You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Together, these reports provide insight into the update state and compliance of Windows devices in your organization and can help you troubleshoot problems with feature update deployment.
@@ -387,24 +387,24 @@ Other reports for Microsoft Defender Antivirus include:
387
387
-[Antivirus agent status report](#antivirus-agent-status-report-organizational), an organizational report detailed in this article.
388
388
-[Antivirus policy reports](../protect/endpoint-security-antivirus-policy.md#antivirus-policy-reports), which are available in the Antivirus node under Endpoint security in the Microsoft Endpoint Manager admin center.
389
389
390
-
## Windows 10 and later feature updates (Organizational)
390
+
## Windows 10 feature updates (Organizational)
391
391
392
-
A Windows update report, the **Windows 10 and later feature updates** report provides an overall view of compliance for devices that are targeted with a **Feature updates for Windows 10 and later** policy. This report provides the update status based on update state. You can also see specific device update details. The data found in these reports is timely, calls out the device name and state, and other update related details. A summary report is available in the **Windows updates** workload. This report also provides filtering, searching, paging, and sorting.
392
+
A Windows update report, the **Windows 10 feature updates** report provides an overall view of compliance for devices that are targeted with a **Feature updates for Windows 10 and later** policy. This report provides the update status based on update state. You can also see specific device update details. The data found in these reports is timely, calls out the device name and state, and other update related details. A summary report is available in the **Windows updates** workload. This report also provides filtering, searching, paging, and sorting.
393
393
394
394
For information about how to use this report to resolve update failures, see [Reports for Windows 10 and later feature updates policy](../protect/windows-10-feature-updates.md).
395
395
396
-
You can view the **Windows 10 and later feature updates** report using the following steps:
396
+
You can view the **Windows 10 feature updates** report using the following steps:
397
397
398
398
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
399
399
2. Select **Reports** > **Windows updates** to view the summary report.
400
-
3. Select the **Reports** tab and select the **Windows Feature Update Report** to see the **Windows 10 and later feature updates** report.
400
+
3. Select the **Reports** tab and select the **Windows Feature Update Report** to see the **Windows 10 feature updates** report.
401
401
4. Select the **Update aggregated status** and **Ownership** filters to refine your report.
402
402
5. Select **Generate report** (or **Generate again**) to retrieve current data.
403
403
404
404
> [!IMPORTANT]
405
405
> To get a complete picture of Windows feature updates status, use the following feature updates reports:
406
406
>
407
-
> - Windows 10 and later feature updates (Organizational) *(this report)*
407
+
> - Windows 10 feature updates (Organizational) *(this report)*
> Together, these reports provide insight into the update state and compliance of Windows devices in your organization and can help you troubleshoot problems with feature update deployment.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/windows-10-feature-updates.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,7 @@ The following are prerequisites for Intune's Feature updates for Windows 10 and
118
118
119
119
Monitor the report for the policy. To do so, go to **Reports** > **Windows Updates** > **Reports** Tab > **Feature Updates report**. Select the policy you created and then generate the report.
120
120
121
-
5. Devices that have a state of *OfferReady* or later, are enrolled for feature updates and protected from updating to anything newer than the update you specified in step 3. See, [Use the Windows 10 and later feature updates (Organizational) report](../protect/windows-update-compliance-reports.md#use-the-windows-10-and-later-feature-updates-organizational-report).
121
+
5. Devices that have a state of *OfferReady* or later, are enrolled for feature updates and protected from updating to anything newer than the update you specified in step 3. See, [Use the Windows 10 feature updates (Organizational) report](../protect/windows-update-compliance-reports.md#use-the-windows-feature-updates-organizational-report).
122
122
6. With devices enrolled for updates and protected, you can safely change the *Windows Update policies* workload from Configuration Manager to Intune. See, [Switch workloads to Intune](/configmgr/comanage/how-to-switch-workloads) in the co-management documentation.
123
123
124
124
- When the device checks in to the Windows Update service, the device's group membership is validated against the security groups assigned to the feature updates policy settings for any feature update holds.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/windows-update-compliance-reports.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: brenduns
9
9
ms.author: brenduns
10
10
manager: dougeby
11
-
ms.date: 04/18/2022
11
+
ms.date: 10/05/2022
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: protect
@@ -19,7 +19,7 @@ ms.localizationpriority: high
19
19
#ROBOTS:
20
20
#audience:
21
21
22
-
ms.reviewer: dudeso
22
+
ms.reviewer: zadvor
23
23
ms.suite: ems
24
24
search.appverid: MET150
25
25
#ms.tgt_pltfrm:
@@ -35,8 +35,8 @@ ms.collection:
35
35
With Intune, you can deploy updates to Windows 10/11 devices by using policies for [Update rings for Windows 10 and later](../protect/windows-10-update-rings.md) and [Feature updates for Windows 10 and later](../protect/windows-10-feature-updates.md). To help you monitor and troubleshoot update deployments, Intune supports the following reporting options:
36
36
37
37
-**Reports in Intune**:
38
-
-**Windows 10 and later update rings** – Use a [built-in report](#reports-for-update-rings-for-windows-10-and-later-policy) that's ready by default when you deploy update rings to your devices.
39
-
-**Windows 10 and later feature updates***In public preview* – Use [two built-in reports](#reports-for-windows-10-and-later-feature-updates-policy) that work together to gain a deep picture of update status and issues. These reports require you to configure data collection from devices before the reports can display data about feature updates.
38
+
-**Windows 10 update rings** – Use a [built-in report](#reports-for-update-rings-for-windows-10-and-later-policy) that's ready by default when you deploy update rings to your devices.
39
+
-**Windows 10 feature updates***In public preview* – Use [two built-in reports](#reports-for-windows-10-and-later-feature-updates-policy) that work together to gain a deep picture of update status and issues. These reports require you to configure data collection from devices before the reports can display data about feature updates.
40
40
41
41
-**Update Compliance**:
42
42
@@ -65,23 +65,23 @@ Intune offers integrated reports to view detailed Windows update deployment stat
65
65
66
66
The data in the Intune reports for Feature updates for Windows 10 and later policy is used only for these reports and doesn't surface in other Intune reports.
67
67
68
-
-[Windows 10 and later feature updates (Organizational)](#use-the-windows-10-and-later-feature-updates-organizational-report) - This report provides an overall view of compliance for devices on a per-policy basis.
68
+
-[Windows 10 feature updates (Organizational)](#use-the-windows-10-feature-updates-organizational-report) - This report provides an overall view of compliance for devices on a per-policy basis.
69
69
-[Feature update failures report (Operational)](#use-the-feature-update-failures-operational-report) – This report provides details on Alerts – errors, warnings, information, and recommendations – on a per-policy basis to help troubleshoot and optimize your devices.
70
70
71
71
Before you can use the feature updates policy reports, you must configure prerequisites for the report.
72
72
73
73
### Prerequisites
74
74
75
-
-**Data collection**: Before a device can send the reporting data that's used in the Windows 10 and later feature updates report for Intune, you must [Configure data collection](#configure-data-collection):
75
+
-**Data collection**: Before a device can send the reporting data that's used in the Windows 10 feature updates report for Intune, you must [Configure data collection](#configure-data-collection):
76
76
77
77
- Service-based data is collected for all feature update versions and doesn't require you to configure data collection.
78
78
- Client-based data is collected from devices only after data collection is configured.
79
79
80
-
Service and client-based data is described in [Use the Windows 10 and later feature updates (Organizational) report](#use-the-windows-10-and-later-feature-updates-organizational-report) later in this article.
80
+
Service and client-based data is described in [Use the Windows 10 feature updates (Organizational) report](#use-the-windows-10-and-later-feature-updates-organizational-report) later in this article.
81
81
82
82
-**Devices**: Devices must:
83
83
84
-
- Meet the [prerequisites for Windows 10 and later feature updates policy](../protect/Windows-10-feature-updates.md#prerequisites) as documented in **Windows 10 and later feature updates with Intune**.
84
+
- Meet the [prerequisites for Windows 10 and later feature updates policy](../protect/Windows-10-feature-updates.md#prerequisites) as documented in **Feature updates for Windows 10 and later policy in Intune**.
85
85
- Be Azure Active Directory Joined, or Hybrid Azure Active Directory Joined to support submitting of data for reporting.
86
86
- Run Windows 10 1903 or later, or Windows 11. Although Windows 10 and later feature updates policy supports earlier versions of Windows, earlier versions don't support reporting of the data that Intune uses for the feature updates reports.
87
87
@@ -125,13 +125,13 @@ The data for these reports is generated at different times, which depend on the
125
125
126
126
-**Service-based data from Windows Update** – This data typically arrives in less than an hour after an event happens in the service. Events include Alerts for a device that can't register with Windows Update (which is viewable in the *Feature update failures report*), to status updates about when Windows Update began offering an update to clients. This data is available without configuring data collection.
127
127
128
-
-**Client-based data from Intune devices that are configured to send data to Intune** – This data is processed in batches and refreshes every eight hours, but is only available after you configure data collection. The data contains information like when a client doesn't have enough disk space to install an update. This data is also used in the Windows 10 and later feature updates organizational report to show the various installation steps a device moves through when installing feature updates.
128
+
-**Client-based data from Intune devices that are configured to send data to Intune** – This data is processed in batches and refreshes every eight hours, but is only available after you configure data collection. The data contains information like when a client doesn't have enough disk space to install an update. This data is also used in the Windows 10 feature updates organizational report to show the various installation steps a device moves through when installing feature updates.
129
129
130
-
### Use the Windows 10 and later feature updates (Organizational) report
130
+
### Use the Windows 10 feature updates (Organizational) report
131
131
132
132
*In public preview*
133
133
134
-
The **Windows 10 and later feature updates** report provides an overview of compliance for devices you target with a [Windows feature updates](../protect/windows-10-feature-updates.md) policy.
134
+
The **Windows 10 feature updates** report provides an overview of compliance for devices you target with a [Windows feature updates](../protect/windows-10-feature-updates.md) policy.
135
135
136
136
> [!IMPORTANT]
137
137
> Before this report can show data, you must [configure data collection](#configure-data-collection) for the Windows feature updates reports.
@@ -148,7 +148,7 @@ To use the report:
148
148
> [!div class="mx-imgBorder"]
149
149
> 
150
150
151
-
3. To open the **Windows 10 and later feature updates** report and view device details for a specific feature updates profile:
151
+
3. To open the **Windows 10 feature updates** report and view device details for a specific feature updates profile:
152
152
153
153
- In the admin center, go to **Reports** > **Windows updates** > select the **Reports** tab > select **Windows Feature Update Report**.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/windows-update-for-business-configure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ Use the following process to ensure Windows Update has processed your feature up
74
74
75
75
After the saved policy is assigned to devices, it will take a few minutes for Windows Update to process the policy.
76
76
77
-
2. View the [Windows 10 and later feature updates (Organizational)](../protect/windows-update-compliance-reports.md#use-the-windows-10-and-later-feature-updates-organizational-report) report for the feature update policy, and verify devices have a state of **OfferReady** before you proceed. Once all devices show **OfferReady**, Windows Update has completed processing the policy.
77
+
2. View the [Windows 10 feature updates (Organizational)](../protect/windows-update-compliance-reports.md#use-the-windows-10-feature-updates-organizational-report) report for the feature update policy, and verify devices have a state of **OfferReady** before you proceed. Once all devices show **OfferReady**, Windows Update has completed processing the policy.
78
78
79
79
3. After devices are verified to be in the **OfferReady** state you can safely reconfigure the [Windows 10 and later update ring policy](../protect/windows-10-update-rings.md) for that same set of devices to change the setting **Feature update deferral period (days)** to a value of **0**.
0 commit comments