2. Setting up Prerequisites for Windows Autopatch

Windows Autopatch Guide Blog 2 of 7

In this section, I will look at the prerequisites that need to be setup in order to carry out a successful Windows Autopatch implementation.


  1. Minimum Windows OS Version (at the time of writing)
  2. RBAC Setup
  3. Licenses for Autopatch
  4. Network Configuration
  5. Device Management
  6. Wrapping Up

Minimum Windows OS Version (at the time of writing)

The current minimum Windows OS version is Windows 10 21H2.


RBAC Setup

This is one of the important things you need to think about as you want the RBAC to be set up as Just Enough Access should be the ideal way to hand out the access.

Global Administrator and Intune Service Administrator are the built-in roles that can manage the Device registration for Autopatch

More granular roles can be created as that’s the recommended way to go with specific access to your role-based administrators.

During the Tenant Enrollment for Autopatch, some Entra ID groups are being created. From them, Role-based groups are Modern Workplace Roles – Service Administrator and Modern Workplace Roles – Service Reader. Below are their capabilities.

Ideally, you don’t need to re-create the custom roles and they honor the Just Enough Access principles.

Note – If you’re adding less-privileged user accounts into the Modern Workplace Roles – Service Administrator Azure AD group, it’s recommended to add the same users as owners of the Windows Autopatch Device Registration Azure AD group. Owners of the Windows Autopatch Device Registration Azure AD group can add new devices as members of the group for registration purposes.

These groups have an application added that has built-in roles provided with specific access levels.

Modern Workplace Customer APIs is a Microsoft 1st party application that gets created during the enrollment process. The role mentioned before is maintained by the Application itself and has the above specific level of access depending on the group you assign the user/s to.


Licenses for Autopatch

Windows Autopatch will work on the devices if the user license includes the Windows 10/11 Enterprise component and if an eligible subscription is not available in the tenant, the readiness checks will fail during the tenant enrollment stage.

Windows Autopatch requires Windows 10/11 Enterprise E3 (or higher) to be assigned to your users. Additionally, Azure Active Directory Premium and Microsoft Intune are required. The following are the service plan SKUs that are eligible for Windows Autopatch

The following Windows 10 editions, build versions, and architecture are supported to be registered with Windows Autopatch:

  • Windows 10 (1809+)/11 Pro
  • Windows 10 (1809+)/11 Enterprise
  • Windows 10 (1809+)/11 Pro for Workstations

Network Configuration

Like anything that connects to Microsoft endpoints, there are some specific endpoints related to Windows Autopatch that need to be enabled. If you using a Proxy or Firewall they should be able to be able to bypass authentication to Autopatch cloud service.

Proxy Requirement
Firewall or Proxy must support TLS 1.2 or need to disable protocol detection

Proxy and Firewall Rules for Windows Autopatch Endpoints

Other Required Microsoft Product Endpoints

For a successful Windows Autopatch deployment, devices need to communicate the relevant endpoints seamlessly and with a low latency. Since Autopatch covers other products, having to connect to those endpoints is essential.

Setting up Delivery Optimization

Delivery optimization is a peer-to-peer distribution technology that can be found in Windows 10 and 11 and Windows Autopatch can use this option to deliver updates to the devices more efficiently, especially in a low latency situation and this can reduce the network bandwidth, and gives the opportunity to look for the updates locally from other peers before reaching the Microsoft cloud services.

🔗Read more on Delivery Optimization

🔗Setting up Delivery Optimization

Create a Delivery Optimization Configuration profile

Create a new configuration profile > Search for the Templates and select Delivery Optimization


Device Management

  • Device must be enrolled in Intune

  • Intune must be set as the Mobile Device Management (MDM) authority or co-management must be turned on and enabled on the target devices.

  • If using the Co-management with COnfig Manager/ SCCM – At a minimum, the Windows Update, Device configuration, and Office Click-to-Run apps workloads must be set to Pilot Intune or Intune.

  • Devices must be corporate-owned. Windows bring-your-own-devices (BYOD) are blocked during device registration prerequisite checks.

  • Devices must be managed by either Intune or Configuration Manager co-management. Devices only managed by Configuration Manager aren’t supported.

Supported Config Manager Versions

  • Devices must be in communication with Microsoft Intune in the last 28 days. Otherwise, the devices won’t be registered with Autopatch.

  • Devices must be connected to the internet.

  • Devices must have a Serial numberModel and Manufacturer. Device emulators that don’t generate this information fail to meet Intune or Cloud-attached prerequisite check.

Wrapping Up

Once the environment and device readiness is done, we can look for other considerations specially if you are coming from Config manager or WUfB services.


Discover more from EMS Route

Subscribe to get the latest posts to your email.

One thought on “2. Setting up Prerequisites for Windows Autopatch

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.