Security

Microsoft tells admins to autoreview your Autopatch alerts or autolose the service

And you wouldn't want that ... would you?


Microsoft is updating a service introduced last year that shifts the responsibility of patching Windows devices from IT admins to the vendor itself.

Redmond in April 2022 unveiled Windows Autopatch to automate updates to endpoints, but still giving administrators controls to adapt or make changes as needed. When it was first introduced – it became generally available three months later – Microsoft said that "for organizations who select this option, the second Tuesday of every month will be 'just another Tuesday.'"

The company this week confirmed updates to the service, including enhancements to the Tenant management blade, which is used to alert admins of actions that they need to take to maintain the overall heath of the service. In this case, Autopatch beginning in May will include the ability to alert them to expired licenses that need to be renewed or replaced to retain access to Autopatch.

Another alert warns about access-related issues that would mean Autopatch would no longer manage the enterprise's tenant.

The management blade can also tag Autopatch as "inactive" in a tenant if there are actions that need to be taken. To see if there are alerts that need addressing, Microsoft is urging IT admins to check the Tenant management section and click on a banner displayed in the "Windows Autopatch Devices" blade, according to Lior Bela, senior product strategy and marketing manager for Autopatch, Intune Suite, and MMD.

"If you have no actions that need to be taken, there is no effect on your tenant," Bela wrote. "However, if the service has identified actions for you to take, you must act to avoid interruption with the Windows Autopatch service."

Redmond is also rolling out new Autopatch features that are in public preview and will be generally available May 1. Among them is Windows Autopatch Groups, letting IT admins create their own sets of deployment rings – the way Autopatch staggers updates to enable administrators to ensure endpoints are compliant – and the cadence of deployments.

They can better manage updates using the Groups feature when creating new Windows update deployments and provide insights into update compliance, deployment status, and update failure for Autopatch's existing reporting functions.

Admins can also have Autopatch restore policies and deployment rings when needed.

The new capabilities are part of Microsoft's plan to give admins the tools to oversee the process and make changes even though Autopatch automates the actual patching of the Windows PCs, servers, and other endpoints.

A year ago, Bela wrote that the "development of Windows Autopatch is a response to the evolving nature of technology. Changes like the pandemic-driven demand for increased remote or hybrid work represent particularly noteworthy moments but are nonetheless part of a cycle without a beginning or end."

Installing the myriad patches that Microsoft puts out every month takes time and resources, which can slow down patching and lead to security and productivity issues. Automating the process can help alleviate some of the time pressures and accelerate patching, Bela wrote. ®

Send us news
20 Comments

Go ahead, let the unknowable security risks of Windows Copilot onto your PC fleet

Or maybe don't let Microsoft's desire to defeat Google dictate your defensive strategy

Not even the ghost of obsolescence can coerce users onto Windows 11

It's a great advert for Ubuntu anyway

From chaos to cadence: Celebrating two decades of Microsoft's Patch Tuesday

IT folks look back on 20 years of what is now infosec tradition

Microsoft Cortana's farewell tour comes to the Windows Insider program

Last season's assistant shuffles off from the Canary build of Windows 11

Microsoft delays debut of IoT security offer due to 'unexpected system challenges'

Software giant tells partners not to sell it but also happy to take your cash now

It's 2023 and Microsoft WordPad can be exploited to hijack vulnerable systems

Happy Halloween! Security bugs under attack squashed, more flaws fixed

Microsoft says VBScript will be ripped from Windows in future release

It's PowerShell or something similar in the not too distant future

Microsoft starts offering advice in how to code for Arm

In 2027 a quarter of PCs won’t use x86, and Redmond wants its ecosystem ready

Microsoft does not want ValueLicensing CEO anywhere near its confidentiality ring

Perpetual license case perpetually rumbles on

Microsoft gives unexpected tutorial on how to install Linux

You may need it – Windows 10 is no longer a free upgrade

Microsoft takes another run at closing Exchange brute-force security hole

Meanwhile, Exchange Online is on the fritz

Ex-Microsoft maverick takes us on a trip through vintage Task Manager code

Plus: Have you updated to the latest version of Bloated Fetal Sacs?