Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Deploy Microsoft Defender updates in deployment rings
    Intune

    Deploy Microsoft Defender updates in deployment rings

    Peter KlapwijkBy Peter KlapwijkJuly 4, 2025Updated:July 4, 20256 Mins Read

    Last week I shared in a blog post how we can easily create ring deployment groups in Entra ID. Today’s blog post describes how we can create different update policies to deploy updates for Microsoft Defender in a managed way.

    Keeping Microsoft Defender up to date is critical to keep our devices secure, but as with all updates we want to control the roll-out of these updates in a managed way, so not all our devices receive the update on the same time. This to avoid an outage of all our devices when a faulty update is deployed.

    Different Microsoft Defender updates

    Microsoft Defender consists of multiple parts that need to be updated frequently. We have options to control the update channels for Defender platform and engines updates, which receive updates once per month.
    Besides that we have the security intelligence updates, which are updated multiple times a day.

    The platform updates are update to the overall Defender infrastructure, including new feature, OS level integration, bug fixes and improvements. These updates are provided in KB4052623.

    The engine updates, are updates to the core scanning engine that detects and removes malware.

    The security intelligence updates are the frequent updates that provide the latest threat definitions and detection logic. Therefor these updates are provided multiples times a day via KB2267602.

    Defender update channels

    We have different update channels available for the platform, engine and security intelligence updates.
    The platform and security intelligence updates come once a month and for these we have 5 difference channels available (besides the default unconfigured option).
    For the daily security intelligence we have two update channels available.

    The platform and engine update channels:

    ChannelDescriptionRecommended useRollout timing
    Beta ChannelDevices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft.Manual test environments, few devices of IT employeesDay 0
    Current Channel (Preview)Devices set to this channel will be offered updates earliest during the monthly gradual release cycle.Pilot devicesShortly after Beta
    Current Channel (Staged)Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population.~10% of production devicesAfter Preview
    Current Channel (Broad)Final stage. Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population~10–100% of production devicesAfter Staged completes
    Critical – Time DelayReceives updates 48 hours later than Broad. Used for critical systems.Critical or sensitive environments48 hours post-rollout
    Default (Unconfigured)The device will stay up to date automatically during the gradual release cycle.Most general-purpose devicesAuto-managed

    In the blog post I shared about creating ring deployment groups, we have 5 ring groups. These consist of 1 test, 1 pilot and 3 production groups. We also have 5 different update channels for the platform and engine updates, but I don’t consider the Critical – Time delay channel as suitable for these 5 groups as that channel is only meant for very critical sensitive devices. In case we need to use this channel, we would create an additional group to make sure we can exclude the device from the other deployments.

    The security intelligence update channels:

    ChannelDescriptionRecommended UseRollout timing
    Current Channel (Staged)Midway through rollout. Used for a small portion of production devices.~10% of production devicesReceives updates first, shortly after internal validation
    Current Channel (Broad)Final stage. Used for most production devices.~10–100% of production devicesReceives updates after staged rollout (and shows no critical issues)
    Default (Unconfigured)Devices follow the standard gradual rollout automatically.Most general-purpose devicesAuto-managed

    As you can see we don’t have much options to create different update rings for security intelligence updates, as we only have Current channel staged and broad. This is not very surprising since these updates should be rolled out as soon as possible.
    But still in a managed environment we want to manage the update channel for our devices, even if you want to add all your devices in one channels as there is not that much of a difference in roll-out. This is because Microsoft will either assign the device to Current Channel (Broad) or a beta channel early in the gradual release cycle when the update channel is unconfigured. The channel selected by Microsoft might be one that receives updates early during the gradual release cycle, which may not be suitable for devices in a production or critical environment. This means that critical devices can receive security intelligence updates in a very early stage, which might be unwanted.

    Defender update ring policies

    I choose to create 4 different Defender update policies, as we have 4 different monthly update channels. As we have only 2 different update channels for the daily updates, we need to make a decisions how to implement these channels. And we need to make a decision in how to use our production groups. I choose to assign production groups 4 and 5 to the Defender ring 4 policy, as Microsoft describes to assign the Current channel staged to ~10% of the devices, which is about the number of devices in the ring 3 group.

    Policy namePlatform updates channelEngine updates channelSecurity intelligence channelIncluded groupsExcluded groups
    PRD WIN Defender Updates Ring 1 TestBeta ChannelBeta ChannelCurrent Channel (Staged)GRP WIN Ring 1 Test
    PRD WIN Defender Updates Ring 2 PilotCurrent Channel (Preview)Current Channel (Preview)Current Channel (Staged)GRP WIN Ring 2 Pilot
    PRD WIN Defender Updates Ring 3 ProductionCurrent Channel (Staged)Current Channel (Staged)Current Channel (Staged)GRP WIN Ring 3 ProductionGRP WIN Ring 1 Test/ GRP WIN Ring 2 Pilot
    PRD WIN Defender Updates Ring 4 ProductionCurrent Channel (Broad)Current Channel (Broad)Current Channel (Broad)GRP WIN Ring 4 Production/ GRP WIN Ring 5 ProductionGRP WIN Ring 1 Test/ GRP WIN Ring 2 Pilot

    You can see that on ring 3 and 4 the test and pilot group are excluded. This is because all devices are member of one of the three production groups, thus we need to exclude the assigned device groups from the policies to which the three dynamic production groups are assigned.

    We could also create a fifth update ring policy, but that would most likely contain the exact same update channels as ring 4.

    Configure the update ring policies in Microsoft Intune

    We have different policy types available in Microsoft Intune to create our Defender update ring policies.

    In the Microsoft Intune admin center under Endpoint Security, on the Antivirus tab we have the option to create a Defender Update controls policy.

    But if you prefer to use a Settings Catalog policy, we also have that option available under Devices, Configuration.

    Check the end-Result

    On the Windows client we can check to which updates channels the machine is configured by running the below PowerShell command;
    Get-MpPreference | Select *channel*

    This is a device in ring 1:

    This is a device in ring 4:

    These values match the values described in the docs for EngineUpdatesChannel, PlatformUpdatesChannel and SecurityIntelligenceUpdatesChannel.

    I hope this blog post helps you on your way in setting up your own Defender update policies.

    Thanks for reading!

    Ps; If you’re interested in updating Microsoft Defender during Autopilot enrollments, also read this post.

    Intune Microsoft Defender Microsoft Endpoint Manager Security Windows Windows 11
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Get notifications of missing devices in Windows Update for Business reports

    June 3, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Rod Newcomb on Block personal accounts from syncing in Microsoft Edge with Microsoft Intune
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}