Co-Managed Environments

Applies to: Patch My PC Publisher

Overview

This information on this page outlines supported co-management scenarios when using ConfigMgr and Microsoft Intune together, with a specific focus on how Windows and third-party updates are delivered. It is intended for customers adopting a phased transition from ConfigMgr to cloud management.

Scenario 1: Windows Updates and Third Party Updates from ConfigMgr

In this scenario, devices are co-managed but all update workloads remain with ConfigMgr. Both first-party (Microsoft Windows) updates and third-party updates published by the Publisher are delivered through ConfigMgr.

This approach is commonly used as an initial transition step. Customers typically move only the Client Appsarrow-up-right workload to Intune. This enables installation of Win32 applications from Intune while preserving the existing update model in ConfigMgr.

The key characteristics of this scenario are as follows:

  • ConfigMgr continues to manage Windows updates.

  • ConfigMgr continues to manage third-party updates.

  • Intune is used to deploy Win32 applications.

This scenario requires minimal change and allows customers to validate Win32 app deployment from Intune without affecting update behavior.

circle-info

Note

When the same applications or updates are deployed from both platforms simultaneously, reporting discrepancies may be observed temporarily. Application detection and compliance evaluation occur on different schedules across ConfigMgr and Intune. Over time, reports should converge as detection cycles complete.

Scenario 2: First-Party Updates from Windows Update and Third-Party Updates from ConfigMgr

In this scenario, customers move Windows update management to Intune while continuing to deliver third-party updates from ConfigMgr.

This is typically achieved using Windows Update client policies or Autopatch. ConfigMgr remains responsible for third party updates published by the Publisher.

ConfigMgr Configuration

The following conditions must be met for this scenario to function correctly.

circle-info

Note

If you are using Autopatch, additional workloads must also be moved to Intune or Pilot, including Device Configuration and Office Click to Run Apps. This is a Microsoft Autopatch service requirement and not a requirement of the Patch My PC Publisher. These workload moves are not necessary when managing update policy from Intune using Windows Update client settings without Autopatch.

For more information on other Autopatch requirements, see https://learn.microsoft.com/en-us/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites#configuration-manager-co-management-requirementsarrow-up-right.

Scan Source Configuration

Scan source determines whether the client scans Windows Update or WSUS for specific update categories.

circle-exclamation

Scan source can be configured using Group Policy or Local Policy.

  1. Open the Group Policy Management Console and edit an existing Group Policy Object or create a new one that targets the required devices.

  2. Navigate to the following policy path: Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update > Manage updates offered from Windows Server Update Service > Specify source service for specific classes of Windows Updates.

Specify source service for specific classes of Windows Updates
  1. Set the policy to Enabled and under Options, set all scan source classes to Windows Update.

Set Source to Windows Update
  1. Click Apply to save the policy.

As a result of this policy being applied, the following registry values should exist:

With this configuration in place, first-party Windows updates are scanned and retrieved from the Windows Update service. Third-party updates continue to be scanned and enforced through ConfigMgr.

Content Availability

When third-party updates are delivered from ConfigMgr, devices must have line of sight to a Management Point and Distribution Point to scan for and download update content. This requirement applies even when devices are co-managed and Win32 applications are deployed from Intune.

If devices are frequently off the corporate network and not connected through a VPN, consider deploying or leveraging a Cloud Management Gateway (CMG). A CMG allows internet based devices to continue receiving third-party update content from ConfigMgr without requiring an on premises network connection.

Compliance Reporting

Native ConfigMgr software update compliance reporting, including built in SSRS reports, only displays compliance data for updates that are managed and deployed by ConfigMgr. Updates and applications that are managed exclusively by Intune are not included in ConfigMgr reporting.

Similarly, Advanced Insights Software Update Compliance reporting only displays compliance data collected from ConfigMgr. Updates and applications that are managed and deployed exclusively from Intune are not included in this report.

As devices transition to Intune managed updates, you should plan to use Advanced Insights for Intune to report on update and application compliance for those devices. This ensures accurate visibility across both ConfigMgr managed and Intune managed workloads during and after the transition. For more information on Advanced Insights, see https://patchmypc.com/product/advanced-insights/arrow-up-right.

Final Transition Away from ConfigMgr

As customers continue their cloud adoption journey, the final transition typically involves moving third-party updates to Intune and disabling the Software Update Client Settings in ConfigMgr.

At that stage, ConfigMgr no longer participates in update management. Some customers may also choose to uninstall the ConfigMgr client entirely once all workloads have been migrated.

This final step is optional and depends on operational requirements and long term management strategy.

Last updated

Was this helpful?