Event banner
AMA: Windows Autopatch
Event Ended
Thursday, Oct 27, 2022, 08:30 AM PDTEvent details
Find out how Windows Autopatch is evolving to make Windows and Microsoft 365 update management more secure and more capable. Members of the marketing, product, and customer acceleration engineering t...
Heather_Poulsen
Updated Dec 27, 2024
PaulKlerkx
Oct 19, 2022Iron Contributor
MECM, WSUS, Intune, WuFB, Windows Updates via Group policy, TPU's, Autopatch. What direction is the Microsoft recommended target path? (For all updates including drivers) For those of us using MECM with WSUS and TPU's currently, what should we be looking to go to. It feels like WSUS on the way out. What is the 'best' option to allow us to get updates to our users whether on-prem or off but still have enough control that if there is a problem update/driver etc, we can stop that going out and also allow us to push a vulnerability patch out of band quickly. Is there a comparison of all the various options you can do with the positives and negatives?
SoupAtMSFT
Oct 27, 2022Former Employee
There's a continuum of capabilities in the technologies identified above. If you're looking to move to a more managed/modern approach, then Autopatch may work for you and your org. If you require elevated functionality, desire more fine grained control, then WUfB may be more appropriate. Many customers have shared that they just don't want to (as active) in the patch and update business and want to reduce their hardware server infrastructure related to device management. Autopatch is a great service and technology to consider in that case. We continue to listen to customers for where Autopatch and/or Microsoft Managed Desktop can be improved or expanded. We have a roadmap for enhancements and improvements - so stay tuned.