Intune WUfB Feature Update deferral longer than 365 days

%3CLINGO-SUB%20id%3D%22lingo-sub-2083348%22%20slang%3D%22en-US%22%3EIntune%20WUfB%20Feature%20Update%20deferral%20longer%20than%20365%20days%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2083348%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20a%20way%2C%20using%20Intune-managed%20WUfB%2C%20that%20Feature%20Updates%20can%20be%20deferred%20longer%20than%20365%20days%3F%26nbsp%3B%20For%20instance%2C%20if%20we%20wanted%20to%20stay%20on%20Win10%201809%2C%20then%20in%20September%20move%20to%20only%2019H1%2C%20is%20that%20possible%2C%20if%20so%20what%20would%20your%20recommendation%20be%20to%20stay%20on%20these%20builds%20with%20Intune%20WUfB%3F%26nbsp%3B%20We%26nbsp%3B%20have%20software%20(AV%2C%20VPN%20clients%2C%20security%20tools)%20that%20are%20closely%20tied%20to%20Feature%20Updates%2C%20so%20we%20can't%20always%20just%20let%20the%20Feature%20Updates%20roll%20within%20a%20year.%26nbsp%3B%20Thank%20you.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2083366%22%20slang%3D%22en-US%22%3ERe%3A%20Intune%20WUfB%20Feature%20Update%20deferral%20longer%20than%20365%20days%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2083366%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F937892%22%20target%3D%22_blank%22%3E%40coleel%3C%2FA%3E%26nbsp%3Byou%20can%20of%20course%20stay%20on%20a%20feature%20update%20longer%20than%20365%20days%20after%20the%20next%20update%20is%20released.%20To%20do%20this%20you%20can%20leverage%20the%20new%20target%20version%20policies%20(Feature%20Update%20Deployment%20(Preview)%20in%20Intune%20to%20specify%20which%20feature%20update%20you%20want%20to%20move%20to%20and%2For%20stay%20on%20until%20you%20change%20the%20policy.%20Alternatively%2C%20if%20you%20need%20to%20remain%20for%20just%20a%20short%20period%20of%20time%20you%20can%20leverage%20pause%2C%20but%20you%20will%20need%20to%20re-set%20it%20every%2034%20days.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2083390%22%20slang%3D%22en-US%22%3ERE%3A%20Intune%20WUfB%20Feature%20Update%20deferral%20longer%20than%20365%20days%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2083390%22%20slang%3D%22en-US%22%3EPLEASE%20don't%20do%20this.%20Windows%2010%20v.1809%20ENT%20edition%20goes%20out%20of%20servicing%20after%20the%20May%20Patch%20Tuesday%20update.%20You%20will%20NOT%20receive%20security%20updates%20for%201809%20after%20May.%20We%20do%20not%20want%20you%20to%20be%20in%20an%20unserviced%20state%20and%20be%20exposed%20to%20future%20threats%20or%20vulnerabilities.%20Also%20-%2019H1%20is%20also%20no%20longer%20serviced.%20You%20will%20need%20to%20move%20your%20devices%20to%20a%20currently%20serviced%20version%20which%20would%20be%201909%20or%20higher%20(2004%2F20H2).%20We%20never%20want%20to%20see%20customers%20in%20an%20unserviced%20state.%3C%2FLINGO-BODY%3E
New Contributor

Is there a way, using Intune-managed WUfB, that Feature Updates can be deferred longer than 365 days?  For instance, if we wanted to stay on Win10 1809, then in September move to only 19H1, is that possible, if so what would your recommendation be to stay on these builds with Intune WUfB?  We  have software (AV, VPN clients, security tools) that are closely tied to Feature Updates, so we can't always just let the Feature Updates roll within a year.  Thank you.

9 Replies

@coleel you can of course stay on a feature update longer than 365 days after the next update is released. To do this you can leverage the new target version policies (Feature Update Deployment (Preview) in Intune to specify which feature update you want to move to and/or stay on until you change the policy. Alternatively, if you need to remain for just a short period of time you can leverage pause, but you will need to re-set it every 34 days.

PLEASE don't do this. Windows 10 v.1809 ENT edition goes out of servicing after the May Patch Tuesday update. You will NOT receive security updates for 1809 after May. We do not want you to be in an unserviced state and be exposed to future threats or vulnerabilities. Also - 19H1 is also no longer serviced. You will need to move your devices to a currently serviced version which would be 1909 or higher (2004/20H2). We never want to see customers in an unserviced state.

@Aria Carley Thank you for the quick response.  Are there any concerns if co-management is thrown into the mix, like does this break the Intune functionality?  We ran into inconsistent behaviors, so not sure if this isn't supported or we just had a configuration conflict.  We were told this isn't officially supported (Co-management of machines and using Intune-based WUfB to manage Feature Updates longer than 365 days), which is why the setting was in preview.  So just curious if there are other strategies or if this is still the best course forward.

@coleel  This is till the recommended solution for remaining longer on a release. That said, see Configure Windows 10 feature updates policy in Intune - Azure | Microsoft Docs for pre-reqs, known issues, and best practices. We are also working quickly to mitigate any found issues and GA this feature.

 

Why not use the targetreleaseversion setting to choose the feature release you want on?  

@Susan Bradley   Yes, that's what we were testing, but we were told by an MS partner that that setting is unsupported and not recommended if machines were co-managed.  So we want to move to Intune for patching, but this is a pretty big showstopper for us if we can't rely on this feature to both function and be supported for co-managed workstations.  Maybe it just means we have to abandon co-management and only use Intune for those machines we want to take advantage of this feature.  Too bad, this would be a great feature to have.

@coleel I don't know who said what... but you can certainly use this feature for co-managed devices. Just expect a delay for the initial policies to take effect. (You can get around this by simply setting pause for the first week or so after the device is transitioned to co-management and feature update deployment is configured)

@coleel   Intune should respect that setting.  

Thank you so much for all the information today, this really helps us along our migration, so thank you.

@Aria Carley