MC1101876 – Hotpatching now enabled by default for new Windows quality update policies

Intune Icon

check before: 2025-06-23

Product:

Intune, Microsoft 365 admin center, Windows, Windows Autopatch

Platform:

Online, Windows Desktop, World tenant

Status:

Change type:

Feature update

Links:

Details:

Summary:
Hotpatching will be enabled by default for new Windows quality update policies starting June 23, 2025, improving security compliance and reducing downtime. Organizations should review and deploy new policies as usual and can enable hotpatch updates on existing policies via the Microsoft Intune admin center.

Details:
Newly created Windows quality update policies will have hotpatch updates enabled by default to streamline policy creation.
[When this will happen:]
Hotpatch updates will be automatically enabled for new policies starting on June 23, 2025 or soon after.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2025-06-24

updated:
2025-06-24

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

Starting June 23, 2025, Windows quality update policies will have hotpatching enabled by default, allowing updates to be applied without restarting devices, which can be enabled for existing policies via the Microsoft Intune admin center.

Direct effects for Operations**

Hotpatching enabled by default
If hotpatching is enabled without proper preparation, it may lead to unexpected application compatibility issues, as some applications may not support hotpatching and could malfunction or crash during updates.
   - roles: IT Support, Application Administrators
   - references: https://learn.microsoft.com/windows/deployment/windows-autopatch/manage/windows-autopatch-hotpatch-updates, https://learn.microsoft.com/windows/deployment/windows-autopatch/

Increased security compliance
Without adequate testing and deployment strategies, enabling hotpatching could inadvertently expose systems to vulnerabilities if the hotpatches are not thoroughly vetted before application.
   - roles: Security Analysts, System Administrators
   - references: https://learn.microsoft.com/windows/deployment/windows-autopatch/manage/windows-autopatch-hotpatch-updates, https://learn.microsoft.com/windows/deployment/windows-autopatch/

Configutation Options**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



Last updated 2 weeks ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!