Event banner
AMA: Windows Autopatch
Event Ended
Thursday, Oct 27, 2022, 08:30 AM PDTEvent details
Find out how Windows Autopatch is evolving to make Windows and Microsoft 365 update management more secure and more capable. Members of the marketing, product, and customer acceleration engineering t...
Heather_Poulsen
Updated Dec 27, 2024
PaulKlerkx
Oct 19, 2022Iron Contributor
MECM, WSUS, Intune, WuFB, Windows Updates via Group policy, TPU's, Autopatch. What direction is the Microsoft recommended target path? (For all updates including drivers) For those of us using MECM with WSUS and TPU's currently, what should we be looking to go to. It feels like WSUS on the way out. What is the 'best' option to allow us to get updates to our users whether on-prem or off but still have enough control that if there is a problem update/driver etc, we can stop that going out and also allow us to push a vulnerability patch out of band quickly. Is there a comparison of all the various options you can do with the positives and negatives?
David Stowers
Oct 19, 2022Brass Contributor
I have used the expedited OOB updates in my org during printnightmare and it worked beautifully. I have had a considerably smoother experience with WUfB and Intune for keeping things moving smoothly than I ever did with WSUS, primarily because it simplifies the experience and works independent of on-prem resources. We are lean on personnel so anything to make for lighter touch is beneficial. You can also pause and roll back quality updates. I usually just recommend a few days delay before a patch goes out so it's not bleeding edge anyway. the biggest drawback would be you cannot control individual patches, but on the workstation endpoints that's usually not as critical as the server side anyway.