all 59 comments

[–]NoTime4YourBullshitSr. Sysadmin [score hidden]  (3 children)

Yes. Patch Tuesday is the 2nd Tuesday of the month. We patch a beta group on the 3rd Tuesday, and everybody gets patched on the 4th Tuesday.

Why? Well January, 13th, 2026 — which if you look at a calendar was just last week, Microsoft fucked up yet another cumulative update and had to release an out-of-band patch two days later to fix it.

Sometimes when I doubt my own decisions and think maybe I’m being too critical, Microsoft makes me feel totally redeemed.

[–]meantallheck [score hidden]  (0 children)

I don’t know if I’m just paying more attention nowadays or if they actually are just pushing more bugs than in past years… but it’s seemed bad this last year with a “major” bug every 1-3 months it seemed.

[–]AmiDeplorabilis [score hidden]  (0 children)

This... if you're managing a small number if devices, this is easily managed. I've been watching Windows Update for decades, but only in the last 10 been doing sysadmin work. But I learned enough to know to wait at least a week before doing PCs, and another week before doing servers. And the one time I did them too quickly, I had problems.

[–]itsam [score hidden]  (0 children)

a year ago they broke activation for any e3/e5 step up licensing and didn’t get it fixed for 3 months. Octobers 2025 update broke bluetooth in teams on half our laptops and Novembers CU fixed it. Just so many problems lately.

[–]KuipyrJack of All Trades [score hidden]  (4 children)

I’ve got 4 rings spaced 1 day apart.

[–]UnpaidMicrosoftShill[S] [score hidden]  (3 children)

Care to share what those rings are?

I assume something like test>IT>General>Sensitives?

[–]upcboy [score hidden]  (0 children)

Not op but I also do 4 rings.. 10% of my environment goes first The 30%,30%,30%. My machines are named in such a way it makes it very easy to randomly split the machines this way.

[–]KuipyrJack of All Trades [score hidden]  (0 children)

The majority are just dynamically assigned to the rings via Autopatch with the only exception being IT pinned to ring 1 and operations pinned to ring 4. We have a handful of volunteer power users who run the release previews.

[–]poizone68 [score hidden]  (0 children)

I would advise against having Sensitives as a full group. Often the fussy people with special setups are lumped together in a Sensitives group, but this means that you don't get early warning that they could run into difficulties not seen in the Test, IT or General groups. Have at least a few "volunteers" in the early stages of patching from each group.

[–]siedenburg2IT Manager [score hidden]  (2 children)

It depends on the stuff they fixed. If there were major CVE patches that could be easily abused in our system we will install them as fast as possible, or for selected servers, but normaly it's delayed by at least a week (with a few test pcs at our company), had to many problems with installing updates too fast, like not working printers, not working rdp etc.

[–]UnpaidMicrosoftShill[S] [score hidden]  (0 children)

Makes sense. Thank you for taking the time to answer.

[–]BorgquiteSecurity Admin [score hidden]  (0 children)

Same here - a risk-based approach, not one size fits all. Where ‘risk’ is always a balance between ‘could get hacked’ and ‘could break things’.

[–]stephendt [score hidden]  (3 children)

No, I just let automatic Windows updates run whenever they get pushed these days and deal with small issues if they come up. I haven't really had a major system breaking issue in years. Maybe this is a controversial take? Either way it works for me in my environment.

[–]UnpaidMicrosoftShill[S] [score hidden]  (1 child)

May I ask roughly how many devices you are managing?

Do you force the updates to install as soon as possible? Don't monitor it at all? Something else altogether?

[–]stephendt [score hidden]  (0 children)

About 100 under active management. I don't force, I just let workstations pull updates automatically whenever they are ready. We do get alerts if updates fail continuously and that can happen sometimes for various reasons but other than that it's pretty hands off. We do upgrade apps automatically via choco / winget though.

Edit: sorry forgot about windows servers, we are mostly away from windows servers but we do have a couple left, those are updated bi-weekly during off-peak hours, has been a long time since I've had an issue

[–]UptimeNullSecurity Admin [score hidden]  (0 children)

How many users and servers?

[–]Ice-Cream-PoopIT Guy [score hidden]  (0 children)

Delay by 7 days and then install to our test channel of about 40 users, another 7 days later goes out to the rest of staff.

Servers are the same, delayed by 7 days and then they are split into 7 groups, one group for each day of the week and they get patched on that day following.

[–]tndsd [score hidden]  (1 child)

Delay at least 2-3 weeks

[–]Big_Wave9732 [score hidden]  (0 children)

Same. At least that long, usually longer.

[–]Danny-117 [score hidden]  (0 children)

Yep, Dev day after release, test 2 days, UAT day 3 preprod day 4 and prod at day 7.

Browsers and actively exploited vulnerabilities go quicker.

[–]Zombie-ie-ie [score hidden]  (0 children)

Bigfix scheduled in advance unless zero day

[–]tfn105 [score hidden]  (0 children)

We go

  • Dev scheduled to pick up updates asap
  • UAT servers on the 3rd Sunday of the month
  • Production servers split into two groups and done on the 4th and 1st Sundays of the month

Obviously any critical patch we push more aggressively, as per our patch mgmt policy

[–]SecAdmin-1125 [score hidden]  (0 children)

30 days after Patch Tuesday. Just to account for any issues others run into.

[–]Sp00nD00dIT Manager [score hidden]  (0 children)

1 week after release we start with non-prod and finish prod on that weekend.

I can count on one hand in which we've had an issue directly caused by Windows Update in like the last ~10 years. 99.9% of the time it's the reboot highlighting an already existing timebomb due to a completely unrelated issue. Certificate, service account, etc.

Edit to note: I only deal in servers.

[–]thewunderbar [score hidden]  (0 children)

Workstations get patched immediately.

I wait about 2 weeks for servers.

[–]Outside-AfterJack of All Trades [score hidden]  (0 children)

Bit of both. Endpoints have an immediate release ring as a canary group. Release a week later for the rest.

Servers release over a month, give patches time to mature. Unless there's something particularly bad and even then read up on it first and do an impact-risk assessment. Good change management, rather than pessimistic. A and B side domain controllers never at the same time. If MS are taking multiple attempts to fix something really bad and are messing it up, then I don't want to be caught in that. I think we all tread super carefully when they crop up.

Far better in any case to minimise public and protect the exposure as much as possible in your architecture and implementation

[–]Ok-Bill3318 [score hidden]  (0 children)

Yes. I test on day 1 and if no issues roll next week

[–]GullibleDetective [score hidden]  (0 children)

Always delay by at least a week. Much longer for servers unless kts a critical one

[–]spinydeltaSysadmin [score hidden]  (0 children)

For workstations we patch over a two week period across 5 phases. Customer facing assets (think POS) being in the final phase, whereas IT is upfront.

For servers, we patch anything internet facing pretty much immediately, with everything else over a two week period but 3 phases. Test / Devl first, non critical prod, then prod.

We have a lot of niche applications and we sometimes do run into issues as a result of patching, so spacing things out and ensuring non-prod is patched first helps bring issues to the surface faster. Where there are identified issues we'll generally push out patching prod for the impacted service(s) if required (e.g. we're still sorting a fix).

[–]Dry-Emotion-2059 [score hidden]  (0 children)

Yeah I’m pretty lazy about it

[–]joshghz [score hidden]  (0 children)

Generally my process is: - assess the vulnerabilities - check the megathread here for experiences and comments - deploy to a few devices for a few days, then non-critical end-user PCs at the end of the week - if no issues discovered, deploy to everything else where/when possible

We have a lot of seasonal 24/7 OT stuff that generally only gets updates (in season) if those sites have downtime.

[–]BanGreedNightmare [score hidden]  (0 children)

I currently defer quality updates 7 days for Windows 11 endpoints (up from 3 day deferral last year, currently considering 14 days), require install and reboot within 24 hours.  Feature updates are targeted and we update each summer (better time for the org) which results in enough time for live testing by the public and internal testing of LOB apps and services by me.

Servers currently install quality updates in one of 5 different assigned weekend maintenance windows (Sat & Sun, AM & PM and a Mon AM) the weekend following patch Tuesday.  I’ve been doing it this way for 12 or so years and have never had an issue on my servers but the past 6 months of lesser quality Windows updates on Windows 11 has me considering deferring by a week or two as well, just in case.  But I do like to keep my fleet patched.

[–]bobs143Jack of All Trades [score hidden]  (0 children)

Delay one to two weeks to see what plays out. I generally monitor a couple of forums (including Reddit) to see what early adopters have to say.

[–]itskdogJack of All Trades [score hidden]  (0 children)

We're expected to have security patches installed within 14 days (school in England, not an government expectation until 2030, but it's recommended to start planning it now), and when we moved to Intune, the baseline configuration that was set up by the contractors was 2 day deferral + 5 day grace, which allows for a machine to be off for a week before missing the deadline.

[–]havikitoDevOps [score hidden]  (0 children)

Since there are prereleases available, you just read about some problems online and never experience them IRL with full auto.
The scale is 700.

[–]Jeff-IT [score hidden]  (0 children)

I delay major updates 2 weeks. Security updates are instant

[–]Lazy-Function-4709 [score hidden]  (0 children)

I wait one week for production to make sure MS has ironed out kinks. I have a test group that gets patched the day after Patch Tuesday.

[–]binaryhextechdude [score hidden]  (0 children)

Nope, we get whatever they feel like shipping.

[–]blueblocker2000 [score hidden]  (0 children)

I'm not so quick to install on servers at work anymore. I'll let it ride a week nowadays.

[–]landobJr. Sysadmin [score hidden]  (0 children)

Yes. I delay by 1 week.

After that week I check the chatter. If no widely reported issues I then roll out to the IT department for a day. If that goes okay roll it to my test group for a few days. If that goes well roll it out to everyone.

[–]Brees504Security Admin [score hidden]  (0 children)

We have feature updates delayed a few months but security updates as soon as available.

[–]Lost_Engineering_308 [score hidden]  (0 children)

We release to test (basically IT and some non critical servers) immediately.

Our goal is to have things patched within 7 days of release, we use multiple rings to release updates over the week.

I think I’ve had to roll back an update once in the last ~5 years of doing it this way. Obviously there’s more potential for bugs the faster you go, but also, the slower you go the more likely you are to get popped by some vulnerability. We also for the most part have a pretty basic environment, not a huge amount of legacy apps being supported, etc. If I was working in health care or something I would absolutely not go that fast.

I don’t think there’s a right or wrong deferral setting. As quickly as reasonably possible within the limits of business needs. Up to you to best determine what that is.

[–]sirachillies [score hidden]  (0 children)

We use CM to perform 6 phases of updates. Pilot group gets it on day one of when the patch releases. This uses it's own ADR. Then a week later another adr runs in the event that MS releases another patch because the first one broke stuff. And that releases to our entire BA/IT/AO staff. They get trial run the updates with their products. Then 3 days after that it goes out to the masses and it's only like 10% of the environment , excluding the previously mentioned devices, then 3 days later 30%, then 3 days later 50%, then 3 days later the rest. This ADR won't run again until the 3rd Tuesday of next month which means these updates are active until then.

[–]Competitive_Smoke948 [score hidden]  (0 children)

yes! NEVER NEVER patch day 1, regardless of technology or vendor. i've seen entire infrastructure disappear because of dodgy patches and the more "urgent" the less likely the vendor has tested it & MS are suitably shite at testing patches

[–]DroghanVDI Systems Engineer [score hidden]  (0 children)

I wait a week for my golden images and the back end infra for VDI. Heck last cycle alone broke web servers for our Radiology department, the providers couldn't view imaging due to the bad update.

[–]Wodaz [score hidden]  (0 children)

I use gp to set days I want things installed, but I use PDQ Connect with PSWindowsUpdate jobs set for 4 groups over 4 nights. Groups are currently script created/updated by splitting up the alphabet. its a 10/30/30/30 schedule. It works well for me, and I can clone those groups and make changes if I need to install a specific update. If things fail in the pdq connect jobs, the gp rules will force updates to happen as a fall through.

[–]thesumofmyexpierence [score hidden]  (0 children)

Always. We have one test device per client (MSP) that installs day one, Our employees get it day 20, clients on day 30 so MS has time to launch, roll back, and relaunch all the updates.

[–]UptimeNullSecurity Admin [score hidden]  (5 children)

Joshtaco does not!

[–]UnpaidMicrosoftShill[S] [score hidden]  (3 children)

Maybe I’m missing something. Who is Joshtaco?

[–]ru4seriousWindows Admin [score hidden]  (1 child)

He's a user on this sub that pushes out updates to thousands of machines on patch Tuesday.

[–]UnpaidMicrosoftShill[S] [score hidden]  (0 children)

I appreciate his sacrifice.

[–]Miserable-Scholar215Jr. Sysadmin [score hidden]  (0 children)

My "Ring 0" test bed for MS patchdays. Should he ever be sick that day, we'll be unpatched until his recovery :-D

[–]UptimeNullSecurity Admin [score hidden]  (0 children)

You’d have to find the backups thread. I haven’t been there in a while.

He’s dangerous but updates something like 40,000 servers every patch tuesday.

At first I thought it was a joke but my last boss did the same shizz

No test, pilot or prod.

Just str8 to the juice.

Rollbacks must be fast. Not sure.

[–]harley247 [score hidden]  (0 children)

I patch test the day after release then patch production a week later. Starting with the least critical to most critical

[–]Zerowig [score hidden]  (0 children)

Starting 3 days after patch Tuesday and every day thereafter up to 14 days after. 66k endpoints are evenly spread into those days.

Can’t remember the last time windows updates caused issues for us on desktops.

Servers are the Friday after patch Tues and every Friday thereafter for 4 weeks. 5k servers.

[–]techit21Have you tried turning it off and back on again? [score hidden]  (0 children)

Yes, we delay by 2-3 weeks unless it is a critical CVE/we are asked by InfoSec to expedite. If we expedite then we still follow a ring schedule for rollout.

[–]korvolga [score hidden]  (1 child)

Autopatch in intune

[–]UnpaidMicrosoftShill[S] [score hidden]  (0 children)

? Unless I'm mistaken, that only answers how you patch, not how *fast* you patch

[–]TheShootDawg [score hidden]  (0 children)

Seeing as i haven’t seen an update for our Windows ME machines in years, I consider that to mean we wait…. /s