates being driven through the environment via Autopatch.
Windows Autopatch Release Management blade gives you an overview of the updates being driven through the environment via Autopatch.

Register devices to Windows Autopatch

Windows Autopatch only supports Intune-managed devices having AADJ or HAADJ join state. [No AADR]

For devices in the co-management state, the co-management workload settings for the Windows Update, Device Configuration, and  Office Click-to-Run apps workloads must be set to intune or Pilot Intune for such device to be serviced via Autopatch.

Provided the devices in your environment meet the conditions as mentioned above, you may want to start slow by registering a few devices to Windows Autopatch to run as a Pilot initially.

Before you can register devices to Windows Autopatch, you need to ensure that your currently signed-in account has any of the following privileges added to it.

  • Azure AD Global Administrator
  • Intune Service Administrator
  • Modern Workplace Intune Administrator
The last one on the list is a custom role that got created as part of the tenant enrollment to Windows Autopatch.

For device registration, all you need to do is add devices to the Windows Autopatch master device group – Windows Autopatch Device Registration.

You can add device through direct membership or by nesting other Azure AD dynamic/assigned groups into the Windows Autopatch Device Registration group.

Post adding devices to the required group, in the MEM Admin center, go to Devices > Windows Autopatch > Devices to check the status of device registration.

To register eligible devices to Windows Autopatch, all you need to do is add them to the Windows Autopatch master device group - Windows Autopatch Device Registration
To register eligible devices to Windows Autopatch, all you need to do is add them to the Windows Autopatch master device group – Windows Autopatch Device Registration

Added device to Windows Autopatch but do not see any devices in here yet? Well, you may need to wait for some time.

Windows Autopatch automatically runs every hour to discover new devices added to this group. Once new devices are discovered, Windows Autopatch attempts to register these devices.

If you are one of those who cannot hold their horses, you can initiate a manual scan to check for added device members by clicking on the Discover devices button and then continue clicking on the Refresh button till the death of the mouse or the device shows up in the console (either under the Ready or Not ready tab).

Once you add a device added to Windows Autopatch for registration, it can take up to an hour for processing. If the device gets registered successfully, it will show up in the Ready tab from under Windows Autopatch devices in the MEM Admin Center.
Once you add a device added to Windows Autopatch for registration, it can take up to an hour for processing. If the device gets registered successfully, it will show up in the Ready tab from under Windows Autopatch devices in the MEM Admin Center.

Devices added to Windows Autopatch for registration need to meet the pre-requisites as listed here for onboarding into the service.

If the device added to the Windows Autopatch device registration group satisfies the criteria, it will get registered and listed under the Ready tab. Otherwise, the device registration fails, and such devices will be listed under the Not ready tab.

To be contd.

Today in this blog post, I have walked you through the Windows Autopatch

  • network requirements
  • tenant pre-enrolment Readiness assessment check and how to deal with Not Ready status.
  • tenant enrolment
    • some details into what happens during the enrolment process
  • device registration to Windows Autopatch

In the next part, I will take you through the operations and other miscellaneous information of Windows Autopatch that you need to know if you want to start a Pilot batch in your tenant.