• Thread Author
Microsoft is rolling a significant change to how new Windows 11 PCs are provisioned: eligible devices will now check for and install the latest quality and security updates during the out-of-box experience (OOBE) so users sign in on day one with a patched, compliant system. This shift, delivered through Autopilot's Enrollment Status Page (ESP) and management controls such as Microsoft Intune, moves routine post-deployment patching into the setup flow itself — shortening time-to-compliance for organizations but also adding new operational considerations for IT teams.

A desktop monitor shows data dashboards in a blue-lit server room.Background​

Microsoft has been testing and progressively exposing the capability to apply quality updates during device setup for more than a year. The feature targets monthly quality (non-feature) updates — the monthly security and reliability releases — and is scoped to managed, domain-joined scenarios where corporate enrollment and policy controls can be applied before handing the device to the end user.
This change is focused on devices that are:
  • Running Windows 11, version 22H2 or later,
  • Microsoft Entra joined (formerly Azure AD joined) or Microsoft Entra hybrid joined,
  • Enrolled through Windows Autopilot and managed by Microsoft Intune or a compatible MDM that leverages the Enrollment Status Page (ESP).
Administrators will see a new ESP setting labelled Install Windows quality updates (might restart the device) that controls whether, at the end of OOBE, the device queries Windows Update and installs any pending quality updates before completing setup. New ESP profiles default to enabling this behavior; existing profiles may need to be edited to opt in.

How the OOBE update flow works​

The update sequence during setup​

At a high level, here is what happens when quality updates are enabled during OOBE:
  • The device completes the initial provisioning and enrollment steps (Autopilot registration, Entra join/hybrid join, and MDM enrollment).
  • Before handing the PC over to the user, the ESP triggers a Windows Update check.
  • If applicable quality updates are found, the device downloads and installs them while still in OOBE.
  • The device may reboot one or more times to finish installation.
  • When update installation completes, the OOBE finishes and the device is presented to the user at first sign-in with the latest quality updates applied.
The vendor guidance cautions that update download and install time depends on update size, network conditions, and device hardware capabilities — commonly adding 20–30 minutes or more to the OOBE flow for typical quality updates. Devices should remain plugged in and connected to the network for the duration.

What updates are — and aren’t — applied​

  • The OOBE update path is explicitly aimed at quality updates (monthly security and reliability fixes).
  • Feature updates (e.g., the next Windows feature release) and driver updates are not targeted during this OOBE quality-update step.
  • Critical zero-day package (ZDP) updates still behave as required: certain critical fixes may download automatically when needed, but the new OOBE capability does not replace the ZDP flow.
This separation is deliberate: Microsoft’s intent is to ensure new devices boot into a secure baseline without introducing the larger, higher-risk changes that feature updates or driver installs can bring during the critical first-login experience.

Why this matters: benefits for organizations and end users​

Bringing quality updates into OOBE changes the lifecycle equation for organizations that manage Windows PCs. The advantages include:
  • Faster compliance and security baseline at first sign-in. Devices leave the factory or distribution center and — once enrolled — receive the latest monthly security patches before the user ever signs in.
  • Reduced post-deployment helpdesk load. With fewer immediate update events after provisioning, new-device support calls and surprise update reboots during the first day are diminished.
  • Cleaner deployment metrics. IT gains confidence that inventory and compliance tooling will report more accurate, up-to-date results immediately.
  • Aligned policies from the start. When paired with Windows Update rings and ESP policy sync, pause/deferral policies can be applied before the device checks for updates, enabling predictable behavior during setup.
From a security standpoint, enabling quality updates at OOBE is a clear win: a device that ships months old will not have to wait until after first use to be patched against the latest vulnerabilities.

Risks and operational pitfalls​

The new behavior also introduces tradeoffs and potential hazards that IT teams must plan for:
  • Longer OOBE times and frustrated users. Adding 20–30+ minutes on top of setup can frustrate users or slow device deployment lines in retail or education scenarios.
  • Update reliability is now part of provisioning SLA. If a quality update fails, the device may be stuck in OOBE or require remediation before the user can sign in, creating new failure modes.
  • Network capacity and bandwidth spikes. Large numbers of new devices pulling updates simultaneously can strain corporate networks and evoke Delivery Optimization design decisions.
  • Risk of problematic updates. Applying a monthly quality update during OOBE exposes devices to whatever regressions the update may carry. Recent examples of problematic updates have shown that even quality patches can introduce severe issues (device recovery failures, storage impacts), so organizations must plan for rollback and pilot testing.
  • Power resilience and physical constraints. Devices need to remain powered and connected. If a device is unplugged or loses network mid-update, OOBE may fail or require additional recovery steps.
Because of these risks, administrators must balance the security advantages with operational readiness, testing policies, and staged rollout strategies.

Admin controls: how to manage the experience​

Microsoft provides several levers so that administrators can control or opt out of the OOBE update behavior and ensure it aligns with organizational policies.

Intune / Enrollment Status Page (ESP)​

The primary control lives in Autopilot’s Enrollment Status Page. Within Microsoft Intune the setting is located in:
  • Microsoft Intune admin center > Devices > Enrollment > Enrollment Status Page > Choose ESP profile > Settings > Install Windows quality updates (might restart the device)
Key notes:
  • New ESP profiles created after the change will default this setting to Yes (enabled).
  • Existing ESP profiles may continue to default to No and must be edited to opt in.
  • Administrators can toggle the setting per profile to match deployment models (e.g., kiosk devices vs. corporate laptops).

Window Update rings and policy sync​

To ensure pause and deferral policy behavior is honored during OOBE, link your Windows Update rings profile to the same Autopilot/ESP device group. When properly assigned, the Windows Update rings profile settings are synchronized to the device before the final update check, meaning the OOBE update will respect the organization's deferral or pause windows.

Group Policy and MDM controls​

If you don’t use Intune or Autopilot, Microsoft exposes this behavior via:
  • MDM policy (for supported third-party MDMs that integrate ESP),
  • Group Policy (a setting administrators can disable locally in on-premise-managed environments).
Third-party MDMs that have implemented Enrollment Status Page support may also surface an equivalent control. Always confirm behavior in your management console and test with pilot devices.

Pause and deferral strategy​

Admins retain the ability to:
  • Pause updates,
  • Defer updates for a set number of days,
  • Use Update Rings to pilot patches first before broad rollout.
Linking update rings to the same device groups used for ESP will ensure consistency in behavior.

Recommended preparation checklist for IT teams​

To adopt quality updates during OOBE with minimal disruptions, IT teams should follow a disciplined preparation and testing approach.
  • Audit current Autopilot and ESP profiles.
  • Verify which ESP profiles exist and whether they default to installing quality updates.
  • Create a pilot ESP profile.
  • Enable the new setting for a small pilot group (e.g., IT-owned devices or a small campus lab).
  • Align Windows Update rings and ESP assignments.
  • Ensure Windows Update ring policies are assigned to the same device group as the ESP profile to sync deferral/pauses.
  • Validate network capacity and Delivery Optimization settings.
  • Configure Delivery Optimization to peer within the network and check bandwidth scheduling to avoid spikes.
  • Extend temporary access token lifetimes if using Temporary Access Passes.
  • Enrollment flows that include multiple reboots and long update times may need longer TOTP/TAP validity.
  • Test power and physical setup workflows.
  • Confirm devices remain plugged in during the entire OOBE process, and verify lab UPS behavior if necessary.
  • Prepare rollback and recovery instructions.
  • Document steps to recover a device stuck in OOBE or to manually apply or remove problematic updates.
  • Communicate expected OOBE times to end users and support staff.
  • Publish clear messaging so recipients of new devices understand that setup may take additional time while updates are applied.
  • Run phased deployment.
  • Use pilot, canary, and broad rings for production rollout. Monitor metrics and telemetry closely.

Technical considerations and edge cases​

Delivery Optimization and caching​

When thousands of devices are imaged or unboxed in a short window (for example, across a school district or enterprise branch refresh), Delivery Optimization helps avoid saturating the internet link. Configure peer caching, local caching servers, or a Content Distribution Network to reduce external bandwidth consumption.

Handling intermittent connectivity​

If a device loses network mid-update, ESP’s behavior may vary depending on the stage of installation. Devices may require:
  • A re-run of provisioning,
  • Manual remediation via Windows Recovery Environment, or
  • Redeployment.
To reduce risk, instruct users or technicians to keep devices connected and plugged in during OOBE and consider staging deployments via local pre-provisioning in scenarios with unreliable connectivity.

Diagnostics and telemetry​

Admins should monitor:
  • Update install success rates,
  • ESP time-to-complete metrics,
  • Failure codes and event logs (Shell-Core and Windows Update logs),
  • User-reported issues during initial sign-in.
These telemetry points help detect if a specific quality update causes broad failures and enable quick action.

Non-Intune MDMs and custom environments​

Organizations using third-party MDMs must verify whether their vendor supports Enrollment Status Page integration and whether the new OOBE update control is exposed. If not supported, the OOBE update behavior will not automatically apply.

Real-world risks: learning from recent incidents​

While enabling quality updates during OOBE improves security posture, the approach does not eliminate the inherent risk that a quality update itself introduces regressions. Recent high-profile incidents have shown that even monthly quality updates can sometimes cause severe disruptions such as storage driver regressions or recovery feature failures. These episodes underscore why organizations should pilot and maintain control over deferral and pause windows rather than adopting a blind “always-on” posture across all devices.
Administrators should weigh the immediate security benefits against the potential for a problematic patch to impede device provisioning at scale.

User experience: what end users will see​

From a user's perspective, when the new behavior is active:
  • The final OOBE screen will display a message indicating Windows is checking for and installing updates.
  • Progress indicators and messages will inform users that updates are in progress and that the device may restart.
  • The device will reboot as necessary without requiring the user to sign in first.
  • After all installs and reboots complete, the user is presented with the usual first-sign-in experience, now on an updated and patched OS.
Clear messaging and expectations are important: provide end users and helpdesk staff with standard responses and timelines to prevent confusion when OOBE takes longer than usual.

Policy and security implications​

Applying security updates during OOBE helps meet compliance requirements more quickly, which is especially beneficial for organizations operating under strict regulatory regimes or sector-specific security baselines. For security operations:
  • New devices will be discoverable as compliant sooner by endpoint security tools.
  • Conditional Access policies that rely on device compliance and posture checks can be enforced from first sign-in.
  • The organization can reduce the window of exposure where an out-of-box device is vulnerable.
However, because the update occurs prior to user sign-in, ensure that any pre-sign-in network access, certificate provisioning, or driver policy is compatible with the update process.

Troubleshooting and remediation playbook​

If devices fail to update during OOBE or become stuck:
  • Use Autopilot diagnostics and the Windows Update logs to capture failure codes.
  • Attempt to reboot into Windows Recovery Environment for offline update troubleshooting.
  • Re-enroll the device into Autopilot via pre-provisioning if necessary.
  • If a specific quality update is problematic across many devices, block or pause the update via Windows Update rings and use a phased rollback or the appropriate catalog-based remediation method.
  • Maintain a documented runbook that includes steps for manual update installation and for creating bootable recovery media.
Quick, documented remediation reduces mean-time-to-resolution when provisioning pipelines encounter issues.

Recommendations: balancing speed, safety, and control​

  • Start small with a pilot group and measure real OOBE times, failure rates, and user impact.
  • Ensure Windows Update ring policies and ESP assignments are aligned before enabling the OOBE update option broadly.
  • Keep Delivery Optimization and local caching options configured to reduce network impact.
  • Maintain the ability to pause or defer updates centrally; avoid forcing an “always-on” configuration across the entire estate on day one.
  • Use telemetry to detect regressions early and have rollback plans in place.
  • Educate frontline IT and helpdesk staff about this behavioral change so they can diagnose and assist efficiently.

What to watch next​

This OOBE update capability is part of a broader set of changes in how Windows handles provisioning and device lifecycle management. Organizations should monitor:
  • Management-console updates that expose finer-grained control,
  • Any changes to which update types are included in OOBE flows,
  • Third-party MDM vendor support for ESP features,
  • Microsoft’s guidance and Message Center notifications tailored to tenants, which sometimes change timing and defaults.
Given the evolution in messaging and rollout timelines observed in public communications, administrators should treat any announced default dates as guidance and confirm timing in their own tenant notices or admin message centers.

Conclusion​

Enabling Windows quality updates during the out-of-box experience represents a practical evolution in Windows provisioning: it reduces the post-deployment patch gap and accelerates time-to-compliance, which is valuable for security and operations. That upside, however, comes with increased operational responsibility — longer OOBE times, network planning, rigorous piloting, and solid rollback procedures.
For IT teams, the new capability is not an automatic “flip the switch” benefit; it is a powerful tool that must be integrated into change control, testing, and provisioning workflows. With careful preparation — aligned ESP profiles, linked Windows Update rings, Delivery Optimization planning, and phased rollouts — organizations can reap the security advantages while avoiding the deployment headaches that can accompany any update-driven process.

Source: Windows Report New Windows 11 Devices Will Now Update During Out of the Box (OOBE) Experience
 

Microsoft is rolling one more control layer into Windows setup: starting with the September 2025 security update, eligible Windows 11 devices enrolled through modern management can automatically download and install Windows quality updates during the Out‑of‑Box Experience (OOBE), with the default behavior enabled for new Enrollment Status Page (ESP) profiles in Microsoft Intune. This change promises fresher, more secure devices at first sign‑in — but it also tightens the screws on who controls updates, how long new device provisioning will take, and where administrators must focus testing and policy planning.

A laptop on a glass desk reflects blue light while a large monitor shows a tech dashboard.Background / Overview​

Microsoft’s shift is the culmination of a multi‑month rollout: a policy surfaced earlier in 2025 that allowed organizations to choose whether to apply quality updates during OOBE, and the functionality has now been made broadly available for eligible managed devices. The capability is surfaced through the Windows Autopilot Enrollment Status Page (ESP) and is manageable from the Microsoft Intune admin center. When enabled, the final stage of OOBE will detect applicable Windows quality updates, download and install them, then restart the device so users sign in to an already‑patched system.
The company frames this as a security and reliability improvement: deploying the latest cumulative fixes during setup reduces post‑deployment update overhead and the risk of shipping machines with known vulnerabilities. For many enterprise and education fleets, that benefit will be real. For others — especially organizations that prefer tightly controlled update cadences, or administrators who depend on image‑based provisioning and zero‑touch flows — the change will force process adjustments.

What Microsoft is changing — the mechanics​

Which updates are targeted​

  • The change applies to quality updates (monthly cumulative updates that include security and reliability fixes) during the OOBE flow.
  • Feature updates (major OS upgrades) and driver updates are not installed as part of this OOBE quality update mechanism; those remain governed by the organization’s feature update and driver management policies.

Eligible devices and SKUs​

  • Devices must be running Windows 11, version 22H2 or later.
  • Supported SKUs include Pro, Enterprise, Education, and SE.
  • Devices must be Microsoft Entra‑joined (formerly Azure AD) or Entra hybrid‑joined and enrolled through an MDM that supports the Autopilot Enrollment Status Page model.
  • The behavior becomes available on devices that either:
  • Received the vendor OOBE zero‑day package (ZDP) delivered in August 2025, or
  • Were imaged with the June 2025 Windows non‑security update or any later servicing package.

Where the control lives​

  • The option to install quality updates during OOBE is exposed as a toggle in the Autopilot Enrollment Status Page (ESP) profile within Microsoft Intune.
  • New ESP profiles created after this change default the "Install Windows quality updates (might restart the device)" setting to enabled.
  • Existing ESP profiles retain their prior settings (the toggle remains off by default for profiles created before the change), which means administrators who use mature profiles won’t be immediately forced into the new behavior unless they edit or recreate profiles.

Admin visibility and constraints​

  • If your organization uses Windows Autopilot + Intune and assigns ESP profiles, you can enable or disable the setting per ESP profile, giving you granular control across device groups.
  • If you don’t use device ESP — for example, if you enroll devices via Autopilot device preparation or a third‑party MDM that does not map ESP settings — certain toggles may not be available and updates may be applied by default in some flows.
  • The system respects Windows Update deferral and pause policies when they are synced to the device prior to the final update check during OOBE.

The admin controls: how to opt out or tune the behavior​

Administrators retain the ability to override the default, but action is required:
  • Sign in to the Microsoft Intune admin center.
  • Navigate to Devices > Enrollment > Enrollment Status Page (ESP).
  • Edit an existing ESP profile or create a new one.
  • Under Settings, locate the Install Windows quality updates (might restart the device) toggle.
  • Set the toggle to off to prevent automatic quality updates during OOBE for devices that receive this profile.
  • Assign the ESP profile to the appropriate Autopilot device group(s) or to “All devices” to ensure consistent behavior.
Key operational notes:
  • New ESP profiles default this setting to enabled, so teams that programmatically create profiles or rely on templates must proactively set it to off to maintain prior behavior.
  • If you plan to keep updates enabled during OOBE, test with representative device images and network conditions to measure the extra time added to provisioning and to verify that your critical provisioning tasks still complete reliably.

Why Microsoft is pushing this (the security and operational argument)​

There are solid reasons behind the policy change:
  • Reduce vulnerability exposure at first sign-in. Devices that roll out of the box with outdated cumulative updates are exposed until IT can push updates; installing the latest quality update during OOBE shortens that window.
  • Lower post‑deployment overhead. IT teams spend significant cycles patching new devices after imaging and deployment. Applying the latest quality update during setup reduces the number of immediate post‑provisioning tasks.
  • Better user experience (in theory). Signing in to a device that doesn’t immediately require reboots or large updates can reduce help‑desk tickets and first‑day frustrations — again, only when updates are stable and quick.
  • Consistency across fleets. Syncing an organization’s pause and deferral policies before the OOBE update check enables an administrator to ensure new devices land on the same approved build as the rest of the fleet.
All of these are valid operational goals, particularly for security‑sensitive deployments such as regulated industries, health care, financial services, or education environments with large managed fleets.

The risks and downsides — why many admins will be wary​

Despite the benefits, this change carries several non‑trivial risks and tradeoffs that IT teams must weigh carefully.

Longer provisioning time and user frustration​

  • Downloading and installing monthly cumulative updates during device setup can add tens of minutes to provisioning time. The actual duration depends on update size, Wi‑Fi throughput, and device performance.
  • In distributed or bandwidth‑constrained environments (satellite offices, field deployments, or home networks), provisioning can be significantly delayed, disrupting scheduled handoffs and onboarding.

Stability and timing issues​

  • Updates, even quality updates, sometimes introduce regressions. Rolling them into OOBE increases the chance that a newly imaged device will encounter a post‑update regression before it even reaches the first user.
  • Recent update incidents in summer 2025 demonstrated how problematic cumulative updates can be; emergency out‑of‑band fixes and rollbacks are not unheard of. Applying those same updates during OOBE amplifies the blast radius if something goes wrong.

Partial loss of control & operational surprises​

  • New ESP profiles default to enabling the setting. Administrators who create profiles without reviewing defaults may unintentionally expose certain device cohorts to forced OOBE updates.
  • Organizations that rely on image‑based provisioning with specific tested KB sets may find the automatic OOBE updates break their carefully controlled build-to‑production process.

Dependency on Intune / Autopilot​

  • The management model is tightly tied to the Autopilot/ESP workflow and works best with Intune. Organizations using other MDM solutions or on‑prem management may need to adapt workflows or wait for their vendor to support equivalent ESP functionality.
  • Some third‑party MDM solutions do support ESP integration, but feature parity and default behaviors vary — requiring validation with each vendor.

User autonomy and trust​

  • This is another step where Microsoft shifts the balance of control from the end user to the platform or the administrator. For devices where user consent is expected, the automatic application of updates during the initial setup may appear heavy‑handed.

Early signals and community reaction​

The rollout follows a tense period for Windows updates in mid‑2025: problematic cumulative updates and emergency out‑of‑band fixes generated significant community noise and interrupted recovery flows in some cases. That context matters because:
  • Many administrators responded cautiously to the new OOBE update behavior, citing concerns about update stability and the added provisioning time.
  • Consumer and enthusiast communities reacted negatively when Microsoft made App Store updates mandatory earlier in the year; that precedent amplifies sensitivity to any move perceived to reduce end‑user choice.
  • Feedback from IT professionals has been consistent: Microsoft should provide clear, conservative defaults and an easy administrative opt‑out. The company appears to have listened to some degree by making the ESP toggle editable and leaving older ESP profiles unchanged.

Practical recommendations — how to prepare your environment​

Every organization’s risk tolerance and deployment pipeline are different. These pragmatic steps will help mitigate the downsides while getting the security benefits where appropriate.
  • Inventory your Autopilot and ESP usage:
  • Identify all ESP profiles in Intune and note which ones are newly created versus long‑standing.
  • Audit assignments to Autopilot device groups and ensure you know which devices will receive new profiles.
  • Review and update ESP defaults:
  • For organizations that require tight image control, proactively edit new ESP templates to set the update toggle to off.
  • Where you want OOBE updates, create a controlled pilot profile and assign only test devices.
  • Increase temporary passcode validity during enrollment:
  • Provisioning that takes longer because of OOBE updates can cause temporary access/password expiry problems. Extend temporary passcode validity where possible to avoid failed enrollments.
  • Network preparation:
  • Ensure provisioning networks have adequate bandwidth and that Windows Update endpoints are reachable. Consider a scheduled staging window for large device waves.
  • On large deployments, use offline media or local update caching (where feasible) to shorten OOBE update time.
  • Test, measure, iterate:
  • Run pilot enrollments simulating remote office and typical end‑user networks.
  • Measure average OOBE time with updates enabled vs disabled and document the delta.
  • Establish rollback plans:
  • Treat OOBE‑time updates like any other production change. Have a remediation plan for failed enrollments, and ensure IT support has the tools and instructions needed to recover devices that fail during OOBE updates.
  • Communicate to end users:
  • If updates during OOBE are enabled, add messaging to welcome‑pack and IT instructions so users know that setup may take longer and to keep devices plugged in.

A recommended checklist for Intune admins (quick action items)​

  • Export a list of current ESP profiles and assignments.
  • Identify which profiles were created after August 2025.
  • For each new profile, verify the "Install Windows quality updates" toggle and set to off if needed.
  • Create a pilot ESP profile with updates enabled and test across multiple hardware classes.
  • Confirm Windows Update deferral policies are synced to Autopilot device groups.
  • Validate temporary password lifetimes for Autopilot enrollments.
  • Update onboarding documentation to reflect potential additional OOBE time.

Legal, governance, and policy considerations​

The change touches on larger debates about software governance and user choice. Administrators should consider policy and compliance impacts:
  • For regulated environments that require strict change control, the default‑on nature of new ESP profiles requires administrative steps to avoid unintended automatic updates.
  • Organizations with device procurement and imaging contracts should update operating procedure documents to capture the new OOBE update flow and any attendant SLA impacts between procurement, imaging teams, and IT operations.
  • Privacy and consent: while updates themselves are not a privacy issue, any change to device behavior during initial setup that affects user experience should be reflected in IT acceptable‑use and onboarding documentation.

What this means for the wider Windows ecosystem​

This change underscores two broader trends:
  • Microsoft continues to centralize update behavior and fleet hygiene mechanisms around cloud management (Microsoft Entra and Intune). The Autopilot + ESP path is now the canonical teleology for Windows provisioning for many organizations.
  • The company is balancing security calculus (reduce unpatched devices in the field) against user and administrator control. Expect more such tradeoffs as Microsoft pursues a more consistent baseline across Windows fleets.
Industry and community reaction will inform how Microsoft tunes defaults and rollout cadence. If problematic updates continue to slip through, the company will face pressure to add more granular pre‑deployment controls, tighter staging, and perhaps server‑side rollout flags to mitigate risk.

Caveats and unverifiable concerns — what to watch for​

  • The policy’s long‑term trajectory is not guaranteed. While the functionality is currently optional for administrators, Microsoft’s history shows it can change defaults and enforcement over time. Any claim that Microsoft will make this mandatory for all devices in the future is speculative and should be treated as a risk scenario, not a fact.
  • The specific behavior of non‑Microsoft MDM integrations varies by vendor. Administrators using third‑party MDMs should verify vendor documentation and test behavior — the extent to which ESP settings are honored outside Intune isn’t uniform.
  • Real‑world provisioning time impacts are highly environment dependent. Published averages are helpful, but teams must measure their own networks, image footprints, and device hardware to get reliable estimates.

Final analysis — balancing security and control​

Microsoft’s OOBE quality update capability is a defensible security move that will benefit many organizations by reducing the window of exposure for newly provisioned devices and by lowering immediate post‑deployment patching work. For fleets where speed, reproducibility, and strict image control are paramount, the default behavior for new ESP profiles represents an operational risk until tested, documented, and incorporated into existing processes.
The practical reality for administrators is straightforward: treat this as a configuration change that requires governance. Inventory, test, and update Intune ESP profiles now. Decide where the security uptick justifies the potential increase in provisioning time, and where the administrative burden or instability risk mandates an opt‑out.
In short: the feature is beneficial when used deliberately and tested comprehensively; it becomes a problem only when applied by default without organizational awareness. The path forward for most IT teams is to pilot with a controlled cohort, measure the impacts, then roll out with policy guardrails that match the organization’s operational priorities.

Source: TechSpot Microsoft will now automatically install 'quality updates' on some Windows 11 PCs during setup
 

Microsoft is rolling a change that will alter the first minutes of life for new Windows 11 devices in many organizations: starting with the September 2025 security update, eligible enterprise and education PCs will check for and install the latest Windows quality updates during the Out‑Of‑Box Experience (OOBE) so the device reaches the desktop already patched and up to date.

Sleek laptop on a white desk displays a blue abstract wallpaper, with a large monitor in the background.Background / Overview​

For years IT teams have wrestled with a predictable pain point: freshly imaged or factory‑fresh devices arrive at users and promptly need multiple rounds of updates before they are secure and fully compliant. Microsoft’s new approach moves monthly cumulative quality updates into the final OOBE page for managed devices so those patches are applied before the first user login. The capability applies to Microsoft Entra‑joined or Entra hybrid‑joined devices running Windows 11, version 22H2 or later, and is controllable via Autopilot’s Enrollment Status Page (ESP) when devices are managed by Intune or compatible MDMs.
This change is aimed squarely at improving security, reducing post‑deployment remediation, and simplifying the “day‑one” support burden for IT departments. It also introduces new operational trade‑offs — notably longer provisioning times and new requirements for aligning update policies with enrollment flows — that must be planned for.

What Microsoft is changing​

The mechanics: updates during the final OOBE page​

At the last page of OOBE, Windows will now check Windows Update and, when applicable, download and install the latest quality update (monthly cumulative security and reliability update). That installation may trigger one or more restarts and will happen before the user reaches the desktop and signs in for the first time.
Key behavior points:
  • Only quality updates (the monthly cumulative security/reliability rollups) are installed during OOBE. Feature updates and driver packages are excluded from this OOBE install path.
  • The process is visible to the end user: OOBE will show a progress/status page while downloads and installs occur.
  • The experience is managed: Intune/ESP can control whether a device installs updates during OOBE or not via a new toggle.

Admin control: the ESP setting​

The new control is surfaced in the Microsoft Intune admin center under Devices → Enrollment → Enrollment Status Page. Inside any ESP profile you’ll find the setting labeled:
Install Windows quality updates (might restart the device)
Administrators can:
  • Turn this toggle on to allow quality updates during provisioning,
  • Turn it off to preserve the previous behavior (no automatic quality updates during OOBE),
  • Assign ESP profiles per Autopilot device group to apply different behavior across fleets.
Important defaults to watch:
  • New ESP profiles created after the change default this setting to Yes (enabled).
  • Existing ESP profiles preserve their prior setting (and therefore default to No until changed).
  • The Intune default ESP profile is applied when no other profile is assigned; teams must check that default profile to avoid unintended behavior.

Which devices are eligible​

This OOBE quality‑update capability targets managed commercial devices with specific enrollments and images:
  • Windows 11 devices running version 22H2 or later (Pro, Enterprise, Education, SE).
  • Devices must be Microsoft Entra‑joined (formerly Azure AD) or Entra hybrid‑joined and enrolled in an MDM that supports Autopilot/ESP (Microsoft Intune is the primary management plane).
  • Devices must either ship or be imaged with the required OOBE support: they need the vendor OOBE zero‑day patch delivered in vendor channels or be imaged with the June 2025 servicing package (or any later servicing update) so the OOBE UI and orchestration logic are present.
This capability does not apply to unmanaged consumer devices or to Windows 10 systems. Organizations that still run Windows 10 should note that mainstream support for Windows 10 ends in October 2025 and should plan migrations accordingly.

Why Microsoft made the change — the benefits​

This isn’t a cosmetic tweak. There are concrete operational and security benefits for organizations that adopt the new flow:
  • Security from day one: Devices leave OOBE with the latest monthly security fixes, reducing the window of exposure for zero‑day or recently patched vulnerabilities.
  • Lower post‑deployment workload: IT help desks spend fewer hours chasing unpatched new devices, which reduces tickets and user frustration.
  • Consistent fleet baseline: When combined with Update Rings/deferral policies, the OOBE check can ensure devices land on the organization‑approved cumulative update.
  • Better compliance posture: Devices are more likely to be compliant with corporate policies immediately after enrollment, aiding audits and reducing risk.
  • Simpler imaging workflows: OEMs and hardware distributors can deliver devices that are closer to the corporate security baseline straight out of the box.
For many organizations the promise of reducing after‑deployment patching is compelling — especially ahead of large seasonal rollouts, new hire waves, or mass refresh cycles.

Operational trade‑offs and risks​

No sizable change to provisioning is without cost. IT teams should weigh the benefits against a handful of important operational trade‑offs.
  • Longer OOBE time: Installing updates during OOBE adds time to device setup. Real‑world tests and vendor guidance suggest average additional provisioning can be around 20 minutes, but this varies widely depending on update size, device hardware, and network throughput.
  • Temporary Access Pass (TAP) expiry risk: If you rely on short‑lived enrollment credentials (for example, Temporary Access Pass) they can expire while updates are installing. Microsoft recommends extending TAP validity or adjusting enrollment procedures to avoid lockouts.
  • Network impact: Large batches of devices pulling updates at first boot can strain network links in branch offices or supply chain staging areas. Delivery Optimization and peer caching can help, but network architects must plan bandwidth.
  • Forced updates if flow not managed: Organizations that do not assign ESP profiles or whose enrollment flows bypass ESP may find quality updates applied by default. If your default ESP (or enrollment flow) has the toggle enabled, devices will install updates automatically — administrators must confirm default behavior to avoid surprises.
  • Policy misalignment: For the OOBE install to respect deferral and pause policies, those Windows Update policies must be synced to the device before the final update check. If Update Rings or Windows Update for Business policies are not correctly assigned to the same groups as the ESP profile, the OOBE install may not honor deferrals consistently.
  • Increased vendor control concerns: Some administrators will view this as another example of Microsoft tightening control over update delivery, reducing flexibility for certain specialized deployment architectures.
These are not show‑stoppers, but they are real practical hurdles many enterprise teams will need to manage.

Practical mitigation and best practices​

IT teams can adopt straightforward practices to take advantage of the new capability while minimizing disruption.
  • Prepare and test in a lab:
  • Create representative ESP profiles and measure OOBE time across common device models.
  • Test with images that include the June 2025 servicing package or OOBE ZDP applied.
  • Audit your ESP assignments:
  • Confirm which ESP profiles are assigned to which Autopilot groups.
  • Inspect the default ESP profile — it may be applied when no profile is explicitly assigned.
  • Align Update Rings and ESP groups:
  • Ensure Windows Update/Update Rings profiles are assigned to the same device groups as ESP so deferrals and pause policies are synced before the OOBE update check.
  • Extend enrollment credentials where needed:
  • If you use Temporary Access Passes or other short‑lived tokens, extend their validity to accommodate the extra OOBE time.
  • Plan bandwidth and caching:
  • Configure Delivery Optimization, branch cache, or peer‑to‑peer caching for large deployments to reduce WAN consumption during OOBE.
  • Stage images with the required servicing updates where possible so devices don’t need large downloads at first boot.
  • Use exclusion groups for special hardware:
  • For kiosks, shared devices, or imaging labs that cannot tolerate extra time, assign an ESP profile with the toggle set to No.
  • Communicate to stakeholders:
  • Update provisioning runbooks, help desk scripts, and new‑hire IT onboarding documents to set expectations about longer first‑boot times.
  • Verify MDM vendor parity:
  • If you use a third‑party MDM, confirm whether the vendor supports the new ESP toggle or how their enrollment flow interacts with Microsoft’s OOBE update path.

Step‑by‑step: how to control the behavior in Intune​

Administrators who manage Autopilot with Intune can implement or change the setting quickly:
  • Sign into the Microsoft Intune admin center.
  • Navigate to Devices → Enrollment → Enrollment Status Page.
  • Edit an existing ESP profile (or create a new one), then open the Settings tab.
  • Locate the Install Windows quality updates (might restart the device) toggle and set to Yes or No depending on your policy.
  • Assign the ESP profile to the appropriate Autopilot device groups, ensuring priority order when multiple profiles apply.
  • Confirm that Windows Update/Update Rings assignments are linked to the same device groups so policy sync occurs prior to OOBE update checks.
This configuration gives granular control per device group and is the recommended administrative surface for this capability.

Imaging, OEMs, and supply‑chain implications​

A subtle but important requirement is that devices must have OOBE support present in the image or receive the vendor OOBE patch to show the update UI and orchestrate installs. That has downstream implications:
  • OEMs and system integrators must ensure images include the June 2025 servicing package or the later August OOBE zero‑day package so the OOBE update flow displays correctly.
  • Enterprises that rely on vendor pre‑staging (device stagers, fleet imaging, or supply‑chain provisioning) should coordinate with OEM partners to confirm images include the necessary updates so OOBE behaves as expected.
  • Resellers and distribution centers that unbox and stage devices at scale need to consider bandwidth and Storage/Delivery Optimization to avoid long delays in transit or at branch locations.
Planning with hardware partners reduces surprises during first‑time provisioning, especially for bulk rollouts.

Security and compliance considerations​

From a security standpoint, this change improves baseline posture by applying the latest cumulative security patch during provisioning. However, it does not replace ongoing vulnerability management or feature‑update strategy.
  • OOBE installs only address quality‑update class fixes; feature updates (major OS upgrades) should still be controlled and scheduled via your Update Rings and feature update policies.
  • Compliance and audit teams benefit from devices leaving OOBE at a known patch level, but administrators should still document update baselines and ensure telemetry and reporting reflect OOBE installs.
  • Organizations with strict change control windows should synchronize their Update Rings and test cycles so only approved cumulative updates are offered during OOBE.
Implementing OOBE quality updates should be treated as part of the broader patch‑management lifecycle, not a one‑time fix.

The political and cultural angle inside enterprise IT​

Beyond the technical considerations, this change touches a recurring theme in enterprise IT: the balance between centralized control and administrative autonomy.
  • For many IT pros this is welcome — fewer “first‑day” tickets and faster secure access.
  • For others, especially those who depend on highly controlled, offline, or regulated provisioning flows, it feels like more automation is being imposed by Microsoft.
  • The reality is nuanced: Microsoft provides control mechanisms — ESP toggles, Group Policy counterparts, and MDM policy mirrors — but organizations must proactively configure them. The most common operational mistake will be assuming old defaults persist and not auditing the default ESP profile or newly created profiles.
The move is emblematic of Microsoft’s broader strategy to reduce unpatched exposure while steering more customers toward cloud‑managed, Intune‑driven administration.

Quick checklist for IT teams (ready to copy into runbooks)​

  • Verify device images include the June 2025 servicing package or ensure OEMs supply the OOBE Zero‑Day Patch.
  • Audit your Intune ESP profiles and the default ESP profile setting.
  • Align Update Rings with Autopilot device groups assigned to ESP.
  • Configure Delivery Optimization for bandwidth‑constrained sites.
  • Extend Temporary Access Pass validity during enrollment windows.
  • Create exclusion ESP profiles for special‑purpose devices (kiosks, imaging labs).
  • Update help desk documentation and new‑hire setup scripts.
  • Validate third‑party MDM behavior if you do not use Intune.

Final analysis — who should enable OOBE quality updates today?​

For most mainstream corporate fleets — laptops and desktops used by knowledge workers that enroll via Autopilot and are managed by Intune — enabling quality updates during OOBE is a net win. It reduces risk, cuts help desk load, and improves compliance.
Caveats apply for:
  • Branch offices with constrained WAN links where simultaneous first‑boot updates will overload networks.
  • Scenarios that rely on strictly timed enrollment tokens or where provisioning must complete in a minimal timeframe (kiosks, field units).
  • Organizations using non‑Intune MDMs that might not expose the new toggle immediately.
The right path is pragmatic: test, measure provisioning time, and roll the setting out by device group rather than relying on one blanket decision.

Conclusion​

Microsoft’s decision to offer Windows quality updates during OOBE addresses a long‑standing operational gap: new devices that are secure and compliant the moment they reach an employee’s hands. The feature brings meaningful security and lived productivity benefits for enterprise and education customers but also introduces operational costs that require planning — longer setup times, credential expiry considerations, and careful policy alignment.
Administrators who treat this as an opportunity — audit ESP assignments, align Windows Update policy groups, stage images with the required servicing, and prepare network and help‑desk teams — will find day‑one security significantly improved and the post‑deployment patch sprint much shorter. The change is powerful, but like any automation, its value depends on the discipline and testing that organizations put around it.

Source: TechRepublic Microsoft Will Deliver Windows Quality Updates During Setup Soon
 

Starting in September 2025, Microsoft will change how Windows 11 devices are provisioned for enterprise and education customers by installing the latest Windows quality updates during the final page of the out‑of‑box experience (OOBE)—a move that promises stronger security and fewer post‑deployment patching tasks but also introduces new operational trade‑offs IT teams must plan for. (techcommunity.microsoft.com)

A laptop on a desk shows a blue abstract wallpaper, with a blurred person and digital screens in the background.Background​

Microsoft’s OOBE quality‑update capability is an evolution of prior work to make device provisioning more secure and predictable. The feature targets Windows 11 devices on version 22H2 or later, and is scoped to devices that are Microsoft Entra‑joined or Entra hybrid‑joined and managed through Microsoft Intune or a compatible MDM. The mechanism checks Windows Update on the last page of OOBE and installs applicable quality updates (monthly cumulative security/reliability rollups) before the user reaches the desktop. Feature updates and hardware driver packages are explicitly excluded from the OOBE installation path. (techcommunity.microsoft.com, learn.microsoft.com)
Microsoft first outlined the concept and a policy control earlier in 2025 and has since moved the capability into production‑ready guidance, with broader availability tied to the September 2025 monthly update cadence and prerequisite packages (including the August 2025 OOBE zero‑day package or the June 2025 non‑security image update). Administrators will see a new toggle in the Autopilot Enrollment Status Page (ESP) settings to control whether Windows quality updates install during provisioning. (techcommunity.microsoft.com)

What exactly is changing?​

The mechanics: when and what updates run​

  • On the final page of the OOBE, Windows will check Windows Update and, when appropriate, download and install the latest quality update applicable to that device build. The installation may require one or more reboots before the user completes first sign‑in. Feature updates and driver packages are not installed through this OOBE path. (learn.microsoft.com, windowsforum.com)
  • The update action is visible to the end user: OOBE will display a status/progress page while downloads and installs occur, and a restart sequence will complete before the desktop is shown. Microsoft notes average additional setup time can be around 20 minutes, though real‑world time depends on update size, network bandwidth, and hardware performance. (techcommunity.microsoft.com, learn.microsoft.com)

Which devices are eligible​

  • Windows 11 devices running 22H2 or later.
  • SKUs supported: Pro, Enterprise, Education, and SE.
  • Devices must be joined to Microsoft Entra (Azure AD) or hybrid‑joined, and be managed by Intune or another supported MDM that integrates with Autopilot/ESP. (techcommunity.microsoft.com)

Admin controls: the Intune/Autopilot ESP toggle​

Administrators can manage the behavior through the Intune admin center by editing an Enrollment Status Page (ESP) profile:
  • Sign into the Microsoft Intune admin center.
  • Go to Devices > Enrollment > Enrollment Status Page.
  • Select or create an ESP profile and open Settings.
  • Locate and set Install Windows quality updates (might restart the device) to Yes or No.
Crucial defaults to watch:
  • New ESP profiles created after the change default the setting to Yes (enabled).
  • Existing ESP profiles keep their current value (typically No) until edited.
  • The Intune default ESP profile is applied when no other profile is assigned; admins should verify the default to avoid unexpected behavior. (techcommunity.microsoft.com, learn.microsoft.com)

Why Microsoft is doing this: benefits for security and IT operations​

Microsoft frames the change as a response to enterprise feedback: administrators want devices to be secure and consistent before users start using them. The main benefits are:
  • Immediate hardening at first boot: devices receive the latest security and reliability patches before first sign‑in, reducing the attack surface from day one. (techcommunity.microsoft.com)
  • Fewer follow‑up updates and helpdesk tickets: early patch application reduces the common scenario where users receive devices and then face immediate update prompts, restarts, or app breakages—items that frequently generate support calls.
  • Better alignment with change control: the new mechanism synchronizes with Windows Update for Business policies (deferrals, pause windows) when those policies are applied to the same Autopilot/ESP device group, enabling organizations to keep provisioned devices on the same approved update version. (techcommunity.microsoft.com)
These are practical gains for organizations deploying at scale: fewer post‑deployment surprises, consistent starting baselines for security audits, and less variance across newly delivered devices.

Operational trade‑offs and risks​

The feature is beneficial, but not without operational impact. IT and security teams should weigh the following risks and caveats.

1. Longer provisioning windows and logistics​

Installing quality updates during OOBE can add time to device provisioning—Microsoft cites an average of around 20 minutes, with possible variance up to 30 minutes or more depending on the update size and network/hardware conditions. For large rollouts or in‑the‑field device activations (kiosks, retail, schools), that additional latency can create queues, user frustration, and calendar slippage. (techcommunity.microsoft.com, learn.microsoft.com)

2. Temporary Access Pass (TAP) and authentication expiry​

Because OOBE may take longer, Temporary Access Pass tokens used during Autopilot enrollment can expire before the user reaches desktop sign‑in. Microsoft recommends extending TAP validity or adjusting enrollment workflows to avoid mid‑provisioning authentication failures. Failure to plan for TAP expiry can strand end users and increase support calls. (techcommunity.microsoft.com, windowsforum.com)

3. Imposed updates when ESP is absent or misaligned​

If devices are enrolled via Autopilot device preparation policies or do not have a device‑level ESP profile assigned, the OOBE update action may be applied by default and might not be immediately disableable in some scenarios. Microsoft’s documentation warns that when you’re not using device ESP, you may not be able to turn off Windows updates during OOBE—this behavior can be surprising for organizations that rely on custom image workflows or third‑party provisioning. Administrators must confirm their Autopilot and ESP assignments to avoid unintended enforcement. (techcommunity.microsoft.com, learn.microsoft.com)

4. Update failures during OOBE​

Applying updates during a zero‑touch or near zero‑touch provisioning flow raises the stakes: if a monthly quality update contains a regression that impacts a subset of hardware, an entire batch of new devices could hit the same fault during setup and require remediation. The usual mitigations (pilot rings, staged rollout) become critical here because the failure surface is front‑loaded into an automated provisioning path. (learn.microsoft.com)

5. Policy synchronization complexity​

To ensure the new behavior respects deferrals and pause rules, Windows Update rings and the ESP profile must be assigned to the same device group; inconsistent assignments could yield unexpected update behavior. This creates an operational dependency that needs explicit provisioning logic and group management to avoid drift. (techcommunity.microsoft.com)

Practical guidance for IT teams: recommended rollout plan​

To adopt OOBE quality updates responsibly, follow a tested, staged approach:
  • Pilot cohort
  • Create a small pilot device group representing key hardware models and imaging paths.
  • Assign an ESP profile with Install Windows quality updates = Yes and validate the flow.
  • Verify prerequisites
  • Ensure devices are on Windows 11 22H2 or later and include the August 2025 OOBE ZDP or are imaged with the June 2025 non‑security update where applicable. (techcommunity.microsoft.com)
  • Align update rings
  • Assign Windows Update for Business rings to the same Autopilot/ESP groups to guarantee deferral and pause policies are applied pre‑NDUP (New Device Update Page) check. (techcommunity.microsoft.com)
  • Adjust authentication windows
  • Increase Temporary Access Pass (TAP) lifetimes or change enrollment flows to avoid expiry during longer OOBE sequences. (techcommunity.microsoft.com)
  • Test recovery and rollback
  • Prepare a recovery plan for failed OOBE updates: documented steps for reimaging, network isolation, or vendor assistance if a monthly quality update breaks a hardware family.
  • Communicate with stakeholders
  • Notify procurement, vendor partners, and end users about the potential extra time during out‑of‑the‑box provisioning and update any device handoff scripts or SLAs accordingly.
  • Monitor telemetry
  • Use Intune diagnostics, Windows Update logs, and A/B pilot telemetry to detect abnormalities before scaling to broader groups.
This approach reduces risk while enabling the security benefits of patched devices at first sign‑in.

Policy, compliance, and security implications​

From a governance standpoint, installing security updates during OOBE aligns device provisioning with baseline compliance requirements out of the gate. That matters for:
  • Regulated industries: devices delivered to users are immediately at the organization’s approved patch level, simplifying audits and reducing zero‑day exposure.
  • Zero trust initiatives: reducing windows of unpatched exposure for freshly provisioned endpoint hardware supports broader identity and device posture checks that modern security stacks enforce.
  • Supply‑chain and vendor imaging: organizations that accept vendor‑imaged devices should verify the image includes the required preconditions (the June 2025 non‑security update or later) so OOBE update behavior is predictable. (techcommunity.microsoft.com)
However, there are trade‑offs: if a monthly quality update introduces an unforeseen regression, devices provisioned during the rollout could exhibit the same faulty behavior en masse—making staging and pilot testing non‑optional for high‑risk deployments.

Technical caveats and edge cases​

Network constraints and bandwidth considerations​

Bulk provisioning in constrained networks—branch offices, classrooms, retail stores—may suffer from excessive bandwidth use and prolonged setup times. Consider local caching (WSUS/Delivery Optimization) or image management strategies to reduce per‑device download times.

Non‑Intune MDMs and third‑party provisioning​

While Microsoft’s control surfaces are in Intune/Autopilot ESP today, other MDM vendors supporting Autopilot may offer equivalent toggles. Admins should confirm vendor support and test non‑Intune enrollment paths to ensure parity. (techcommunity.microsoft.com)

Devices that ship with very old images​

Devices imaged with older Windows builds may require larger cumulative downloads during OOBE. Imaging teams should prioritize shipping devices imaged with June 2025 non‑security update or later to reduce OOBE download volume and time. (techcommunity.microsoft.com)

OOBE Zero Day Package (ZDP)​

Microsoft’s ZDP mechanism for last‑minute critical fixes remains distinct: ZDP updates begin downloading automatically as part of OOBE when required, and are not changed by this new policy. The OOBE quality update feature supplements, but does not replace, existing ZDP behavior. (learn.microsoft.com)

Real‑world scenarios: wins and gotchas​

Scenario: Enterprise laptop refresh (win)​

A global sales team receives new laptops. With OOBE quality updates enabled for the pilot group, devices arrive at users already at the approved security baseline, eliminating follow‑up restarts and ensuring immediate compliance with conditional access policies. Helpdesk tickets for “why did my laptop restart?” drop sharply.

Scenario: School rollouts (gotcha)​

A school orders 200 laptops and plans to hand them out on the first day. On‑site Wi‑Fi cannot sustain 200 simultaneous downloads; OOBE times balloon, students and teachers miss morning lessons, and TAPs expire. Solution: stage the rollout, preseed images or use local delivery optimization.

Scenario: Vendor imaged desktops (potential surprise)​

A vendor ships desktops using an older base image. Because an ESP profile wasn’t assigned or because device preparation policies were used, the OOBE update runs by default and forces a large download and multiple restarts, delaying device acceptance at the receiving site. The receiving IT team must coordinate image expectations with vendors to avoid surprise delays. (learn.microsoft.com)

Action checklist for administrators (concise)​

  • Verify device eligibility (Windows 11 22H2+, supported SKUs). (techcommunity.microsoft.com)
  • Confirm your tenant has the August 2025 OOBE ZDP or that images include the June 2025 update.
  • Audit ESP profile assignments and the Intune default ESP profile.
  • Create a small, representative pilot group and validate the end‑to‑end OOBE + update sequence.
  • Align Windows Update rings and ESP assignments to the same device groups.
  • Extend TAP lifetimes or adjust enrollment flows to account for longer OOBE.
  • Communicate provisioning time expectations to procurement, vendors, and users.
  • Prepare a remediation/rollback playbook for update failures during provisioning.

Final analysis: is this a net positive?​

On balance, the change is a pragmatic, security‑focused improvement for enterprise and education environments. The ability to ensure a device starts its life at the organization’s approved patch level reduces exposure to known CVEs and simplifies compliance. For IT organizations that already use Autopilot and Intune, the new ESP toggle provides a familiar control surface and integrates with Windows Update for Business policies, offering flexibility. (techcommunity.microsoft.com)
However, the feature raises legitimate operational concerns around provisioning time, authentication token expiry, imaging and vendor workflows, and the risk of an out‑of‑band quality update introducing regressions during a mass rollout. These are not blockers, but they are meaningful risks that require disciplined pilot programs, group alignment, and communications with procurement and vendors.
In short: the technical design is sound and aligned with modern endpoint security goals, but success depends on rigorous operational readiness. IT teams that treat the change as simply “flip the toggle” will likely encounter friction; teams that plan, pilot, and align update policies and Autopilot assignments will realize significant gains in security, compliance, and user experience.

Conclusion​

Microsoft’s move to install Windows quality updates during OOBE for managed Windows 11 devices (22H2+) represents a notable shift in how organizations can harden endpoints from the moment they’re first powered on. The capability—managed via the Autopilot Enrollment Status Page (ESP) in Intune—delivers concrete security and operational benefits, but it introduces new dependencies around provisioning time, group alignment, and vendor imaging workflows. With careful testing, clear communication, and updated enrollment playbooks, IT teams can make this change an effective tool to reduce post‑deployment patching work and deliver more reliable first‑use experiences for end users. (techcommunity.microsoft.com, learn.microsoft.com)
Cautionary note: some behavior details—especially around devices enrolled without an ESP profile and interactions with non‑Intune MDM solutions—can vary depending on provisioning paths and policy alignment; organizations should validate behavior in their specific environment before broad adoption. (techcommunity.microsoft.com, learn.microsoft.com)

Source: Dataconomy Windows 11 OOBE update installs start September 2025
 

Back
Top