Skip to content

Commit 0bb571e

Browse files
Merge pull request #19449 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-26 18:30 UTC
2 parents 23ee2ab + 95975af commit 0bb571e

2 files changed

Lines changed: 7 additions & 7 deletions

File tree

autopilot/whats-new.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's new in Windows Autopilot
33
description: News and resources about the latest updates and past versions of Windows Autopilot. # RSS subscription is based on this description so don't change. If the description needs to change, update RSS URL in the Tip in the article.
4-
ms.date: 09/09/2025
4+
ms.date: 01/26/2026
55
ms.collection:
66
- M365-modern-desktop
77
- tier2
@@ -28,11 +28,11 @@ appliesto:
2828
## Enrollment Status Page support for installing Windows security updates during Windows OOBE
2929
3030
Date added: *September 3, 2025*<br>
31-
Date updated: *September 9, 2025*
31+
Date updated: *January 26, 2026*
3232
33-
> [!IMPORTANT]
33+
> [!NOTE]
3434
>
35-
> As of September 9, 2025, this capability is delayed to help ensure delivery of the best possible experience. The new setting on the Enrollment Status Page (ESP) can be configured on both new and existing ESP profiles, but the automatic installation of monthly security update releases and the new user interface isn't available yet. This post will be updated with a revised timeline as soon as it's available.
35+
> As of January 13, 2026, this capability is included in the Windows `2026-01 B` quality update.
3636
3737
The Windows out-of-box experience (OOBE) by default installs the latest available monthly security update releases to help ensure devices are secure and up to date from day one. Windows OOBE is used by Intune and by Windows Autopilot scenarios through the Intune enrollment status page (ESP) configurations. Intune refers to these monthly security update releases as quality updates.
3838

intune/intune-service/apps/mamedge-3-scc.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 3. Integrate Mobile Threat Defense for App Protection Policy
33
description: Step 3. Integrate Mobile Threat Defense signals with Microsoft Edge for Business app protection policies in Microsoft Intune.
4-
ms.date: 01/23/2026
4+
ms.date: 01/26/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -64,13 +64,13 @@ Use the conditional launch settings to maintain progressive security across the
6464

6565
- **Offline grace period (Block access)**: Set to **10080** minutes.
6666
- **Offline grace period (Wipe data)**: Set to **90** days.
67-
- **Max allowed device threat level**: Select **Low**, with the **Block access** action.
67+
- **Max allowed device threat level**: Select **High**, with the **Block access** action.
6868

6969
#### Level 2 – Enhanced
7070

7171
- **Disabled account**: Set to **Block access**.
7272
- **Min OS version**: Enter **10.0.22621.2506** and select **Block access**.
73-
- **Max allowed device threat level**: Select **Medium**, with the **Block access** action.
73+
- **Max allowed device threat level**: Select **Low**, with the **Block access** action.
7474
- **Offline grace period (Wipe data)**: Set to **30** days.
7575

7676
#### Level 3 – High

0 commit comments

Comments
 (0)