Register devices with Autopatch groups
Important
If you're new to Autopatch, it might take up to 48 hours for devices to appear as Registered in the Autopatch groups membership report. During this 48 hour period, devices undergo the necessary onboarding processes before appearing as registered
An Autopatch group is a logical container or unit that groups several Microsoft Entra groups, and software update policies. For more information, see Windows Autopatch groups.
When you create an Autopatch group or edit an Autopatch group, the device-based Microsoft Entra groups you use are scanned on an ongoing basis to see if new devices need to be added to the Autopatch group.
Detailed device registration workflow diagram
See the following detailed workflow diagram. The diagram covers the Windows Autopatch device registration process:
Step | Description |
---|---|
Step 1: Assign Entra Groups | IT admin identifies the Microsoft Entra group they want to assign when they create an Autopatch group or edit an Autopatch group. |
Step 2: Discover devices | The Windows Autopatch Discover Devices function discovers devices (hourly) that were previously added by the IT admin from Microsoft Entra groups used with Autopatch groups in step #1. The Microsoft Entra device ID is used by Windows Autopatch to query device attributes in both Microsoft Intune and Microsoft Entra ID when registering devices into its service.
|
Step 3: Check prerequisites | The Windows Autopatch prerequisite function makes an Intune Graph API call to sequentially validate device readiness attributes required for the registration process. For detailed information, see the Detailed prerequisite check workflow diagram section. The service checks the following device readiness attributes, and/or prerequisites:
|
Step 4: Calculate dynamic distribution and assign devices | Microsoft Entra Groups, which are directly assigned to a deployment ring, adds those devices to the Microsoft Entra Group that Autopatch creates for that deployment ring. If you choose to use dynamic distribution, the Autopatch service distributes the devices you selected. The service takes a percentage of the devices in the dynamic pool and adds them to the relevant Microsoft Entra groups. Devices that are members of Microsoft Entra groups that are directly assigned aren't included in the dynamic pool. If you have fewer than 100 devices in an Autopatch group, the distribution might not match your selection. |
Step 5: Post-device registration | If you deployed the Windows Autopatch Client Broker, post-device registration actions occur. For more information, see Post-device registration readiness checks. |
Step 6: Review device registration status | IT admins review the device's Autopatch readiness status. Devices are either Registered or Not registered in the Autopatch groups membership report.
|
Step 7: End of registration workflow | This is the end of the Windows Autopatch device registration workflow. |
Detailed prerequisite check workflow diagram
As described in step #3 in the previous Detailed device registration workflow diagram, the following diagram is a visual representation of the prerequisite construct for the Windows Autopatch device registration process. The prerequisite checks are sequentially performed.
Autopatch groups membership report
Windows Autopatch has an Autopatch groups membership report provides the following information:
- Autopatch group membership (only if the device is added to an Autopatch group)
- Update status
- Policies that target each device
View the Autopatch groups membership report
To view the Autopatch groups membership report:
- In the Intune admin center, select Devices in the left pane.
- Under Manage updates, select Windows updates.
- Select the Monitor tab, and then select Autopatch devices.
Once a device is added to an Autopatch group, a readiness status is displayed. Each readiness status helps you to determine if there are any actions to take or if the device is ready for the service.
Readiness statuses
Autopatch readiness status in the Autopatch groups membership report | Substatus description |
---|---|
Registered |
|
Not registered |
|
Supported scenarios when nesting other Microsoft Entra groups
Windows Autopatch also supports the following Microsoft Entra nested group scenarios:
Microsoft Entra groups synced up from:
- On-premises Active Directory groups (Windows Server AD)
- Configuration Manager collections
Windows Autopatch on Windows 365 Enterprise Workloads
Windows 365 Enterprise gives IT admins the option to register devices with the Windows Autopatch service as part of the Windows 365 provisioning policy creation. This option provides a seamless experience for admins and users to ensure your Cloud PCs are always up to date. When IT admins decide to manage their Windows 365 Cloud PCs with Windows Autopatch, the Windows 365 provisioning policy creation process calls Windows Autopatch device registration APIs to register devices on behalf of the IT admin.
To register new Windows 365 Cloud PC devices with Windows Autopatch from the Windows 365 Provisioning Policy:
- Go to the Intune admin center.
- In the left pane, select Devices.
- Navigate to Provisioning > Windows 365.
- Select Provisioning policies > Create policy.
- Provide a policy name and select Join Type. For more information, see Device join types.
- Select Next.
- Choose the desired image and select Next.
- Under the Microsoft managed services section, ensure Windows Autopatch is selected.
- Assign your policy accordingly and select Next.
- Select Create. Now your newly provisioned Windows 365 Enterprise Cloud PCs are automatically enrolled and managed by Windows Autopatch.
For more information, see Create a Windows 365 Provisioning Policy.
Windows Autopatch on Azure Virtual Desktop workloads
Windows Autopatch is available for your Azure Virtual Desktop workloads. Enterprise admins can provision their Azure Virtual Desktop workloads to be managed by Windows Autopatch using the existing device registration process.
Windows Autopatch provides the same scope of service with virtual machines as it does with physical devices. However, Windows Autopatch defers any Azure Virtual Desktop specific support to Azure support, unless otherwise specified.
Prerequisites
Windows Autopatch for Azure Virtual Desktop follows the same prerequisites as Windows Autopatch, and the Azure Virtual Desktop prerequisites.
The service supports:
- Personal persistent virtual machines
The following Azure Virtual Desktop features aren't supported:
- Multi-session hosts
- Pooled non persistent virtual machines
- Remote app streaming
Deploy Autopatch on Azure Virtual Desktop
Azure Virtual Desktop workloads can be registered into Windows Autopatch by using the same method as your physical devices.
For ease of deployment, we recommend nesting a dynamic device group in your Autopatch device registration group. The dynamic device group would target the Name prefix defined in your session host, but exclude any Multi-Session Session Hosts. For example:
Group name | Dynamic membership name |
---|---|
Windows Autopatch - Host Pool Session Hosts |
|
Clean up dual state of Microsoft Entra hybrid joined and Azure registered devices in your Microsoft Entra tenant
An Microsoft Entra dual state occurs when a device is initially connected to Microsoft Entra ID as an Microsoft Entra registered device. However, when you enable Microsoft Entra hybrid join, the same device is connected twice to Microsoft Entra ID but as a Hybrid Microsoft Entra device.
In the dual state, you end up having two Microsoft Entra device records with different join types for the same device. In this case, the Hybrid Microsoft Entra device record takes precedence over the Microsoft Entra registered device record for any type of authentication in Microsoft Entra ID, which makes the Microsoft Entra registered device record stale.
It's recommended to detect and clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, see How To: Manage stale devices in Microsoft Entra ID.
Warning
If you don't clean up stale devices in Microsoft Entra ID before registering devices with Windows Autopatch, you might end up seeing devices failing to meet the Intune or Cloud-Attached (Device must be either Intune-managed or Co-managed) prerequisite check in the Not ready tab because it expects that these stale Microsoft Entra devices aren't enrolled into the Intune service anymore.
Contact support for Autopatch group registration-related incidents
Support is available either through Windows 365, or the Windows Autopatch Service Engineering team for device registration-related incidents.
- For Windows 365 support, see Get support.
- For Azure Virtual Desktop support, see Get support.
- For Windows Autopatch support, see Submit a support request. You can only submit a support request if you have E3+ or F3 licenses. For more information, see Features and capabilities.
Device management lifecycle scenarios
There's a few more device management lifecycle scenarios to consider when planning to register devices in an Autopatch group.
Device refresh
If a device was previously registered into an Autopatch group, but it needs to be reimaged, you must run one of the device provisioning processes available in Microsoft Intune to reimage the device.
The device is rejoined to Microsoft Entra ID (either Hybrid or Microsoft Entra-only). Then, re-enrolled into Intune as well. No further action is required from you or the Windows Autopatch service, because the Microsoft Entra device ID record of that device remains the same.
Device repair and hardware replacement
If you need to repair a device that was previously registered into the Windows Autopatch service, by replacing the motherboard, nonremovable network interface cards (NIC), or hard drive, you must re-register the device into the Windows Autopatch service, because a new hardware ID is generated when there are major hardware changes, such as:
- SMBIOS UUID (motherboard)
- MAC address (nonremovable NICs)
- OS hard drive's serial, model, manufacturer information
When one of these hardware changes occurs, Microsoft Entra ID creates a new device ID record for that device, even if it's technically the same device.
Important
If a new Microsoft Entra device ID is generated for a device that was previously registered into the Windows Autopatch service, even if it's technically same device, the new Microsoft Entra device ID must be added either through device direct membership or through nested Microsoft Entra dynamic/assigned group in the Windows Autopatch group experience. This process guarantees that the newly generated Microsoft Entra device ID is registered with Windows Autopatch and that the device continues to have its software updates managed by the service.