ANAVEM
Languagefr
How to Expedite Windows Quality Updates Using Microsoft Intune

How to Expedite Windows Quality Updates Using Microsoft Intune

Deploy critical Windows security updates rapidly by configuring Microsoft Intune's Expedite policy feature to override normal update deferrals and protect against zero-day vulnerabilities.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
March 19, 2026 15 min 0
hardintune 7 steps 15 min

Why Use Microsoft Intune's Expedite Policy for Windows Updates?

When critical security vulnerabilities emerge, waiting for normal update cycles can leave your organization exposed for weeks. Microsoft's Expedite Policy feature in Intune provides a powerful solution for rapidly deploying Windows quality updates that bypass standard deferral settings and deployment timelines.

Traditional Windows Update rings might defer updates for 30-60 days to ensure stability, but zero-day exploits don't wait for your testing schedule. The Expedite Policy feature, introduced in late 2024 and enhanced throughout 2026, allows IT administrators to push specific security updates immediately while maintaining control over the deployment process.

What Makes Expedite Policies Different from Standard Update Rings?

Unlike regular Windows Update for Business policies that apply broad rules to all updates, expedite policies target specific KB updates with surgical precision. They automatically override existing deferrals only for the selected update, leaving your normal update management processes intact for future releases.

The feature supports both monthly Patch Tuesday releases and critical out-of-band (OOB) updates. As of March 2026, it fully supports Windows 11 versions 24H2, 25H1, and 25H2, along with Windows 10 versions still in support. The system integrates seamlessly with Azure AD groups for precise targeting and includes robust monitoring capabilities for tracking deployment progress across your environment.

Related: Set Up Windows LAPS with Microsoft Intune for Enhanced

Related: Remove Weather Icon from Windows 11 Taskbar using Microsoft

Related: Configure Program Pinning to Taskbar Using Microsoft Intune

Related: How to Disable Windows News and Interests Using Microsoft

How Does Expedite Policy Integration Work with Existing Infrastructure?

Expedite policies work alongside your existing Windows Update for Business deployment service without disrupting established processes. They create temporary override conditions that apply only to the specific security update you're deploying, ensuring that your carefully planned update deferrals and testing cycles remain in place for routine updates.

This tutorial will walk you through the complete process of configuring, deploying, and monitoring an expedite policy for a critical security update, including verification steps and troubleshooting common deployment issues that arise in enterprise environments.

Implementation Guide

Full Procedure

01

Access the Intune Admin Center and Navigate to Quality Updates

Start by logging into the Microsoft Intune admin center where you'll configure the expedite policy. This is where all Windows update management happens in modern enterprise environments.

Open your browser and navigate to the Intune admin center:

https://intune.microsoft.com

Once logged in, navigate through the menu structure:

  1. Click Devices in the left navigation
  2. Select Windows from the submenu
  3. Click Windows updates
  4. Select the Quality updates tab

You'll see the quality updates dashboard showing any existing policies and available updates. The interface displays current deployment status and available security updates that can be expedited.

Pro tip: Bookmark the direct URL https://intune.microsoft.com/#view/Microsoft_Intune_DeviceSettings/WindowsUpdatesMenu/~/qualityUpdates for quick access during security incidents.

Verification: Confirm you can see the "Create" button and any existing quality update policies in the dashboard. If you don't see quality updates, verify your Intune licensing includes Windows Update for Business deployment service.

02

Create a New Expedite Policy

Now you'll create the expedite policy that will override normal update deferrals. This policy type specifically targets critical security updates that need immediate deployment.

Click the Create button and select Expedite policy from the dropdown menu. This opens the expedite policy wizard.

Configure the basic policy settings:

Name: Expedite - 2026-03 Security Update - CVE-2026-XXXX
Description: Emergency deployment for critical vulnerability - March 2026 Cumulative Update
Platform: Windows 10 and later

The naming convention is crucial for tracking during security incidents. Include the month, year, and CVE number if known. This helps with audit trails and policy management.

In the Select quality update dropdown, you'll see available updates. For March 2026, you might see:

  • 2026-03 Cumulative Update for Windows 11 version 25H2
  • 2026-03 Cumulative Update for Windows 10 version 22H2
  • Any available out-of-band (OOB) security updates
Warning: Some OOB updates like KB5077744 may not appear immediately in the portal. If you need a specific KB that's missing, contact Microsoft Intune support for escalation.

Verification: Ensure the correct update version is selected and the policy name clearly identifies the security update and deployment date.

03

Configure Deployment Settings and Rollout Strategy

The deployment settings control how aggressively the update pushes to devices. For security updates, you'll want to balance speed with stability.

Configure these critical deployment settings:

Rollout settings:
├── Start rollout: Immediately
├── Rollout percentage: 10% (pilot group)
├── Deployment priority: High
├── Override existing deferrals: Automatic (enabled by default)
└── Restart deadline: 2-7 days (based on urgency)

The restart deadline is particularly important. For critical vulnerabilities, set it to 2-3 days maximum. For standard security updates, 7 days provides better user experience:

Critical CVE (CVSS 9.0+): 2 days
High severity (CVSS 7.0-8.9): 3-5 days
Medium severity: 7 days

The expedite policy automatically overrides any existing update deferrals configured in your Windows Update rings. This means devices that normally defer updates for 30 days will receive this specific update immediately.

Pro tip: Start with a 10% rollout to a pilot group first. Monitor for 24-48 hours, then expand to 50%, then 100% if no issues arise. This staged approach catches compatibility problems early.

Configure notification settings:

User notifications:
├── Show notifications: Enabled
├── Restart reminder frequency: Every 4 hours
├── Allow user to postpone: Until deadline
└── Auto-restart outside active hours: Enabled

Verification: Review all settings before proceeding. The policy should show "Override deferrals: Yes" and your chosen restart deadline.

04

Configure Device Assignments and Target Groups

Proper group assignment ensures the expedite policy reaches the right devices without affecting excluded systems like test environments or critical servers.

Click the Assignments tab and configure your target groups:

Include groups:
├── "Expedited Updates - Pilot" (10% of production devices)
├── "Critical Workstations" (high-priority user devices)
└── "Security Team Devices" (always first to receive updates)

Exclude groups:
├── "Test Environment Devices"
├── "Kiosk Devices"
├── "Legacy Application Servers"
└── "Update Exclusions - Temporary"

Create these Azure AD groups if they don't exist. Use dynamic membership rules for automatic population:

Dynamic rule for pilot group (10% sample):
(device.deviceId -contains "1") or (device.deviceId -contains "2")

Dynamic rule for critical workstations:
(device.deviceCategory -eq "Executive") or (device.department -eq "Finance")

The assignment logic processes in this order: Include groups first, then exclude groups override any inclusions. A device in both an included and excluded group will NOT receive the update.

Warning: Never assign expedite policies to "All Devices" initially. Always use targeted groups to prevent widespread issues if the update causes problems.

Review the assignment summary before saving:

  • Estimated device count should match your expectations
  • Excluded devices should show in the summary
  • No conflicting group memberships

Verification: Click "Review + Save" and confirm the device count matches your pilot group size. The policy should show "Assigned to X devices" after creation.

05

Deploy the Policy and Force Device Synchronization

After creating the policy, you need to ensure devices receive it quickly. By default, devices check in with Intune every 8 hours, but for security updates, you want immediate action.

Save and deploy the policy by clicking Create. The policy status will change to "Deploying" and then "Active" within a few minutes.

To accelerate deployment, force device synchronization using these methods:

Method 1: Intune Admin Center (Recommended)

  1. Navigate to Devices > All devices
  2. Select target devices (use filters for your pilot group)
  3. Click Sync from the top menu
  4. Confirm the sync action

Method 2: PowerShell on Target Devices

# Run as Administrator on target devices
Get-ScheduledTask -TaskName "PushLaunch" | Start-ScheduledTask

# Alternative method
Start-Process "ms-settings:windowsupdate" -Wait

# Force immediate update check
wuauclt.exe /detectnow /updatenow

Method 3: Group Policy (Hybrid environments)

REM Run on domain-joined devices
gpupdate /force
wuauclt /detectnow
Pro tip: Use the Intune Remote Actions feature to sync multiple devices simultaneously. Select up to 100 devices and click "Sync" to trigger immediate policy refresh.

Monitor the deployment progress:

  1. Return to Devices > Windows updates > Quality updates
  2. Click your expedite policy name
  3. Review the Device status tab
  4. Watch for status changes: "Pending" → "Installing" → "Installed"

Verification: Within 30 minutes of sync, devices should show "Policy received" status. Check the device status dashboard for real-time deployment progress.

06

Monitor Deployment Progress and Handle Issues

Active monitoring during expedite deployments is crucial for catching issues early and ensuring successful security patch deployment across your environment.

Access the deployment dashboard:

  1. Navigate to your expedite policy in Quality updates
  2. Click the Device status tab
  3. Review deployment metrics and device-level status

Key metrics to monitor:

Deployment Status Overview:
├── Total targeted devices: XXX
├── Successfully installed: XXX (target: >95%)
├── Installation in progress: XXX
├── Failed installations: XXX (investigate if >5%)
├── Pending restart: XXX
└── Not applicable: XXX (offline devices)

Common status codes and their meanings:

StatusMeaningAction Required
InstallingUpdate downloading/installingMonitor progress
Pending restartUpdate installed, restart neededEnforce restart deadline
FailedInstallation error occurredCheck device logs
Not applicableDevice offline or excludedVerify device status

For failed installations, gather diagnostic information:

# Run on affected devices to check Windows Update logs
Get-WinEvent -LogName "Microsoft-Windows-WindowsUpdateClient/Operational" | Where-Object {$_.TimeCreated -gt (Get-Date).AddHours(-24)} | Select-Object TimeCreated, Id, LevelDisplayName, Message

# Check update history
Get-WUHistory | Where-Object {$_.Date -gt (Get-Date).AddDays(-1)} | Select-Object Title, Date, Result, Description
Warning: If failure rate exceeds 10% in your pilot group, pause the rollout immediately. Investigate the root cause before expanding to additional devices.

Handle common deployment issues:

  • Devices stuck in "Installing": Check available disk space (need 8-10GB free)
  • "Access denied" errors: Verify devices are properly enrolled in Intune
  • "Update not applicable": Device may already have the update or be on unsupported version

Verification: Successful deployment shows >95% of devices with "Installed" or "Pending restart" status within 24-48 hours. Failed devices should be investigated individually.

07

Verify Update Installation and Expand Rollout

Once your pilot deployment succeeds, verify the updates are properly installed and expand to your full environment. This final step ensures complete security coverage.

Verify installation on pilot devices using multiple methods:

Method 1: PowerShell Verification

# Check installed updates (run as admin)
Get-HotFix | Where-Object {$_.InstalledOn -gt (Get-Date).AddDays(-7)} | Sort-Object InstalledOn -Descending

# Verify specific KB (replace with your update KB)
Get-HotFix -Id "KB5034763" -ErrorAction SilentlyContinue

# Check Windows version and build
Get-ComputerInfo | Select-Object WindowsProductName, WindowsVersion, WindowsBuildLabEx

Method 2: Windows Update History

# Detailed update history
Get-WUHistory | Where-Object {$_.Title -like "*2026-03*"} | Select-Object Title, Date, Result, Size

Method 3: Registry Verification

# Check update installation registry
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages" | Where-Object {$_.PSChildName -like "*KB5034763*"}

After confirming successful pilot deployment (>95% success rate), expand the rollout:

  1. Return to your expedite policy in Intune
  2. Click Properties > Assignments
  3. Add additional groups in phases:
Phase 2 (Day 2): Add "Standard Workstations - Group A" (25% of remaining)
Phase 3 (Day 3): Add "Standard Workstations - Group B" (50% of remaining)
Phase 4 (Day 4): Add "All Production Devices" (remaining devices)
Pro tip: Use Intune's reporting features to generate compliance reports. Navigate to Reports > Windows updates > Quality update reports for executive summaries.

Monitor restart compliance and enforce deadlines:

# Check pending restart status across devices
Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired" -ErrorAction SilentlyContinue

For devices approaching restart deadlines, send user notifications:

  1. Navigate to Devices > All devices
  2. Filter devices with "Pending restart" status
  3. Select devices and use Remote actions > Send custom notification

Final verification steps:

  • Confirm 100% of targeted devices show "Installed" status
  • Verify no security vulnerabilities remain using vulnerability scanners
  • Document deployment metrics for compliance reporting
  • Update change management records with completion status

Verification: Run Get-HotFix on a sample of devices to confirm the security update KB is installed. Check Windows Security Center shows no pending security updates.

Frequently Asked Questions

How long does it take for expedite policies to deploy Windows updates to devices?+
Expedite policies typically deploy updates within 8-24 hours of assignment, depending on device check-in schedules. You can accelerate this by forcing device synchronization through the Intune admin center or using PowerShell commands like 'Get-ScheduledTask -TaskName PushLaunch | Start-ScheduledTask' on target devices. Most devices will begin downloading updates within 30 minutes of receiving the policy if they're online and properly enrolled.
Can expedite policies override existing Windows Update ring deferrals automatically?+
Yes, expedite policies automatically override existing update deferrals, but only for the specific KB update you select in the policy. Your normal Windows Update rings and their deferral settings remain intact for all other updates. This surgical approach ensures critical security patches deploy immediately while maintaining your established testing and deployment schedules for routine updates.
What happens if an out-of-band security update isn't available in the Intune portal?+
Some OOB updates like KB5077744 may not appear immediately in the Intune portal due to processing delays. If you need a specific KB that's missing, contact Microsoft Intune support for escalation. As a temporary workaround, you can use traditional Windows Update rings with shortened deferral periods, though this lacks the precision targeting of expedite policies.
How do I handle devices that fail to install expedited Windows updates?+
Monitor the device status dashboard in your expedite policy for failure rates above 5%. Common causes include insufficient disk space (need 8-10GB free), devices being offline, or enrollment issues. Use PowerShell commands like 'Get-WinEvent -LogName Microsoft-Windows-WindowsUpdateClient/Operational' to check Windows Update logs on failed devices. If failure rates exceed 10% in your pilot group, pause the rollout and investigate root causes before expanding deployment.
Can I use expedite policies for non-security Windows quality updates?+
Yes, as of 2026, Microsoft enhanced expedite policies to support non-security quality updates that are released after the monthly B/Security release. However, this feature should be used judiciously since non-security updates typically don't require the same urgency as critical security patches. The same override mechanisms and deployment controls apply, but consider whether standard update rings with shorter deferrals might be more appropriate for non-critical updates.
Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...