Get-AutopatchHealth

1.1.0

The script checks the following:
- Whether the device is receiving update policies from MDM (Intune) and if it's tagged for Autopatch.
- If there are any WSUS server configurations that could interfere with Autopatch.
- If specific registry keys that would block Autopatch are present.
- If the device is enrolled in Intune by checking for key registry paths.
- The last
The script checks the following:
- Whether the device is receiving update policies from MDM (Intune) and if it's tagged for Autopatch.
- If there are any WSUS server configurations that could interfere with Autopatch.
- If specific registry keys that would block Autopatch are present.
- If the device is enrolled in Intune by checking for key registry paths.
- The last activity date of the Intune Management Extension to assess if the device has been active recently.

Show more

Installation Options

Copy and Paste the following command to install this package using PowerShellGet More Info

Install-Script -Name Get-AutopatchHealth -RequiredVersion 1.1.0

Copy and Paste the following command to install this package using Microsoft.PowerShell.PSResourceGet More Info

You can deploy this package directly to Azure Automation. Note that deploying packages with dependencies will deploy all the dependencies to Azure Automation. Learn More

Manually download the .nupkg file to your system's default download location. Note that the file won't be unpacked, and won't include any dependencies. Learn More

Owners

Package Details

Author(s)

  • Jeff Gilbert

Tags

Intune

Dependencies

This script has no dependencies.

Release Notes

Version 1.0.0 3.10.26 Original published version.
Version 1.1.0 3.10.26 Fixed typo in report output.

FileList

Version History

Version Downloads Last updated
2.1.2 3 4/1/2026
1.1.0 (current version) 31 3/10/2026
1.0.0 9 3/10/2026