ConfigMgrDogs
@configmgrdogs.bsky.social
840 followers
210 following
170 posts
linktr.ee/ConfigMgrDogs
Posts
Media
Videos
Starter Packs
ConfigMgrDogs
@configmgrdogs.bsky.social
· Sep 15
Enhancing AVD and Windows 365 experience with health checks
To further optimize the user experience for Azure Virtual Desktop (AVD) and Windows 365 (W365), Microsoft has introduced a health check suite. This diagnostic platform is designed to proactively identify issues on end-user devices, improving reliability and performance across supported platforms.
What are health checks?
Health checks are automated diagnostics that run at key moments in the user journey:
* When the Windows App starts
* When a resource connection fails
* When the user manually reruns the checks
* Upon changes in network connectivity status
These checks help detect compatibility and connectivity issues before they impact the user experience.
The Health Check suite
The suite currently includes three core checks:
1. Windows version compatibility
Ensures the installed OS version is compatible with the Windows App, preventing potential functionality issues (available only on Windows platform).
2. Network connection
Verifies that the local device is connected to a network and can access the internet, a prerequisite for cloud-based services.
3. Service reachability
Confirms the device can connect to essential endpoints required for AVD and W365 functionality. A full list of endpoints is available here.
Getting started
Run health checks from the Device Health Report Panel in the Windows App for Windows, or via the Help menu in the Windows App for MacOS, iOS and Android devices:
* Click the device health button to open the panel.
* Select "Check again"/ “Run Health Checks” to rerun diagnostics.
* View results and follow remediation steps if errors are detected.
* Access logs directly from the health menu using the "Open Log"/ “Open Log Folder” button.
Platform and cloud support
Currently, health checks are supported on:
* Public cloud environments (Government clouds not yet supported)
* Platforms: Windows, iOS, macOS and Android
Final thoughts
The Health Check suite offers IT admins and end users transparent, proactive troubleshooting to ensure optimal performance in their AVD and Windows 365 environments. As support expands and features evolve, users can expect even greater reliability and diagnostic precision.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Sep 10
Cross-region Disaster Recovery for Windows 365 Frontline (dedicated mode)
Windows 365 Frontline supports shift-based employees and contractors in critical industries such as healthcare, retail, manufacturing, and large customer support centers where downtime is not an option and disaster recovery is essential. Expanding Cross-region Disaster Recovery to Frontline in dedicated mode provides these organizations protection against regional outages, safeguarding productivity and service continuity.
Following the public preview announcement, we are excited to announce that Cross-region Disaster Recovery for Frontline in dedicated mode is now generally available. This Windows 365 add-on feature creates “snapshots” of Cloud PCs in customer-defined, geographically distant locations. In the event of a regional outage, these snapshots can be recovered as Cloud PCs running in the selected backup location, helping keep your users productive even if their primary region goes down.
Cross-region Disaster Recovery was first introduced for Windows 365 Enterprise, and now Windows 365 Frontline users with dedicated Cloud PCs have the same rapid failover option. This capability is especially relevant for industries and organizations that are highly regulated or have workflows requiring geographic separation between primary and backup Cloud PC locations.
Configuration and use
Unlike many traditional disaster recovery solutions, Windows 365 Cross-region Disaster Recovery was designed to be configured and used with minimal—or even no—prior disaster recovery experience. Configuration can be completed in a few minutes. In the event of an outage, recovery may be activated with just a few clicks and typically in less than five minutes.
In addition to configuration and activation, Windows 365 Cross-region Disaster Recovery has been integrated into various reports and flows. Reports alert administrators if an outage has taken place and provide full context of the configuration and status of each Cloud PC using Windows 365 Cross-region Disaster Recovery. After the outage is resolved, administrators are notified and can deactivate Cross-region Disaster Recovery in minutes.
How do I get the Windows 365 Cross-region Disaster Recovery add-on?
* Windows 365 Cross-region Disaster Recovery is provided as an add-on license to Windows 365 Enterprise and Windows 365 Frontline. It is not currently available for any other Windows 365 offering.
* Windows 365 Cross-region Disaster Recovery can be applied to the Enterprise Cloud PCs and Frontline Dedicated Cloud PCs that the user is licensed to use. Please contact sales for details.
FAQ
Q: Are the geographies and regions available for Windows 365 Cross-region Disaster Recovery limited?
A: In general no, because any geography or region where Windows 365 is available may be used as a backup region, and any of those areas can be selected by the administrator. Administrators should carefully consider the location of Cloud PC users, as well as data sovereignty, when selecting backup regions.
Q: If a user has multiple Cloud PCs, can each device have a different Windows 365 Cross-region Disaster Recovery configuration?
A: No. At this time, all Cloud PCs associated with a user will have the same Windows 365 Cross-region Disaster Recovery configuration.
Q: What is the restore time objective (RTO) and restore point objective (RPO) for Windows 365 Cross-region Disaster Recovery?
A: RPO is defined by the cadence of point-in-time restore snapshots. The RTO is targeting four hours as a performance goal for Cloud PC tenants with up to 50,000 Cloud PCs. The performance of Cross-region Disaster Recovery is anticipated to increase as actual deployment sizes increase to maintain an RTO of four hours.
Q: Can one Cross-region Disaster Recovery for Windows 365 Frontline license be used by multiple users?
A: No, The Cross-region Disaster Recovery add-on is licensed on a per-user basis and is only for the individual to whom it is assigned. Each user who intends to use Windows 365 Cross-region Disaster Recovery must have their own eligible license.
Next Steps
Learn more about:
* Windows 365 Cross-region Disaster Recovery
* Point-in-time restore for Windows 365 Enterprise
* Windows 365 and Azure network connections
* Azure regions and zones
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 27
Windows 365 is now supported in Korea Central
We are pleased to announce that we have enabled Windows 365 in Korea Central.
Customers can now create Cloud PCs with data stored in the Korea Central region. This helps meet performance and data residency needs for organizations operating in Korea.
Korea Central can now be selected within provisioning policies when you select the South Korea geography:
With this update, organizations have even more flexibility in choosing where to deploy their Cloud PCs. Locating Cloud PCs closer to users helps improve responsiveness and supports regional compliance requirements.
We’re continuing to expand Windows 365 into additional Azure regions to meet the evolving needs of global customers. Our goal is to make Cloud PCs available wherever your workforce is, helping you deliver a seamless and secure experience.
Learn more about Windows 365 supported regions.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 26
Windows Backup for Organizations is now available
We’re excited to announce the general availability of Windows Backup for Organizations! This new feature allows your organization to seamlessly back up Windows 10 or Windows 11 settings and effortlessly restore them on a Microsoft Entra joined device. As of today, you can also enable backup of the list of installed Microsoft Store apps, with the ability to restore them to the user’s Start menu as well.
Read on to explore the latest capabilities and learn how to get started with Windows Backup for Organizations.
Key benefits of Windows Backup for Organizations
As announced at Microsoft Ignite in November 2024, Windows Backup for Organizations provides a simple and secure way to save user settings and Microsoft Store apps. This ensures you can quickly restore a familiar experience on a new device, or after a device reset or reimage, getting users back to work faster with the following benefits:
* Reduced troubleshooting: Confidently reset devices sooner. Users can quickly recover their settings and restore their list of Microsoft Store apps with minimal effort.
* Seamless user experience: Smoothly transition devices from Windows 10 to Windows 11 using a saved backup.
* Enhanced productivity: Minimize downtime and maximize user productivity. Restore users’ preferences, helping them get back to work faster.
Back up and restore user settings and Microsoft Store apps
To use the backup functionality, ensure:
* Devices are Microsoft Entra joined or Microsoft Entra hybrid joined.
* Devices are running a supported version of Windows 10, version 22H2 or Windows 11, version 22H2 or later.
* Devices have the August 2025 Windows security update or newer. This update includes the Windows Backup app for backing up Windows settings and the list of Microsoft Store apps.
* The backup policy is enabled via mobile device management (MDM) or Group Policy. Learn more about these settings in our official documentation.
To restore settings and Microsoft Store apps to the Start menu, ensure:
* Devices are Microsoft Entra joined.
* Devices are running Windows 11, version 22H2 or later.
* Devices are preprovisioned with at least the August 2025 Windows security update prior to users going through out-of-box experience (OOBE). Otherwise, they should have the following base OS versions when going through OOBE: Windows 11, version 22H2 build 22621.3958 or newer; Windows 11, version 23H2 build 22631.3958 or newer; or Windows 11, version 24H2 build 26100.1301 or newer.
Important: If your device is on a build older than the specified versions, make sure to enable the “Install Windows quality updates” policy setting on the Enrollment Status Page in Intune. This will deliver the latest applicable quality updates at the end of OOBE to ensure a smooth restore experience. To learn more, visit Get ready for Windows quality updates out of the box.
* You have either Microsoft Intune service administrator or Global administrator permissions.
* You have configured the Windows Backup and Restore option to “On” for the entire tenant. You can do this from the Microsoft Intune admin center > Devices > Enrollment > Windows > Enrollment options.
* Users log in using the same Microsoft Entra account used for the backup.
Getting started
Windows Backup for Organizations is an opt-in feature that is disabled by default.
You, as an IT admin, must configure Backup and Restore policies. (Note: The Restore setting is rolling out gradually, so check back in about a week if you don’t see it in your Intune tenant.) Once enabled, backups run automatically every eight days, saving user settings and preferences to the organization’s tenant data store.
Users can also manually trigger a backup by opening the Windows Backup app and selecting Back up. Enabling the EnableWindowsBackup policy is required to make the Windows Backup app available. Learn more in our official documentation.
Screenshot of the Windows Backup app, showing the option to back up preferences on a device.
The restore process is available during OOBE when a user signs in with their Microsoft Entra ID. Here’s what it looks like:
* The restore policy is enabled by IT.
* The user powers on a new or reimaged device.
* The user signs in with the same Microsoft Entra ID used during backup.
* The user then sees the options to restore a previous backup or set up the device as new.The OOBE screen shows the user their latestbackupandofferstorestore their oldPC.
* If the user selects More options, they’ll see any additional backups from other devices available to them (if applicable).The OOBE screen asks the user to choose the PC from which they want to restore their preferences.
* The user selects from the list of available devices and selects Continue.The OOBE screen shows the “Restore” in progress for the selected device.
The remaining OOBE process is the same as the standard OOBE process. After OOBE is completed, the user profile is loaded, and user preferences are restored automatically.
Visit our official documentation for details on how to configure policies, what the experience looks like for users, and a list of frequently asked questions. That’s where you’ll also find a comprehensive list of settings and Microsoft Store apps that are backed up and restored.
Get ready for Windows 10 end of support – October 14, 2025
Now’s the time to prepare! Try out Windows Backup for Organizations to boost your resilience and simplify your move to Windows 11.
With Windows 10 support ending on October 14, 2025, ease your transition to Windows 11. For large-scale upgrades and device continuity, Windows Backup for Organizations helps reduce migration overhead, minimize user disruption, and strengthen device resilience against incidents.
Note: While Windows Backup for Organizations can easily help you move to Windows 11 with your settings and Microsoft Store apps already in place, there are circumstances that could prevent you from replacing Windows 10 devices before the end of support. If needed, consider the options outlined in Plan for Windows 10 EOS with Windows 11, Windows 365, and ESU. To learn more about Extended Security Updates (ESU), please visit When to use Windows 10 Extended Security Updates.
This is just the beginning. We’re continuing to evolve the Windows Backup for Organizations experience. More enhancements are on the way to help your organization stay ready for what’s next.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 26
Reimagining work: Microsoft’s vision for the future of Desktop as a Service
The world of work is undergoing a profound transformation. reshaping how organizations operate, innovate, and compete. In this landscape, Desktop as a Service (DaaS) is emerging as a strategic enabler, not just a technical solution. It’s redefining how businesses empower their people, secure their data, and adapt to constant change.
Microsoft is at the forefront of reimagining DaaS, extending beyond virtual desktops to deliver a platform for business agility, resilience, and human-centric innovation. Our Leader position in the Gartner Magic Quadrant™ for Desktop as a Service for three consecutive years, we believe, reflects our commitment to driving this evolution.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available at aka.ms/DaasMQ2025.
Our vision goes even further with the unique combination of DaaS and AI leadership. With innovations like Microsoft Copilot, Security Copilot, and agentic experiences powered by custom silicon and NPUs, customers benefit from intelligent automation, personalized support, and continuous improvement. The vision is realized through a holistic platform—one that empowers people, simplifies IT, and adapts to the unique needs of businesses across industries, enabling them to unlock new models of work, drive efficiency, and support their teams anytime, anywhere.
The following five pillars illustrate how Microsoft is building the next generation of digital workspaces, setting new standards for what’s possible in the modern enterprise.
Building the next generation of digital workspaces
1. Empowering the modern workforce: Microsoft’s deep enterprise footprint means we understand the complexities of today’s organizations. Windows 365 and Azure Virtual Desktop are designed to meet the needs of every worker, from frontline staff to global teams, enabling secure access to resources anywhere, anytime.
2. Building an integrated ecosystem: True transformation happens when technologies work seamlessly together. By integrating Windows 365 and Azure Virtual Desktop with Microsoft 365, Intune, Defender, and other core services, we simplify management, enhance security, and create a unified experience that supports productivity and compliance at scale.
3. Scaling with global reach and trust: With data centers worldwide, Microsoft offers unmatched geographic coverage and compliance capabilities. Our customers can confidently navigate regulatory requirements and deliver consistent experiences to users in every region.
4. Enabling flexibility and choice: No two organizations are alike. That’s why we offer flexible licensing and deployment models—fully managed with Windows 365 or customizable with Azure Virtual Desktop—so customers can choose the approach that best fits their strategy and growth plans.
5. Innovating for the future: We’re investing in AI-driven management, performance optimization, and user experience enhancements. Our roadmap is clear: empower organizations to harness the full potential of cloud desktops, drive continuous improvement, and anticipate the needs of tomorrow’s workforce.
The strategic impact of DaaS
DaaS is about enabling new business models, supporting sustainability goals, unlocking talent across borders, and delivering seamless productivity for every organization. With Windows 365 and Azure Virtual Desktop, organizations can more easily embrace digital transformation rethink processes, reduce costs, build resilient operations, and empower their teams to work securely and efficiently – anytime, anywhere.
For complimentary access to the Gartner, Magic Quadrant for Desktop as a Service report, please click here.
Note: Gartner, Magic Quadrant for Desktop as a Service, By Stuart Downes, Sunil Kumar, Todd Larivee, 11 August 2025. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 25
Get ready for Windows quality updates out of the box
Get the latest Windows quality updates during the out-of-box experience (OOBE) by default. This much awaited improvement is coming to your eligible Microsoft Entra joined or Microsoft Entra hybrid joined devices running Windows 11, version 22H2 and later. It will be available starting with the September 2025 Windows security update.
You can manage this new capability with a policy setting. With Windows Autopilot and Microsoft Intune (or alternative management solutions), you can maintain seamless control over quality update behavior during provisioning, while ensuring alignment with organizational security and compliance requirements.
Manage your OOBE update experience in Microsoft Intune
When Windows quality update support is available in the Windows Autopilot Enrollment Status Page (ESP) at the end of August 2025, you’ll see the new quality update setting enabled by default.
You’ll be able to control whether updates are installed during OOBE if you meet these criteria:
* Your devices are on Windows 11, version 22H2 or later and on any of the following SKUs: Pro, Enterprise, Education, or SE.
* You use Microsoft Intune to manage Windows quality updates.
* You’ve assigned a Windows Autopilot Enrollment Status Page (ESP) profile to devices using either Windows Autopilot preregistered device group or using the “All devices” assignment.
* Your devices have one of the following required updates that include the new setting:
o Devices that get the August 2025 OOBE zero-day patch (ZDP) update will have this capability.
o Devices imaged with the June 2025 Windows non-security update or later already include the new setting.
Note: At this time, if you’re not using device ESP, you won’t be able to turn off Windows updates during OOBE. This might be the case if you enroll devices using Windows Autopilot device preparation policies. These devices will have updates applied by default.
The new setting
The new setting is available to you to confirm or control this experience:
* Go to the Microsoft Intune admin center.
* Navigate to Devices > Enrollment > Enrollment Status Page.
* Select the ESP profile you wish to check or create a new one and go to its Settings tab.
* Locate the new setting called Install Windows quality updates (might restart the device). If its value is set to “Yes,” you’re set to install quality updates during provisioning!
Note: Preexisting ESP profiles will have Install Windows quality updates set to “No.” You can edit this setting to enable the updates. New ESP profiles will default to “Yes.”
The Enrollment Status Page (ESP) profile settings in the Microsoft Intune admin center, with a new setting to Install Windows quality updates set to “Yes.”
As we’ve preannounced, the device will check Windows Update at the last page of OOBE and install any applicable quality updates. That way, the user will start out with the latest security and quality updates at first sign in.
The final OOBE screen shows the message for an in-progress Windows update.
Recommendation for pause and deferral settings
Want to ensure that quality updates during OOBE respect pause and deferral settings? Assign your Windows Update rings profile to the same Windows Autopilot preregistered device group as your ESP profile or using the “All devices” assignment.
During the device phase of provisioning, the ESP will ensure that the settings from the Windows Update rings policy are synchronized prior to exiting the page. That way, settings are in place before the final Windows Update page checks for updates. Note: If these requirements aren’t met, the pause and deferral settings might be inconsistently applied during OOBE.
Alternative management solutions for OOBE updates
Some non-Microsoft mobile device management (MDM) solutions are also capable of using the ESP functionality. How can you determine if that’s the case for you? Check if your MDM provider has developed its own ESP functionality using features or protocols offered by Microsoft to reliably deliver certain policies during OOBE. If they have selected the ESP profile as eligible to be applied, designate the ESP profile as a tracked policy when creating it. You must enable ESP to ensure that the latest Windows quality updates indeed get installed during OOBE.
Ready for an improved OOBE?
With this new default experience, you can:
* Complete the devices’ OOBE with the latest approved quality updates already applied.
* Enhance security from day 1.
* Reduce post-deployment update overhead.
Thank you again for your feedback and helping us make Windows better!
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 21
Skilling snack: Get started with AI in Windows
AI has become an essential ingredient in the latest recipes for Windows productivity, accessibility, and management. Welcome to this buffet of options from software to hardware to tools and functions. Start at the top to understand the broader implications of AI on the Windows ecosystem or jump straight to your topic of interest to learn more.
Time to learn: 82 mins
* AMA: Windows and AI experiences (49 mins): Watch on demand how we answer your and your peers’ questions about Windows and AI. We talk about specific AI features, the Windows Roadmap, Copilot+ PC features, security solutions, and much more. Check out the questions and answers in the comments underneath the video for a more comprehensive experience.
* Improved Copilot experiences for commercial organizations (2 mins): Read how Microsoft 365 Copilot Chat and the Microsoft 365 Copilot app have evolved since they launched. Help improve productivity for users in your organization by pinning Microsoft 365 Copilot Chat to the navigation bar and downloading the Copilot Success Kit.
* Untangling this thing called AI in a Windows ecosystem (20 mins): Watch this video to explore the various Copilot offerings available. Did you know you can build your own models in the cloud or locally on the neural processing unit (NPU)? Learn about this as well as Microsoft 365 Copilot and Copilot+ PCs more generally. Discover why data management is the key to AI success and how these powerful tools can enhance productivity, streamline workflows, and safeguard your data. Learn how AI can transform your business, empower your users today, and where we're headed in the future!
* Updated Windows and Microsoft 365 Copilot Chat experience (9 mins): To keep up with the latest, visit this documentation. Learn about using and managing enhanced enterprise data protection (EDP), Microsoft Entra accounts, the Copilot app, the Copilot hardware key, and more.
* Preparing for the AI-fueled future: IT generation.next (22 mins): Just starting your journey in the tech industry? Hear what your peers are discovering about Microsoft Copilot and AI’s role in today’s life and work.
We know there’s a lot to discover about AI! Stay tuned for more “skilling snacks” on various areas of AI and Windows! In the meantime, visit our Windows skilling snacks library for more learning opportunities.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 20
Hotpatch readiness: Enable VBS at scale
If you're looking to bring hotpatch to your environment, there’s one key requirement to start with: virtualization-based security (VBS) must be enabled on your devices. The good news? Enabling VBS is straightforward, and we’ll show you how, whether you're testing on a single device or deploying at scale with Microsoft Intune.
With the hotpatching feature of Windows Autopatch, you can apply security updates to Windows without requiring a restart. This helps minimize downtime and prevents the interruption of user experiences. Hotpatching is no longer just an emerging solution; it’s becoming a trusted part of the update strategy for organizations of all sizes. Across industries, IT teams are embracing the ability to improve patch compliance and reduce risk without the operational disruption of traditional update cycles.
Why VBS is critical for hotpatching
VBS uses hardware virtualization to isolate a secure region of memory, protecting against kernel-level exploits and other advanced threats. It’s a foundational requirement for enabling hotpatching on Windows client, and it helps ensure your endpoints are secure and ready for patching.
Enable VBS
Before you enroll devices in hotpatch updates, check that devices meet the hardware requirements for VBS (e.g., virtualization support, Trusted Platform Module 2.0).
Watch our video and read further on how you can enable, validate, and monitor VBS at scale or manually. Check out why we recommend using Microsoft Intune. Then learn how you could use PowerShell and Windows Command Prompt instead of Intune.
Let’s walk through the video steps.
Time saver: Enabling VBS at scale with Microsoft Intune
For production environments, Microsoft Intune provides a scalable and policy-driven approach to enable VBS across your device fleet. Windows Autopatch is built on top of Intune, so using your current management experience will save you time and effort. Just follow this step-by-step guide to configuring policies in the Intune admin center.
* Go to Devices > Manage Devices > Configuration.
* Under the Policies tab, create a new profile by selecting Create > New policy.
* In the Create a profile flyout, select Windows 10 and later.
* For profile type, select Settings catalog.
* On the next screen, name your profile under Basics.
* Navigate to the Configuration settings tab and select Add settings.
* In the Settings picker flyout, start typing “Virtualization Based Technology” and select it from the search results.
* Locate and select the Hypervisor Enforced Code Integrity setting name among the results to enable memory integrity.
Configuration tab in the Intune admin center with the Settings picker flyout
* Complete the wizard by setting scope, assignments, and reviewing your configuration.
Note: You can also use the HypervisorEnforcedCodeIntegrity node in the VirtualizationBasedTechnology configuration service provider (CSP) to enable VBS. We don’t recommend using Group Policy Objects (GPOs) for enabling VBS with Intune environments because the relevant GPOs are deprecated. Consider importing your GPOs into Intune instead.
Enabling VBS manually on a single device
If you're validating configurations or running a pilot, you can enable VBS manually using either PowerShell or Windows Command Prompt.
PowerShell method
Use the following PowerShell script to enable VBS:
$registryPath = "HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard"
$parameters = @{
Path = $registryPath
Name = "EnableVirtualizationBasedSecurity"
Value = "0x1"
Force = $True
PropertyType = "DWORD"
}
New-ItemProperty @parameters
Windows Command Prompt method
Alternatively, enable VBS using this command in an elevated command prompt:
Reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "EnableVirtualizationBasedSecurity" /t REG_DWORD /d 1 /f
Validate and monitor VBS enablement
Restart your devices to ensure that VBS turns on. Once enabled, it will take some time for the policy to be deployed to the target devices in scope. Check the VBS status and monitor it for any issues in one of the following ways.
In the Intune admin center
From the Microsoft Intune admin center, go to Devices > Managed devices > Configuration. Select the CSP policy you’ve created and review the results, as illustrated below. See device configuration policies with Microsoft Intune.
VBS configuration policy status in the Intune admin center
In PowerShell
In PowerShell, change the value of VirtualizationBasedSecurityStatus from 0 to whatever value you’ve selected for VBS. See Enable memory integrity for detailed instructions.
VBS status shown in PowerShell
In Windows Settings
If applied through CSP, check VBS enablement on each device manually in Windows Settings. Navigate to Accounts > Access work or school and select the accounts managed by your organization. Under Areas managed, review listed policies. If you see VirtualizationBasedTechnology, VBS is enabled on the device.
VBS status shown in Windows Settings
Finally, use Intune reporting to monitor compliance and troubleshoot any deployment issues. For help, visit Monitor device configuration policies in Microsoft Intune.
By enabling VBS, you're not only meeting the prerequisites for hotpatching—you’re also strengthening your organization’s security posture with minimal overhead. Learn how to get started and enroll in hotpatch updates today:
* Hotpatch updates
* Release notes for hotpatch on Windows 11, version 24H2 Enterprise clients
* Hotpatch for client: Frequently asked questions
* Windows Autopatch: Frequently asked questions
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 12
Pull print is now available in Universal Print
We are excited to share that Universal Print anywhere, the feature that brings "pull print" functionality to Universal Print, reached general availability.
We are excited to announce that Universal Print anywhere, a new feature that enables users to print securely from any location and retrieve their documents at any printer—a capability known as "pull print"—has reached general availability. This enhancement empowers users with greater flexibility and privacy, allowing them to release print jobs only when they are physically at the printer of their choice, reducing the risk of sensitive information being left unattended and making the printing experience more convenient and secure.
We want to thank you for participating in our public preview adopting the functionality, your feedback has been invaluable to bring this functionality to market. Universal Print anywhere is ready for production deployments across Microsoft 365 organizations.
What is Universal Print anywhere?
Universal Print anywhere transforms how users interact with corporate printers by enabling them to print from anywhere and securely release their jobs to any printer in the organization. This "pull print" functionality builds on Universal Print's existing secure release capabilities, allowing users to print without having to choose a specific printer in advance.
With Universal Print anywhere, employees can:
* Print from any device to any corporate printer without choosing a destination printer in advance
* Authenticate at any printer to securely release their jobs
* Prevent confidential documents from being left unattended
* Reduce toner and paper waste from uncollected prints
Universal Print anywhere pull-print management blade in the Azure portal
Key benefits for organizations
Enhanced Security and Privacy Universal Print anywhere ensures that confidential documents are never left on printers for unauthorized viewing. Users must authenticate at the printer before their jobs are released, maintaining document security in shared printing environments.
Simplified User Experience Gone are the days of choosing the right printer from a long list. Users simply print, then walk to any available printer in their organization to retrieve their documents. This seamless experience reduces support tickets and improves productivity.
Reduced Waste and Cost Savings By requiring user authentication before printing, organizations can reduce paper and toner waste from forgotten or uncollected print jobs. This leads to measurable cost savings and support for sustainability initiatives.
Cross-Platform Support Universal Print anywhere works seamlessly across Windows and macOS devices, ensuring all employees can take advantage of pull print functionality regardless of their device preference.
How Universal Print anywhere works
The deployment architecture remains straightforward and builds on your existing Universal Print infrastructure:
* Printer Registration: Printers are registered to Universal Print directly or through the Universal Print connector.
* Secure Release Configuration: Administrators configure the secure release option for each printer they want to include in the pull print experience.
* User Authentication: Users print as normal to the pull print printer, then authenticate at any configured member printer to retrieve their jobs.
Administrator control and management
Universal Print anywhere provides administrators with enhanced control over the printing experience:
* Print Option Management: Configure specific print options for Universal Print anywhere printer shares, with end users only seeing administrator-approved options.
* Printer Membership Control: Administrators can configure which printers are members of the pull print printer group, providing flexibility in determining which devices participate in the anywhere printing experience.
Coming Soon: enhanced Partner integration
Universal Print anywhere is designed to work with existing printer infrastructure and partner solutions. In the coming months, we will be extending this feature to enable original equipment manufacturers (OEMs) to integrate their badge release technologies to securely release print jobs at the printer, ensuring compatibility with existing authentication systems and providing even more flexibility for organizations with diverse printer fleets.
Getting started with Universal Print anywhere
Universal Print anywhere is now available to Microsoft 365 organizations worldwide. The feature is included with your existing Universal Print licensing at no additional cost. For more details, please refer to the Universal Print licensing documentation.
Ready to implement Universal Print anywhere in your organization? We recommend referring to the comprehensive Universal Print anywhere documentation for detailed setup instructions and best practices. The documentation provides step-by-step guidance for both organizations already using Universal Print and those new to the service.
Additional Resources:
* Universal Print documentation
* Universal Print Tech Community
* Universal Print integrations
---
Disclaimer:
This blog post is for informational purposes only and outlines Microsoft’s current product direction and plans. Product availability, licensing terms and capabilities may vary by region and are subject to change. All third-party trademarks are the property of their respective owners.
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Aug 11
Enhancing business continuity: Windows 365 Reserve is now in limited public preview!
Following our June 18 disclosure, we are excited to announce that the limited public preview of Windows 365 Reserve is now live —offering secure and on-demand Cloud PC access from anywhere when you need it most.
In today’s always-connected workplace, even a single device failure can ripple across an organization—halting productivity, delaying deliverables, and straining IT teams. Multiply that disruption across thousands of employees, and the impact becomes massive. Exacerbated by cyberattacks, the cost of employee and device downtime is no longer theoretical—it’s a business-critical concern. That’s why we’re introducing Windows 365 Reserve: a modern, secure, and scalable solution that helps employees stay productive and connected when the unexpected strikes.
What is Windows 365 Reserve?
Windows 365 Reserve is a standalone, Windows 365 offering that provides temporary, secure, and dedicated Cloud PC access when a user's primary PC is unavailable, granting users up to 10 days of Cloud PC access per year. With this solution, organizations can proactively establish protections that reduce both financial and operational impacts when disruptions arise. If a user's device unexpectedly fails, administrators can swiftly provide secure, pre-configured Cloud PCs—ensuring employees regain access and productivity from any secondary device while their primary device is repaired or replaced. Through Windows 365 Reserve, organizations can:
* Proactively cover employees for quick response to unexpected device interruptions
* Deploy on-demand Cloud PCs with all necessary corporate applications and settings
* Manage these temporary Cloud PCs alongside other devices within Microsoft Intune
* Enable secure employee access from any secondary device, anywhere via the web or Windows App
Key Benefits of Windows 365 Reserve
* Restore productivity fast
Proactive setup ensures administrators can quickly deploy fully configured Cloud PCs to users when their primary device is unusable—complete with Microsoft 365 apps, Microsoft Intune policies, and secure access from any device. This provides minimal disruption and fast return to productivity.
* Simplified IT management
Manage Windows 365 Reserve Cloud PCs like any other device via Microsoft Intune—centralized policies, automated provisioning, and simple license control. The license provides a user up to 10 days of Cloud PC access per year, with flexibility to use this time consecutively or divide as needed. Windows 365 Reserve simplified management aims to minimize IT workload during outages or incidents while providing control over when Cloud PC time is used.
* Secured by design
Windows 365 Reserve follows Zero Trust principles, applies your organization’s security posture by default, and allows easy access revocation through Microsoft Intune with admin controls —making it a secure fallback option during outages or incidents.
Strengthening business continuity with Windows 365 Reserve
We’ve heard customer concerns about challenges preparing for disruptions from device loss, theft, delays, malfunctions, and an increase in disruptive incidents such as malware and ransomware. With Windows 365 Reserve, organizations have peace of mind knowing that, when disruption occurs, a safety net is in place. It extends the resiliency and security of Windows 365 to information workers using physical Windows PCs or tablets today. Administrators can quickly provide preconfigured Cloud PCs and minimize downtime. This proactive approach to endpoint continuity helps to keep teams productive when unforeseen device issues arise.
Note: while Windows 365 Reserve delivers enhanced availability, it remains subject to scale limitations such as Azure capacity constraints and requires a network connection to connect to use the Windows 365 Reserve Cloud PC.
Windows 365 Reserve – the IT admin experience
Deploying Windows 365 Reserve was designed to be simple and quick, frontloading decision making to ease on-demand Cloud PC provisioning down the road. Once licenses have been purchased for the organization’s tenant, admins create a provisioning policy for their Windows 365 Reserve licenses. The Windows 365 Reserve provisioning policy is a simplified version of the Windows 365 Enterprise and Windows 365 Frontline provisioning policy, and determines:
* Which geography the Cloud PCs will be created in
* Which Microsoft Entra user groups will get reserve coverage
* (Optional) Which major gallery image version, language pack, and scope tags will be applied to the Cloud PC when provisioned
To maximize efficiency, provisioning success, and ability to scale in widespread disruption events, Windows 365 Reserve automatically selects the following on behalf of customers:
* One default Cloud PC size
* The region, based on capacity, within the geography the Cloud PCs will be created in
* Microsoft Hosted Network (MHN); Azure Network Connections (ANC) and custom networks are not supported
* The latest gallery image version that is supported in the region at provisioning time; custom images are not supported
Admins can create Windows 365 Reserve provisioning policies in Intune.
Provisioning policy and user group assignments must be set at least seven days before admins can provision Reserve Cloud PCs. After this period, those Cloud PCs can be provisioned on demand any time while the license is active.
Unlike Windows 365 Enterprise and Windows 365 Frontline, Windows 365 Reserve Cloud PCs are not created automatically when the provisioning policy is created. Instead, administrators can use Intune to quickly deploy Reserve Cloud PCs to users experiencing device issues, with pre-configured apps, settings, and security policies for fast productivity.
Admins can provision Windows 365 Reserve Cloud PCs for select users and groups.
Windows 365 Reserve provides up to 10 days of Reserve Cloud PC access per user per year. Windows 365 Reserve offers administrators timely notifications when a user's Cloud PC access is approaching expiration, ensuring there are no unexpected interruptions. When users return to their primary device, admins can deprovision the Cloud PC from Intune to preserve remaining access time for later, while the license is active.
Admins can deprovision the Windows 365 Reserve Cloud PC, pausing the “days left” counter.
Windows 365 Reserve – the end-user experience
Once deployed, end users can access the temporary Cloud PC from any device – managed devices or unmanaged, personal devices; depending on their organizations’ policies – using the web or Windows App. Users will receive clear instructions and can conveniently view the expiration date of their Windows 365 Reserve Cloud PC.
Clear end-user messaging and expiration date
End users can click to connect securely and be redirected to a full desktop environment with their organization's resources.
Windows 365 Reserve notifies users when their Cloud PC access is approaching expiration. When end users return to their primary device, they can deprovision their temporary Cloud PC from the Windows App to reserve access time for future use.
Pending expiration notice starting at 3 days prior to expiration; end user can “return” their Cloud PC to preserve remaining access time for later, while the license is active.
Note: Windows 365 Reserve is in preview; admin and end-user designs are subject to change. Not all features may be available at launch, and feature set may vary as the product evolves.
Join the gated public preview!
Windows 365 Reserve is currently in gated public preview. While participation is limited, you can complete this form or contact your Microsoft account team to express interest in participating in the preview and receive updates from the Windows 365 Reserve team.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly
ConfigMgrDogs
@configmgrdogs.bsky.social
· Jul 31
Windows news you can use: July 2025
This month, there are several improvements based on feedback we have heard from you, our customers. You’ve told us you want Windows to start and stay up to date with minimal interruptions. I’m happy to share that new Windows media includes updated Microsoft Store apps, and that hotpatch updates are generally available for both Windows x64 and Arm64 devices. We’re also continuing to add more resources to your update management toolbox.
Speaking of staying up to date, we continue to hear confusion about the lift involved with moving to Windows 11 and cloud-native management with Microsoft Intune. If you’re looking for quick, accurate information on recommended scenarios and the steps it takes to get there, check out our new guide on the Windows IT Pro Blog. And speaking of quick, accurate information, the Ask Microsoft Anything (AMA) sessions from this week’s Windows edition of Tech Community Live are now available to watch on demand. Quickly catch up on answers to frequently (or not so frequently) asked questions about Windows Autopilot, update and driver management, Microsoft Connected Cache and Delivery Optimization, and AI experiences.
Now let’s move on to the latest news you can use!
New in Windows update and device management
* [AUTOPATCH] If you’re looking for a proven, step-by-step approach to gradually roll out Windows 11 to eligible Windows 10 devices, explore Windows Autopatch groups. Windows Autopatch groups can make the process faster and easier with phased deployments, readiness insights, and reporting so you can upgrade with confidence.
* [HOTPATCH] Hotpatching is now generally available for Windows 11, version 24H2 Arm64 devices. Learn how to get your Arm64 devices hotpatch ready and start benefiting from faster security compliance and increased productivity.
* [OPTIMIZATION] Microsoft Connected Cache is now generally available for enterprise and education organizations. Save significant bandwidth during Windows 11 upgrades, device provisioning, application installation, and monthly updates.
* [RESILIENCY] Built to help you respond to the unexpected with speed, precision, and security, quick machine recovery is now generally available. When enabled, it automatically detects and fixes widespread issues on Windows 11 devices using the Windows Recovery Environment (WinRE). Learn how to customize the experience with the Intune Settings Catalog UI, and explore the new design that will now appear for end users during unexpected restarts, all a part of Resilience in action for Windows devices.
* [BUILT-IN APPS] If you use media refreshed in or after June 2025 to install Windows 11, version 24H2 or Windows Server 2025, that media now includes up-to-date versions of Windows built-in apps.
* [RESOURCES] Looking for information to help you more easily manage Windows Updates? Explore a guide to the essential documentation, communications, and resources that you need in your organizations’ update management toolbox.
New in Windows security
* [HPA] Enhance Microsoft 365 security by eliminating high-privilege access (HPA). Eliminating HPA helps ensure users and applications have only the necessary access rights. Learn more about how you can enhance your organization’s security posture.
* [COPILOT] Security Copilot in Microsoft Intune and Microsoft Entra are now generally available. Discover how Microsoft Entra and Intune play a critical role in modern security strategies and serve as the foundation for implementing a Zero Trust model.
* [INTUNE] You can use the Microsoft Intune Connector for Active Directory to join computers to an on-premises domain during Windows Autopilot provisioning. After users first sign in to the device, it will be Microsoft Entra hybrid joined.
New in Windows Server
For the latest features and improvements for Windows Server, see the Windows Server 2025 release notes and Windows Server, version 23H2 release notes.
* [HOTPATCH] Hotpatching for Windows Server 2025 is now generally available for on-premises and hybrid environments through Azure Arc. Learn more about hotpatching for on-prem servers, prerequisites to enroll in hotpatching for Azure Arc-connected Windows Server 2025 machines, and subscription details.
New in productivity and collaboration
Here are highlights from the July 2025 security update for Windows 11, version 24H2 and version 23H2:
* [TASKBAR] [24H2] The taskbar now resizes icons to fit more apps when space runs low, keeping everything visible and easy to access.
* [SETTINGS] [24H2] The Settings homepage for managed devices now includes cards tailored for enterprise use.
* [SHARE] [24H2] [23H2] When users share links or web content using the Windows share window, they’ll see a visual preview for that content.
* [ACCESSIBILITY] [24H2] In addition to a redesign, the Accessibility menu in Quick settings features text descriptions for assistive technologies like Narrator and Voice access.
For additional details, please refer to the June 2025 non-security preview update release notes for Windows 11, version 24H2 and version 23H2.
If you want to preview what’s coming in the August 2025 security update release, install the July 2025 optional non-security update for Windows 11, version 24H2, which starts the gradual rollout of:
* [START] [24H2] Apply Start menu pins only once with the Configure Start Pins policy. On first sign-in, users receive the Start menu pins you set as the IT admin. They can then personalize their pinned layouts.
Lifecycle milestones
Check out our lifecycle documentation for the latest updates on Deprecated features in the Windows client and Features removed or no longer developed starting with Windows Server 2025.
* [WINDOWS 11 22H2] Windows 11, version 22H2 (Enterprise and Education editions) no longer receives non-security preview updates. Monthly security updates will continue through October 14, 2025, when version 22H2 officially reaches end of servicing.
* [WINDOWS 11 23H2] Windows 11, version 23H2 (Home and Pro editions) will reach end of servicing on November 11, 2025. Enterprise and Education editions will continue to be serviced through November 10, 2026 per the Modern Lifecycle Policy.
* [JSCRIPT9LEGACY] Beginning with Windows 11, version 24H2, JScript9Legacy—based on JScript9—is enabled by default to handle scripting processes and operations. It provides improved security and performance features, and it’s more compatible with modern web standards. Learn more from these FAQs.
* [EOS] Windows 10 end of support (EOS) is now three months away. Find resources to help you get ready, check if current devices are eligible for the upgrade, and learn more about the Extended Security Update (ESU) program. For extra insights, watch the Technical Takeoff session on myths and misconceptions around Windows 10 EOS.
* [WIN10 EOS] [IOT] One size does not fit all when it comes to Windows 10 EOS for Windows 10 IoT Enterprise. Find out which versions of Windows 10 IoT Enterprise are impacted on October 14, 2025.
Additional resources
Looking for the latest news and previews for Windows, Copilot, Copilot+ PCs, the Windows and Windows Server Insider Programs, and more? Check out these resources:
* Windows Roadmap for new Copilot+ PCs and Windows features – filter by platform, version, status, and channel or search by feature name
* Microsoft 365 Copilot release notes for latest features and improvements
* Windows Insider Blog for what’s available in the Canary, Dev, Beta, or Release Preview Channels
* Windows Server Insider for feature preview opportunities
Thanks for reading! We’ll be back next month with even more news you can use.
If I can make this monthly summary more helpful to you, please leave a comment below. Our goal is to make it easier to plan for and manage Windows in your organization.
---
Continue the conversation. Find best practices. Bookmark the Windows Tech Community, then follow us @MSWindowsITPro on X and on LinkedIn. Looking for support? Visit Windows on Microsoft Q\&A.
bit.ly