All pages
Powered by GitBook
1 of 10

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Install Publisher with Intune

This guide will walk you through the process of installing the publisher in an Intune Only environment.

Applies to: On-premises Publisher

Before Getting Started

Here are a few important resources below to get you started.

Free 30-day trial

Before you get started, make sure you take advantage of our !

Free Setup Call with an Engineer

Tip: Did you know you can schedule a free setup call with an engineer if you prefer to have an engineer from Patch My PC perform a guided install with you in your environment?

Video Installation Guide

If you prefer using a video guide, you can watch the video version below.

Continue Guide

Next up, start with the requirements

License Key

How to get your Patch My PC license, properly assigned in the publisher service.

Applies to: On-premises Publisher

Catalog Information - License Key

When the publisher first launches, you will be required to provide a license key. If you have not yet purchased and received your license key, we provide two additional free options for testing our product.

The first option is to enable the This limited trial mode does have some restrictions including a limited number of products as covered in the link above. We encourage you to from our website. When you receive your full-trial or customer license email, it will contain your 20 character license key.

Example license key email
Enter your license information

The full-access 30-day trial contains all features and access to all products.

If the license validation is successful, it should look like the below image.

Licensed product information validation.

If you receive an error when clicking Validate URL, please review our knowledge base article Troubleshooting License Activation Issues. License activation errors are often related to firewall or proxy configurations.

Limited Trial Mode.
request a free thirty-day trial
free trial
https://patchmypc.com/setup-call
Requirements

Download and Install

You've got the requirements, now lets go over where you can download the newest version of the Product, and walk through the installation.

Applies to: On-premises Publisher

Downloading the Newest Version

You can always download the latest MSI installer of the publishing service using the following URL:

https://patchmypc.com/publishingservice-download

This is how the MSI should look once downloaded

Run the Installation

Start the installation by double clicking the downloaded MSI.

Depending on user account control settings, you may need to run an elevated command prompt and launch the MSI from the command prompt.

Welcome Screen

Once the installation starts you'll be greeted by the welcome screen in our installer wizard, click next.

End-User License Agreement

The next step will be to accept the EULA. Make sure you select the "I accept the terms in the Agreement" and hit next.

Enable Intune Standalone Mode

When installing the product we provide an option called Intune Standalone mode. If you do NOT intend to use the product with Configuration Manager, ensure the option is checked and select next.

Select Installation Folder

By default, we install the publisher service in C:\Program Files\Patch My PC\Patch My PC Publishing Service\ This location is where we store all of the products configuration information.

Ready To Install

You are now ready to install the product! Click Install, and grab a drink of water.

Completed

Once the publisher has finished installing, just hit the finish button to close the install wizard.

Note

By default, the Launch Patch My PC Publishing Service checkbox is checked, meaning when you click Finish, Publisher will open automatically.

Select next to continue past the welcome screen.
EULA Terms
Select the folder where the service should be installed
Select install to start the installation.
Enjoy a glass of water, while we do the work.

Requirements

Prerequisites for installing the Publisher with Intune.

Applies to: On-premises Publisher

Before you get started, make sure you take advantage of our free trial!

When installing the Publisher for an Intune-only configuration, ensure you meet the following requirements:

Software:

  • 4.6.2 or above

  • An Internet connection

  • The relevant

  • Appropriate disk space depending on the number of products enabled

Note

See the section of the Knowledge Base article for details on how to install RSAT.

  • Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025

    • When using Windows Server, only the WSUS API component needs to be installed, not full WSUS.

Note

The Publisher displays the following dialog if the WSUS prerequisites are not installed: Windows Server Update Services is not installed.

See the Knowledge Base article for details on how to resolve this.

Hardware:

The Publisher is a lightweight Windows application with a GUI frontend and a Windows service backend. The hardware requirements can be found below.

  • CPU: 2 CPU or more

  • Memory: 8GB of RAM or more

  • Disk Space: 80GB of disk space or more

    • The amount of disk space required will depend on the number of selected products.

Supported Operating Systems

  • Windows 10 or Windows 11

    • When using Windows 10/11, the RSAT: Windows Server Updates Services needs to be installed.

Microsoft .NET Framework
domain names for Patch My PC have been added to your firewall's allowlist
How to fix
Windows Server Update Services is not installed
Windows Server Update Services is not installed

Sync Schedule

Getting started with a Sync Schedule for the patch my pc publisher and understanding product timing.

Applies to: On-premises Publisher

Scheduling Daily Publish

By default, we recommend the Publisher sync runs on a daily basis. The sync schedule only controls when updates or applications are published to your environment. Keep in mind this will also affect assignment scheduling if you use the manage assignments feature.

Tip: Generally, Patch My PC releases an update to the catalog three to five times a week. These updates are released usually posted by 4:00 PM Eastern Time.

When Patch My PC releases these new updates, the sync schedule is what automates the publication process.

You can also manually start the sync and publication process at any time by selecting the Run Publishing Service Sync option.

Intune Application Manager

After the sync, you can view the published products with the This feature will provide you with a live view of all Win32 apps currently in your Intune tenant.

It can help you:

  • Export a list of your Intune Win32 apps to .csv, so you can use our to report on third party patching in Intune

  • Manage live assignments for all of your existing Win32 apps in Intune

  • Multi-select and delete Intune Win32 apps or their assignments

The utility can be found within the Publisher in either the Intune Apps or Intune Updates tab, on the right-hand side as a cloud icon with a magnifying glass:

Below is an example screenshot of what the utility looks like in a tenant with some Win32 apps. This is a live view of all Win32 apps currently in your tenant.

Intune Apps

Enabling and creating Intune Applications in the Patch My PC publishing service.

Applies to: On-premises Publisher

Feature Enablement

To enable products to publish, check the "Enable creation of Win32 applications in Microsoft Intune" checkbox.

Intune App Enablement

Once the option is selected, you'll be able to enable other products. When first getting started with the product, it is recommended that you only choose one or two products to reduce the impact on the first sync and to validate your implementation quickly. We have found that Notepad++ and 7-Zip tend to be great initial use case tests.

Tip: We recommend enabling Manage Conflicting Processes for Notepad++

To find and enable these products, you can search the list of products using Ctrl + F or by clicking on the magnifying glass in the lower right corner.

When you select the search button a dialogue will open, type in one of our example products and hit enter, or click OK.

Once you have found the product you want to patch, click the checkbox for your architecture choice and click Apply.

Tip: You can right-click All Products, Vendors, or individual Products to apply custom installation options as described in the article below.

If you hit OK instead of Apply, don't worry as the Publisher will close after saving the changes. You can just re-open and keep right on working.

Intune Updates

Enabling and creating Intune Updates in the Patch My PC publishing service.

Applies to: On-premises Publisher

Feature Enablement

To enable products to publish, check the "Enable creation of Win32 updates in Microsoft Intune" checkbox.

Enable Intune Updates feature

Once the option is selected, you'll be able to enable other products. When first getting started with the product, it is recommended that you only choose one or two products to reduce the impact on the first sync and to validate your implementation quickly. We have found that Notepad++ and 7-Zip tend to be great initial use case tests.

Tip: We recommend enabling Manage Conflicting Processes for Notepad++

To find and enable these products, you can search the list of products using Ctrl + F or by clicking on the magnifying glass in the lower right corner.

When you select the search button a dialogue will open, type in one of our example products and hit enter, or click OK.

Once you have found product you want to patch, click the checkbox for your architecture choice and click apply.

If you happen to hit OK instead of Apply, don't worry the publisher will close after saving the changes. You can just re-open and keep right on working.

At this time you have completed the basic setup steps and are ready to continue to your first sync!

Advanced

The Advanced tab contains many features related to troubleshooting and completing complicated maintenance tasks for WSUS. Our install guide covers two important components.

Applies to: On-premises Publisher

Local Content Repository

Certain require the content to be downloaded ahead of time into a known folder. This typically is related to specific vendors who's content can only be downloaded after logging in or paying for the software.

The products that need to be downloaded and stored locally are listed below.

Product Name

Download Location

Cisco AnyConnect Suite

Oracle Java Runtime Environment 8

Oracle Java SE Development Kit 8

Mimecast for Outlook

Right Click Tools

Bluebeam Revu

Backup and Restore

All settings within the publisher are backed up. These settings are stored in the backup directory where the Publisher is installed. You can get an immediate backup of the publisher at any time using the options in the Advanced tab. The publisher is closed using the "OK" button, or the "Apply" Button.

products
Intune Application Manager.
Power BI template
Publishing Daily Sync Options
Select the search option
Search for product
Select and Enable a product
Select the search option
Search for a product
Select the products and hit apply

Alerts

Getting notified when there are new updates available to deploy, or when something doesn't quite go as expected.

Applies to: On-premises Publisher

To keep you informed when new applications and updates have been published, we provide three different ways to get notifications in your environment:

Email Report

IMPORTANT Modern authentication is in development for Patch My PC Publisher. At this time, Publisher relies on basic SMTP authentication for sending email reports.

Please refer to this article for more information on how to enable SMTP authentication for a specific mailbox, which will allow Patch My PC Publisher to authenticate and send emails through your Exchange Online environment.

You can configure the Publisher to send email notifications whenever new updates or applications are published. Follow the steps below to set up SMTP correctly.

1. Sender (Required) Enter the email address you want the alerts to come from. e.g. [email protected]

2. Recipients (Required) Enter the email address(es) that should receive the alerts. You can enter multiple addresses separated by a semicolon. e.g. [email protected]; [email protected]

3. CC Recipients (Optional) Add any additional recipients if needed.

4. Server (Required) Enter your mail server address. e.g. yoursmtpserver.yourdomain.com

5. Port (Required) Typically the SMTP server port is 25, 587, or 465 but this can vary depending on the SMTP provider. If you select Use TLS, the Publisher will automatically switch the port to 587 (the standard TLS port), but you can change it if your provider requires a different value.

6. Email Authentication When choosing an authentication method, select the option that aligns with how your mail system accepts SMTP connections. Some environments allow internal relays without credentials, while most cloud providers require authenticated or TLS-secured connections. The right choice depends on whether your SMTP server supports anonymous relay, requires a dedicated username and password, or allows integrated Windows authentication.

  • Anonymous Use this only if your SMTP relay explicitly allows unauthenticated sending. Most cloud providers (including Exchange Online) do not support anonymous SMTP, so this option typically only works with on-premises mail relays configured to accept unauthenticated traffic from trusted internal IPs.

  • Specified User (Recommended) Use this when your SMTP server requires authentication. Enter a valid username and password for the mailbox or SMTP relay account you want the Publisher to use. This is the recommended option for most environments, including Exchange Online, Gmail, and any authenticated SMTP relay. Enter a username in the Login field and password in the Password field to be used for SMTP authentication.

  • System Uses the Windows account running the Patch My PC Publisher service. Choose this only if your SMTP relay supports integrated authentication (NTLM/Kerberos). This is usually limited to on-prem Exchange servers or internal SMTP relays on the same domain. The Publisher will typically be running in the SYSTEM context.

Note: At the top of the SMTP Setttings section, you can choose from the Common Email Providers dropdown (Office 365, Outlook.com, Gmail, etc.).

Selecting one will auto-populate the server name, port, and TLS settings for that provider. You can still change any field manually afterwards.

7. Change Subject (Optional) The default email subject is Report from Patch My PC Publishing Service. If you wish to change this, click Change subject, enter your preferred Subject of the email, and click Ok.

Once the settings are complete, you can click the Test button to see if the recipient received the test email. If you have any issues sending emails, it’s likely an SMTP configuration error, and you can review our article Troubleshooting SMTP Email Report Sending When Using Patch My PC.

8. Add text to body (Optional) Enter any additional text you want included at the top of the email report, such as notes or context for your recipients.

9. Click Apply to save your changes.

Once the SMTP settings are saved, the Publisher will automatically send an email at the end of each synchronization when any updates or applications have been published. More information on how publishing alerts work for email, please review the following knowledgebase article.

If you have issues setting up SMTP emails, check out our troubleshooting guide below.

Teams Webhook

The Microsoft Teams webhook is a simple way to get a notification for each application as it is published in yourenvironment. Simply create a new workflow in the Teams channel where you wish to receive notifications, and use that Webhook URL when configuring webhook alerts in the Publisher.

Need help creating the webhook in teams? No problem, check out our complete guide to creating a Teams webhook.

Slack Webhook

The Slack webhook is another simple way to get a notification for each application as it is published in your environment. Simply create a new webhook in Slack and use that Webhook URL when configuring webhook alerts in the Publisher.

Need help creating the webhook for Slack? No problem, check out our complete guide to creating a Slack webhook.

Email Report
Teams Webhook
Slack Webhook

https://support.bluebeam.com/it-admin-handbook/

BluebeamOCR

https://support.bluebeam.com/it-admin-handbook/

Pulse Connect Secure

https://my.pulsesecure.net/

Kofax Power PDF 4 Advanced

https://delivery.kofax.com/Downloads

Duo Authentication for Windows Logon

https://duo.com/docs/winlogon-gpo

TeamViewer MSI

https://login.teamviewer.com/LogOn

https://www.cisco.com/c/en/us/support/security/anyconnect-secure-mobility-client-v4-x/model.html
https://www.oracle.com/java/technologies/javase-downloads.html
https://www.oracle.com/java/technologies/javase-downloads.html
https://community.mimecast.com/s/application-downloads
https://www.recastsoftware.com/right-click-tools#formarea
Manage Conflicting Processes in Third-Party UpdatesPatch My PC
Manage Conflicting Processes in Third-Party UpdatesPatch My PC

Azure App Registration

Applies to: On-premises Publisher

This article covers integrating the Patch My PC Publisher with your Intune tenant. We will go over creating an app registration in your Azure AD environment and configuring the Graph API permissions required for the Publisher to automatically create, update and assign Win32 applications in your Intune tenant; as well as configuring the tenant authority, application ID and application secret within the Publisher.

Topics covered in this article:

  • Step 1: Registering the Patch My PC Application in Azure AD

Step 1: Registering the Patch My PC Application in Azure AD

In order for our service to have permissions to your Intune tenant for application management, start by navigating to your environment’s , head to App registrations, and click New registration in the top left of the main pane.

Give your app registration a relevant name such as “Patch My PC – Intune Connector”. Configure the account types based on your tenant requirements. For the Redirect URI, leave it to the default unless you have specific requirements for configuring the Redirect URI. Then click Register.

Step 2: Configure API Permissions for the New Application

A full Intune API reference KB article for the Publisher can be found at

After you register a new application, we will need to delegate certain permissions in order for the Patch My PC Publisher to create and update Win32 applications in your Intune tenant, as well as view Azure groups and create assignments for the applications automatically.

Once the new app is registered, navigate to the API permissions node in the left column of the newly created app’s page. In the API permissions page, click the button to Add a permission, then in the right pane that appears, select the Microsoft Graph API.

Then, you are prompted for what type of permissions your app requires select Application permissions. In the Select permissions table view, search for “DeviceManagement” and under those permissions, enable the following:

  • DeviceManagementApps.ReadWrite.All

    (View and create applications in Intune)

  • DeviceManagementConfiguration.Read.All

    (View properties and relationships of assignment filters)

  • DeviceManagementManagedDevices.Read.All

Then, search for “GroupMember”, and under Group permissions, enable:

  • GroupMember.Read.All

    • View Azure AD groups to enable automatic application deployment

Click Add permissions.

To approve the new permissions, click Grant admin consent for. Choose Yes if you are prompted to consent for the required permissions. You must be logged into an Azure AD account with permissions to perform this task.

Note: Granting admin consent may require one of the following roles: or .

The result is shown below.

Note: To display the names of users or devices inside an Entra ID group when assigning apps or updates in the Publisher, the following Microsoft Graph API permissions are also required:

• User.ReadBasic.All Allows the service to read basic user details so user names can be shown when double clicking a group in the group picker window.

• Device.Read.All Allows the service to read device details so device names can be can be shown when double clicking a group in the group picker window.

Without these permissions, the Publisher can see that a group contains members, but it cannot resolve those members into readable user or device names. The image below shows the experience both with and without the adidtional permissions listed above.

Step 3: Configuring a Certificate or Client Secret

A certificate is considered more secure than a client secret for authentication to the new app registration as it is something you have (private key) rather than something you know (password). A client secret is the easiest configuration method but is considered less secure.

More guidance on why a certificate should be used instead of a client secret can be found at

Choose either or from the steps below to create an authentication credential for use with the new app registration. We strongly recommend using .

Option 1: Creating a Self-Signed Certificate

Certificate-based authentication is the preferred authentication method when connecting to an Azure App Registration. This document will focus on creating a self-signed certificates for use with the Patch My PC Publisher: .

Self-signed certificates with long expiry dates may use outdated hash and cipher suites that may not be strong enough as industry standards and best practices change. For this reason, choose short expiry dates or purchase a certificate signed by a well-known certificate authority.

The following are the current requirements for using certificate-based authentication that apply to both purchased and self-signed certificates:-

  • A 2048-bit key length. While longer values are supported, the 2048-bit size is highly recommended for the best combination of security and performance.

  • Uses the RSA cryptographic algorithm. Azure AD currently supports only RSA.

  • The certificate is signed with the SHA256 hash algorithm (Entra ID also supports certificates signed with SHA384 and SHA512 hash algorithms).

Follow the steps below to create a self-signed certificate using the New-SelfSignedCertificate and Export-Certificate PowerShell cmdlets:-

Create the Certificate

Open a PowerShell window on the same computer where the Patch My PC Publisher is installed. Be sure to elevate the prompt by choosing Run as Administrator.

Copy the following code snippet to and paste into the elevated PowerShell window.

Verify the certificate was created successfully in the Local Machine Personal Certificate Store by running certlm.msc.

Export the Public Key

We need to export the Public Key and upload it to the new app registration for the Patch My PC Intune connector. Follow the steps below:-

Open PowerShell window on the same computer where the Patch My PC Publisher is installed. Be sure to elevate the prompt by choosing Run as Administrator.

Copy the following code snippet to and paste into the elevated PowerShell window.

Verify the certificate was exported successfully in the C:\temp\certs folder.

If you receive the message "The system cannot find the path specified" (as shown below), please ensure the credentials used to launch the PowerShell session have permission to create a folder at C:\temp or specify a new path for the $certFolder variable where you do have permission to create the folder.

In the browser, navigate to the App registration created in and select the Certificates & secrets node in the left column. Select the Certificates and click Upload certificate.

Browse to the C:\temp\certs folder, select the certificate that was exported earlier, click Open and then click Add.

Verify the public key is listed correctly in the app registration.

Option 2: Creating a Client Secret

If you have already followed the instructions for Option 1, you do not need to create a client secret. Instead, go to

A client secret, a password string that our app will use to prove its identity when requesting a token. Navigate to the Certificates & secrets node in the left column, and click the button to add a New client secret. Decide on a description and expiration date (in months) that best suits your organization’s needs, then click Add.

Microsoft recommends a client secret of no longer than 6 months

Copy the Value for the Client Secret you created. Save this value to a secure location, you will enter the value under Application Secret in the Intune Options of the Publisher.

You may receive an error similar to ‘An error occurred while connecting to Intune: AADSTS7000215: Invalid client secret is provided.’ within the PatchMyPC.log file. If you receive this error please repeat above to create a new secret, or review your existing secret configuration within the Publisher to ensure you are using the correct value.

Step 4: Configuring the Patch My PC Publisher to Connect to the Intune Tenant

Navigate to the Overview node of the app registration, and copy the Application (client) ID. Save this value to a secure location along with your secret key value.

If you do not know your Intune tenant domain, navigate to the in your Intune tenant, and look at the property for Tenant name.

Now, it is time to go to the Intune Options window of the Publisher Patch My PC Publisher to configure the following:-

(depending on whether you followed Step 3 option 1 or option 2)

Authority

The Authority value is a URL made up from the Microsoft authentication endpoint and your tenant name. The newer Microsoft authentication endpoint should be used:- https://login.microsoftonline.com

Referring to the screenshot above, replace tenantname.onmicrosoft.com with the Tenant name you found in the tenant status page of your Intune tenant. The construct of the URL should look something like https://login.microsoftonline.com/<<Tenant name>> The complete Authority value should look similar to this example below:- https://login.microsoftonline.com/tenantname.onmicrosoft.com

Application ID

Paste the Application ID that you recorded earlier.

Certificate / Application Secret

If you chose to use a Certificate for authentication, click the certificate option and browse the Local Machine store for the correct certificate and click Ok.

If you chose to use a Client Secret for authentication, click the Application Secret option and enter the Client Secret value you recorded earlier.

Test Authentication, Connectivity and API Permissions

Click Test to view the Intune Connection Status and validate that the Publisher can connect to your Intune tenant. If the listed permissions all have a green checkmark under Enabled, you can now begin to publish applications to your Intune tenant.

If the associated tenant is on (US Government), the changes below are required:

Authority: Authentication URL: Graph Base URL:

If the associated tenant is operating within , the changes below are required:

Authority: Authentication URL: Graph base URL:

Export the Public Key
  • Option 2: Creating a Client Secret

  • (View device inventory for the auto-publish feature)
  • DeviceManagementRBAC.Read.All

    (View scopes to be assigned to applications)

  • DeviceManagementServiceConfig.ReadWrite.All

    (Update Enrollment Status Page configurations)

  • The certificate is valid for only one year.
    Step 2: Configure API Permissions for the New Application
    Step 3: Configuring Certificates & Secrets
    Option 1: Creating a self-signed Certificate
    Create the Certificate
    Step 4: Configuring the Patch My PC Publisher to Connect to the Intune Tenant
    Test authentication, Connectivity and API Permissions
    Azure AD portal
    https://patchmypc.com/patchmypc-publisher-api-reference
    Global Administrator
    Privileged Role Administrator
    https://learn.microsoft.com/en-us/azure/active-directory/develop/security-best-practices-for-app-registration#certificates-and-secrets
    Option 1
    Option 2
    Option 1
    Create a self-signed public certificate to authenticate your application
    Step 1
    Step 4
    option 2
    tenant status page
    Authority
    Application ID
    Certificate or Application Secret
    GCC High
    https://login.microsoftonline.us
    https://graph.microsoft.us
    https://graph.microsoft.us/beta
    21Vianet
    https://login.chinacloudapi.cn
    https://microsoftgraph.chinacloudapi.cn
    https://microsoftgraph.chinacloudapi.cn/beta
    Right-Click Options for Updates & ApplicationsPatch My PC
    Custom right-click options for customizing installation behavior
    $subjectName = 'PatchMyPCIntuneConnector'
    $certStore = 'LocalMachine'
    $validityPeriod = 12
    
    $newCert = @{
        Subject = "CN=$($subjectName)"
        CertStoreLocation = "Cert:\$($certStore)\My"
        HashAlgorithm = 'sha256'
        KeyExportPolicy = 'NonExportable'
        KeyUsage = 'DigitalSignature'
        KeyAlgorithm = 'RSA'
        KeyLength = 2048
        KeySpec = 'Signature'
        NotAfter = (Get-Date).AddMonths($($validityPeriod))
        TextExtension = @("2.5.29.37={text}1.3.6.1.5.5.7.3.2")
    }
    $cert = New-SelfSignedCertificate @newCert
    $subjectName = 'PatchMyPCIntuneConnector'
    $certFolder = "C:\temp\certs"
    New-Item -Path $certFolder -ItemType Directory -Force | Out-Null
    $certExport = @{
    Cert = $Cert
    FilePath = "$($certFolder)\$($subjectName).cer"
    }
    Export-Certificate @certExport
    How Publishing Alerts Work in Patch My PCPatch My PC
    Fix SMTP Email Sending in Patch My PCPatch My PC
    SMTP email troubleshooting
    Logo
    Logo
    How Publishing Alerts Work in Patch My PCPatch My PC
    How Publishing Alerts Work in Patch My PCPatch My PC
    Logo
    Logo
    Logo
    Logo
    Logo