Once your pilot deployment succeeds, verify the updates are properly installed and expand to your full environment. This final step ensures complete security coverage.
Verify installation on pilot devices using multiple methods:
Method 1: PowerShell Verification
# Check installed updates (run as admin)
Get-HotFix | Where-Object {$_.InstalledOn -gt (Get-Date).AddDays(-7)} | Sort-Object InstalledOn -Descending
# Verify specific KB (replace with your update KB)
Get-HotFix -Id "KB5034763" -ErrorAction SilentlyContinue
# Check Windows version and build
Get-ComputerInfo | Select-Object WindowsProductName, WindowsVersion, WindowsBuildLabEx
Method 2: Windows Update History
# Detailed update history
Get-WUHistory | Where-Object {$_.Title -like "*2026-03*"} | Select-Object Title, Date, Result, Size
Method 3: Registry Verification
# Check update installation registry
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages" | Where-Object {$_.PSChildName -like "*KB5034763*"}
After confirming successful pilot deployment (>95% success rate), expand the rollout:
- Return to your expedite policy in Intune
- Click Properties > Assignments
- Add additional groups in phases:
Phase 2 (Day 2): Add "Standard Workstations - Group A" (25% of remaining)
Phase 3 (Day 3): Add "Standard Workstations - Group B" (50% of remaining)
Phase 4 (Day 4): Add "All Production Devices" (remaining devices)
Pro tip: Use Intune's reporting features to generate compliance reports. Navigate to Reports > Windows updates > Quality update reports for executive summaries.
Monitor restart compliance and enforce deadlines:
# Check pending restart status across devices
Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired" -ErrorAction SilentlyContinue
For devices approaching restart deadlines, send user notifications:
- Navigate to Devices > All devices
- Filter devices with "Pending restart" status
- Select devices and use Remote actions > Send custom notification
Final verification steps:
- Confirm 100% of targeted devices show "Installed" status
- Verify no security vulnerabilities remain using vulnerability scanners
- Document deployment metrics for compliance reporting
- Update change management records with completion status
Verification: Run Get-HotFix on a sample of devices to confirm the security update KB is installed. Check Windows Security Center shows no pending security updates.