# Co-Managed Environments

*Applies to: Patch My PC Publisher*

## Overview

This information on this page outlines supported co-management scenarios when using ConfigMgr and Microsoft Intune together, with a specific focus on how Windows and third-party updates are delivered. It is intended for customers adopting a phased transition from ConfigMgr to cloud management.

## Scenario 1: Windows Updates and Third Party Updates from ConfigMgr

In this scenario, devices are co-managed but all update workloads remain with ConfigMgr. Both first-party (Microsoft Windows) updates and third-party updates published by the Publisher are delivered through ConfigMgr.

This approach is commonly used as an initial transition step. Customers typically move only the [**Client Apps**](https://learn.microsoft.com/en-us/intune/configmgr/comanage/workloads#client-apps) workload to Intune. This enables installation of Win32 applications from Intune while preserving the existing update model in ConfigMgr.

The key characteristics of this scenario are as follows:

* ConfigMgr continues to manage Windows updates.
* ConfigMgr continues to manage third-party updates.
* Intune is used to deploy Win32 applications.

This scenario requires minimal change and allows customers to validate Win32 app deployment from Intune without affecting update behavior.

{% hint style="info" %}
**Note**

When the same applications or updates are deployed from both platforms simultaneously, reporting discrepancies may be observed temporarily. Application detection and compliance evaluation occur on different schedules across ConfigMgr and Intune. Over time, reports should converge as detection cycles complete.
{% endhint %}

## Scenario 2: First-Party Updates from Windows Update and Third-Party Updates from ConfigMgr

In this scenario, customers move Windows update management to Intune while continuing to deliver third-party updates from ConfigMgr.

This is typically achieved using Windows Update client policies or Autopatch. ConfigMgr remains responsible for third party updates published by the Publisher.

### ConfigMgr Configuration

The following conditions must be met for this scenario to function correctly.

* The [Software Update Client Settings](https://docs.patchmypc.com/patch-my-pc-publisher/publisher-requirements/configmgr-requirements/client-settings) in ConfigMgr must remain **enabled**.&#x20;
* The **Windows Update Policies** workload must be moved to Pilot or fully to Intune.

{% hint style="info" %}
**Note**

If you are using Autopatch, additional workloads must also be moved to Intune or Pilot, including Device Configuration and Office Click to Run Apps. This is a Microsoft Autopatch service requirement and not a requirement of the Patch My PC Publisher. These workload moves are not necessary when managing update policy from Intune using Windows Update client settings without Autopatch.

For more information on other Autopatch requirements, see <https://learn.microsoft.com/en-us/windows/deployment/windows-autopatch/prepare/windows-autopatch-prerequisites#configuration-manager-co-management-requirements>.
{% endhint %}

### Scan Source Configuration

Scan source determines whether the client scans Windows Update or WSUS for specific update categories.

{% hint style="warning" %}
**Important**

Microsoft released [client hotfix KB36495448 for Microsoft ConfigMgr versions 2503 and 2509](https://learn.microsoft.com/en-us/intune/configmgr/hotfix/2509/36495448). This hotfix changes how the ConfigMgr client interacts with Windows Update scan source policies.

If this hotfix is installed, the scan source configuration steps below are **not** required when third-party updates should continue to come from WSUS and first-party updates should come from the Windows Update service.&#x20;

If a custom scan source configuration is present, those settings are honored and scan behavior follows the configured policies.
{% endhint %}

Scan source can be configured using Group Policy or Local Policy.

1. Open the Group Policy Management Console and edit an existing Group Policy Object or create a new one that targets the required devices.
2. Navigate to the following policy path:\
   Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update > Manage updates offered from Windows Server Update Service > Specify source service for specific classes of Windows Updates.

<figure><img src="https://3773699522-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MX7dvS0r_4fc0AikgJS%2Fuploads%2F5yItJTxwwxkGu0mgtAq0%2Fimage.png?alt=media&#x26;token=46215a1b-d3c3-4f16-858a-78f9eddb2a74" alt="Specify source service for specific classes of Windows Updates" width="563"><figcaption></figcaption></figure>

3. Set the policy to **Enabled** and under Options, set all scan source classes to **Windows Update**.

<figure><img src="https://3773699522-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MX7dvS0r_4fc0AikgJS%2Fuploads%2Fsu5RBNA6nNWITlGtMjPk%2Fimage.png?alt=media&#x26;token=92aa6e12-ed4b-4da2-8a5c-1a15330491c5" alt="Set Source to Windows Update" width="515"><figcaption></figcaption></figure>

6. Click **Apply** to save the policy.

As a result of this policy being applied, the following registry values should exist:

```
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\UseUpdateClassPolicySource = 1
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\SetPolicyDrivenUpdateSourceForDriverUpdates = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\SetPolicyDrivenUpdateSourceForFeatureUpdates = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\SetPolicyDrivenUpdateSourceForOtherUpdates = 0
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\SetPolicyDrivenUpdateSourceForQualityUpdates = 0
```

With this configuration in place, first-party Windows updates are scanned and retrieved from the Windows Update service. Third-party updates continue to be scanned and enforced through ConfigMgr.

## Content Availability

When third-party updates are delivered from ConfigMgr, devices must have line of sight to a Management Point and Distribution Point to scan for and download update content. This requirement applies even when devices are co-managed and Win32 applications are deployed from Intune.

If devices are frequently off the corporate network and not connected through a VPN, consider deploying or leveraging a Cloud Management Gateway (CMG). A CMG allows internet based devices to continue receiving third-party update content from ConfigMgr without requiring an on premises network connection.

## Compliance Reporting

Native ConfigMgr software update compliance reporting, including built in SSRS reports, only displays compliance data for updates that are managed and deployed by ConfigMgr. Updates and applications that are managed exclusively by Intune are not included in ConfigMgr reporting.

Similarly, Advanced Insights Software Update Compliance reporting only displays compliance data collected from ConfigMgr. Updates and applications that are managed and deployed exclusively from Intune are not included in this report.

As devices transition to Intune managed updates, you should plan to use Advanced Insights for Intune to report on update and application compliance for those devices. This ensures accurate visibility across both ConfigMgr managed and Intune managed workloads during and after the transition. For more information on Advanced Insights, see <https://patchmypc.com/product/advanced-insights/>.

### Final Transition Away from ConfigMgr

As customers continue their cloud adoption journey, the final transition typically involves moving third-party updates to Intune and disabling the Software Update Client Settings in ConfigMgr.

At that stage, ConfigMgr no longer participates in update management. Some customers may also choose to uninstall the ConfigMgr client entirely once all workloads have been migrated.

This final step is optional and depends on operational requirements and long term management strategy.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.patchmypc.com/patch-my-pc-publisher/scenario-based-guidance/co-managed-environments.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
