ANAVEM
Reference
Languagefr
How to Configure Windows Security Updates During OOBE with Intune ESP

How to Configure Windows Security Updates During OOBE with Intune ESP

Configure Intune Enrollment Status Page to automatically install Windows security updates during OOBE for Autopilot devices, improving security posture from first boot.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
3/16/2026 18 min 0
hardintune 8 steps 18 min

Why Configure Security Updates During Windows OOBE?

The traditional Windows out-of-box experience leaves devices vulnerable during initial setup, as security updates typically install after users reach the desktop. Microsoft introduced a game-changing feature in January 2026 that allows Intune administrators to automatically install Windows quality updates during OOBE through the Enrollment Status Page, significantly reducing the security exposure window for new devices.

What Makes This Feature Critical for Enterprise Security?

This capability addresses a fundamental security gap in enterprise device deployment. Previously, devices provisioned through Windows Autopilot would complete OOBE and reach the desktop before installing critical security patches, potentially exposing them to threats during the initial hours or days of use. With ESP-controlled security updates, devices receive the latest monthly security updates before users gain access, ensuring a hardened security posture from first boot.

How Does ESP Security Update Integration Work?

The feature integrates seamlessly with existing Windows Autopilot and Intune workflows. When enabled in an ESP profile, the system performs a Windows Update scan after completing device and app provisioning but before presenting the desktop to users. The process respects Windows Update for Business policies, including deferral periods and maintenance windows, while providing real-time progress feedback during installation. This tutorial walks you through the complete configuration process, from verifying prerequisites to monitoring deployment success across your organization.

Implementation Guide

Full Procedure

01

Verify Windows 11 Version and Update Requirements

Before configuring ESP security updates, confirm your devices meet the minimum requirements. This feature only works on Windows 11 version 22H2 or later and requires specific knowledge base updates.

Check the Windows version on a test device:

Get-ComputerInfo | Select-Object WindowsProductName, WindowsVersion, WindowsBuildLabEx

Look for Windows 11 with build numbers:

  • 24H2: Build 26100 or higher
  • 23H2: Build 22631 or higher
  • 22H2: Build 22621 or higher

Verify the required KB updates are installed:

Get-HotFix | Where-Object {$_.HotFixID -eq "KB5060829" -or $_.HotFixID -eq "KB5060826"}
Pro tip: If the KB updates aren't installed, they'll be automatically delivered via zero-day package (ZDP) during OOBE when the feature is enabled.

Verification: The PowerShell commands should return Windows 11 with appropriate build numbers and show the KB updates if already installed.

02

Access Intune Admin Center and Navigate to ESP Settings

Sign into the Microsoft Intune admin center to configure your Enrollment Status Page profiles. This is where you'll enable the security update installation during OOBE.

Open your browser and navigate to:

https://endpoint.microsoft.com

Sign in with your Intune administrator credentials, then navigate to the ESP configuration:

  1. Click Devices in the left navigation pane
  2. Select Enrollment from the submenu
  3. Click Enrollment Status Page

You'll see a list of existing ESP profiles. Note that existing profiles created before January 2026 will have the security updates setting defaulted to No.

Warning: Existing ESP profiles do not automatically enable security updates. You must manually configure each profile to install updates during OOBE.

Verification: You should see the Enrollment Status Page blade with your existing profiles listed, showing their current assignment status.

03

Create or Select an ESP Profile for Device Targeting

The security updates feature only works with device-targeted ESP profiles, not user-targeted ones. Create a new profile or modify an existing device-targeted profile.

To create a new ESP profile:

  1. Click + Create profile
  2. Enter a descriptive name like "Autopilot ESP with Security Updates"
  3. Add a description: "ESP profile for Autopilot devices with OOBE security updates enabled"
  4. Click Next

For existing profiles, select the profile you want to modify and click Properties.

Ensure the profile uses device targeting by checking the Assignments tab. The profile should be assigned to:

  • Device groups (not user groups)
  • All devices (if using a broad deployment)
  • Specific Autopilot device groups
Pro tip: Create separate ESP profiles for different device types or departments to maintain granular control over update policies.

Verification: The profile should show device-based assignments in the Assignments section, not user-based assignments.

04

Configure Security Updates Setting in ESP Profile

Now configure the core setting that enables Windows security updates during OOBE. This setting appears in the Settings tab of your ESP profile.

Navigate to the Settings tab of your ESP profile and locate the security updates configuration:

  1. Scroll down to find Install Windows quality updates (might restart the device)
  2. Set this option to Yes to enable security updates during OOBE
  3. Review the description: "Install the latest monthly security updates at the end of OOBE after ESP completes"

Configure the blocking behavior to ensure proper update installation:

  1. Find Block device use until all apps and profiles are installed
  2. Set this to Yes to prevent early ESP exit
  3. This ensures the device waits for Windows Update for Business policies to sync before proceeding
Warning: If you set "Block device use" to No while security updates are enabled, the device may exit ESP early and install updates anyway, ignoring your No setting.

Verification: The Settings tab should show "Install Windows quality updates" set to Yes and "Block device use" also set to Yes.

05

Configure Windows Update for Business Policies

Before ESP can properly handle security updates, ensure your Windows Update for Business (WUfB) policies are configured and assigned to the same devices as your ESP profile.

Navigate to Windows Update policies:

  1. Go to Devices > Update rings for Windows 10 and later
  2. Select an existing update ring or create a new one
  3. Configure quality update settings:
{
  "qualityUpdatesDeferralPeriodInDays": 0,
  "featureUpdatesDeferralPeriodInDays": 30,
  "qualityUpdatesWillBeRolledBack": false,
  "featureUpdatesWillBeRolledBack": false
}

Key settings for OOBE security updates:

  • Quality updates deferral: Set to 0 days for immediate installation during OOBE
  • Quality update deadline: Configure based on your security requirements
  • Automatic update behavior: Set to "Auto install and restart at maintenance time"

Assign the update ring to the same device groups as your ESP profile to ensure policy synchronization.

Pro tip: Create a dedicated update ring for Autopilot devices with minimal deferrals to ensure they get security updates quickly during OOBE.

Verification: Check that your update ring is assigned to the same device groups as your ESP profile in the Assignments section.

06

Assign ESP Profile to Autopilot Device Groups

Assign your configured ESP profile to the appropriate device groups to ensure it applies during Autopilot deployment. The assignment must target devices, not users.

In your ESP profile, navigate to the Assignments tab:

  1. Click + Add group
  2. Select Include for assignment type
  3. Choose your target groups:
Recommended group types:
- All devices (broad deployment)
- Autopilot device groups
- Department-specific device groups
- Hardware model-specific groups

Configure assignment filters if needed:

  1. Click Edit filter if you want to use assignment filters
  2. Create rules based on device properties like:
(device.deviceModel -eq "Surface Laptop 5") or 
(device.enrollmentProfileName -eq "Corporate Autopilot")

Save the assignment configuration and wait for policy propagation (typically 5-15 minutes).

Warning: Do not assign ESP profiles to user groups when using the security updates feature. It only works with device-targeted assignments.

Verification: The Assignments tab should show your device groups listed under "Included groups" with no user groups present.

07

Test OOBE Security Updates on Autopilot Device

Deploy a test device through Autopilot to verify the security updates installation works correctly during OOBE. This validates your entire configuration.

Prepare a test device:

  1. Reset a Windows 11 device to factory settings
  2. Ensure it's registered in Autopilot and assigned to your ESP profile group
  3. Boot the device and proceed through OOBE

Monitor the ESP progress during deployment:

Expected ESP phases:
1. Device preparation
2. Device setup (apps and profiles installation)
3. Account setup (if user-targeted apps exist)
4. Windows Update scan and installation (new phase)

During the Windows Update phase, you'll see:

  • "Installing Windows quality updates" progress indicator
  • Percentage completion for update downloads and installation
  • Automatic restart if required by updates
  • Continuation of ESP after restart

Access ESP diagnostics if issues occur:

  1. Press Ctrl + Shift + D during ESP
  2. Click Collect logs to gather diagnostic information
  3. Review the logs for update-related errors
Pro tip: The entire ESP process including security updates can take 30-40 minutes to 3-4 hours depending on your app deployments and update size.

Verification: The device should complete ESP, install security updates, restart if needed, and present the user with a fully updated Windows 11 desktop.

08

Monitor and Troubleshoot ESP Security Updates

Set up monitoring and troubleshooting procedures to ensure the security updates feature works reliably across your Autopilot deployments.

Monitor ESP completion in Intune:

  1. Go to Devices > Monitor > Enrollment Status Page
  2. Review completion rates and failure reasons
  3. Filter by date range to track recent deployments

Common troubleshooting scenarios and solutions:

Issue: Updates not installing despite Yes setting
Solution: Check device targeting and WUfB policy assignment

Issue: ESP stuck at update phase
Solution: Verify internet connectivity and Windows Update service status

Issue: Device exits ESP before updates
Solution: Ensure "Block device use" is set to Yes

Use PowerShell to check update status on deployed devices:

# Check Windows Update service status
Get-Service -Name wuauserv | Select-Object Name, Status, StartType

# Review recent update installation history
Get-WinEvent -FilterHashtable @{LogName='System'; ID=19,20,21,22} -MaxEvents 10

# Check current update compliance
Get-ComputerInfo | Select-Object WindowsVersion, TotalPhysicalMemory

Review ESP logs for detailed troubleshooting:

  1. Navigate to C:\Windows\Logs\ESPLogs on the device
  2. Open Microsoft-Windows-Provisioning-Diagnostics-Provider%4Admin.evtx
  3. Filter for Event IDs related to Windows Update (typically 30000-30999 range)
Pro tip: Create a custom device compliance policy to report on security update installation status post-OOBE for ongoing monitoring.

Verification: ESP monitoring should show successful completions with security updates installed, and deployed devices should report current security update levels in compliance reports.

Frequently Asked Questions

Does the ESP security updates feature work with Windows 10 devices?+
No, the ESP security updates feature only works with Windows 11 version 22H2 or later (including 23H2 and 24H2). Windows 10 devices and Windows Autopilot device preparation scenarios do not support this feature. Organizations using Windows 10 must rely on traditional post-OOBE update mechanisms through Windows Update for Business policies.
What happens if I set ESP security updates to No but Block device use is also set to No?+
This creates a problematic scenario where the device may exit ESP early before Windows Update for Business policies sync, causing security updates to install anyway despite your No setting. Always set Block device use to Yes when you want to prevent security updates during OOBE, ensuring the device waits for proper policy synchronization.
How long does the ESP security updates process typically take during OOBE?+
The complete ESP process including security updates can range from 30-40 minutes to 3-4 hours, depending on factors like the number of apps being deployed, the size of available security updates, internet connection speed, and device hardware specifications. The Windows Update phase specifically adds 10-30 minutes to the standard ESP timeline.
Can I use user-targeted ESP profiles with the security updates feature?+
No, the ESP security updates feature only works with device-targeted ESP profiles. User-targeted profiles cannot trigger security updates during OOBE. You must assign your ESP profiles to device groups or use All Devices assignment for the feature to function properly during Autopilot deployment.
What KB updates are required for ESP security updates to work?+
The feature requires KB5060829 for Windows 11 24H2 devices and KB5060826 for Windows 11 23H2/22H2 devices. These updates were included in the January 2026 Windows quality update rollout. If the required KB updates are missing, they will be automatically delivered via zero-day package (ZDP) during OOBE when the feature is enabled.
Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...