Use Group Policy to enable an update that is disabled by default
This article describes how to configure Group Policy to use a feature preview policy definition that activates a preview update on managed devices.
Summary
Certain updates are shipped in a disabled state with the intent to enable them in a later update. While in a disabled state, enterprises can enable these updates via Group Policy to preview the change and confirm that it works as expected. This preview is temporary. After a new update is released to enable the change by default, the preview is no longer necessary.
Important
This preview only applies to non-security updates. Security updates aren't available for preview.
Microsoft manages the deployment process for non-enterprise devices. For enterprise devices, Microsoft provides policy definition files (the Windows Installer files (*.msi)). Enterprises can then use Group Policy to deploy in hybrid Microsoft Entra ID or Active Directory Domain Services (AD DS) domains.
Note
You must restart the affected computers for the Group Policy change to take effect.
Apply a preview to a single device using Group Policy
To use Group Policy to apply a preview to a single device, follow these steps:
Download the policy definition
.msi
file to the device as instructed by Microsoft Support.Important
Make sure that the operating system (OS) that is listed in the
.msi
file name matches the OS of the device that you want to update.Run the
.msi
file on the device. This action installs the policy definition in the Administrative Template.Open the Local Group Policy Editor. To do this, select Start, and then enter gpedit.msc.
Select Local Computer Policy > Computer Configuration > Administrative Templates > KB <#######> Feature Preview > Windows 10/11, version <YYMM>.
Note
In this step, <#######> is the KB article number of the update where the change is shipped, and <YYMM> is the Windows 10 or Windows 11 version number.
Right-click the policy, and then select Edit > Enabled > OK.
Restart the device.
For more information about how to use the Local Group Policy Editor, see Working with the Administrative Template policy settings using the Local Group Policy Editor.
Apply a preview to devices in a hybrid Microsoft Entra ID or AD DS domain using Group Policy
To apply a velocity policy definition to devices that belong to a hybrid Microsoft Entra ID or AD DS domain, follow these steps:
- Download and install the .msi files.
- Create a Group Policy Object (GPO).
- Configure the GPO.
- Monitor the GPO results.
1. Download and install the .msi files
Obtain the
.msi
file from your Microsoft Customer Service and Support (CSS) counterpart as instructed by Microsoft Support when applicable.Download the velocity policy definition
.msi
files that you require to update to the computer that you use to manage Group Policy for your domain.Run the
.msi
files. This action installs the velocity policy definition in the Administrative Template.Note
Policy definitions are installed in the C:\Windows\PolicyDefinitions folder. If you have implemented the Group Policy Central Store, you must copy the
.admx
and.adml
files to the Central Store.
2. Create a GPO
- Open Group Policy Management Console, and then select Forest: <DomainName> > Domains.
- Right-click your domain name, and then select Create a GPO in this domain, and link it here. Alternatively, you can create and apply it to the preferred container in the domain based on the location of the target computer accounts.
- Enter the name of the new GPO (for example, Preview <######>), and then select OK.
For more information about how to create GPOs, see Create a Group Policy Object.
3. Configure the GPO
To edit your GPO:
- Right-click the GPO that you created previously, and then select Edit.
- In the Group Policy Editor, select <GPOName> > Computer Configuration > Administrative Templates > KB ####### Issue XXX Feature Preview > Windows 10, version <YYMM>.
- Right-click the policy, and then select Edit > Enabled > OK.
For more information about how to edit GPOs, see Edit a Group Policy object from GPMC.
4. Monitor the GPO results
In the default configuration of Group Policy, managed devices should apply the new policy within 90 to 120 minutes. To speed up this process, you can run gpupdate
on affected devices to manually check for updated policies.
Make sure that each affected device restarts after it applies the policy.
Important
The feature preview will be enabled after the device applies the policy and then restarts.
Deploy a preview using Microsoft Intune ADMX policy ingestion to the managed devices
Note
To use the solutions in this section, you must install the cumulative update that was released on July 26, 2022 or a later one on the computer.
Group policies and GPOs aren't compatible with mobile device management (MDM) based solutions, such as Microsoft Intune. These instructions will guide you through how to use Intune custom settings for ADMX ingestion and configure ADMX backed MDM policies to enable a preview without requiring a GPO.
To enable a preview on Intune-managed devices, follow these steps:
- Download and install the .msi file to get ADMX files.
- Create a custom configuration profile in Microsoft Intune.
- Monitor preview enablement.
1. Download and install the preview .msi file to get ADMX files
Download the required velocity policy definition
.msi
files on the machine you use to sign in to Microsoft Intune.Note
You need access to the contents of an ADMX file.
Run the
.msi
files. This action installs the velocity policy definition in the Administrative Template.Note
Policy definitions are installed in the C:\Windows\PolicyDefinitions folder.
If you want to extract the ADMX files to another location, use the
msiexec
command with the TARGETDIR property. For example:msiexec /i c:\admx_file.msi /qb TARGETDIR=c:\temp\admx
.
2. Create a custom configuration profile in Microsoft Intune
To configure devices to perform activation, you need to create a custom configuration profile for each OS of your managed devices. To create a custom profile, follow these steps:
- Select properties and add basic information of the profile.
- Add custom configuration settings to ingest ADMX files.
- Add custom configuration settings to set the new policy.
- Assign devices to the custom configuration profile.
- Review and create the custom configuration profile.
A. Select properties and add basic information about the profile
Sign in to the Microsoft Intune admin center.
Select Devices > Configuration > Create > New Policy.
Select the following properties:
- Platform: Windows 10 and later
- Profile type: Templates > Custom
Select Create.
In Basics, enter the following properties:
- Name: Enter a descriptive name for the policy. Name your policies so you can identify them later. For example, a possible policy name is "Preview <######> – Windows 10 21H2."
- Description: Enter a description for the policy. This setting is optional but recommended.
Note
Platform and Profile type should already have values selected.
Select Next.
Note
For more information about creating custom configuration profiles and configuration settings, see Use custom device settings in Microsoft Intune.
Before proceeding to the next two steps, open the ADMX file in a text editor (for example, Notepad) where the file was extracted. The ADMX file should be in the path C:\Windows\PolicyDefinitions if you installed it as an MSI file.
Here's an example of the ADMX file:
<policies>
<policy name=" KB5034129_240124_0305_3_FeaturePreview" … >
<parentCategory ref=" KnownIssueRollback_Server_2022" />
<supportedOn ref=" SUPPORTED_Windows_10_0_Server_2022_Only" />
<enabledList…> … </enabledList>
<disabledList…>…</disabledList>
</policy>
</policies>
Record the values for policy name
and parentCategory
. This information is in the policies
node at the end of the file.
B. Add custom configuration settings to ingest ADMX files
This configuration setting is used to install the policy on target devices. Follow these steps to add the ADMX ingestion settings:
In Configuration settings, select Add.
Enter the following properties:
Name: Enter a descriptive name for the configuration setting. Name your settings so you can identify them later. For example, "ADMX Ingestion: 04/30 Preview – Windows 10 21H2."
Description: Enter a description for the setting. This setting is optional but recommended.
OMA-URI: Enter the string ./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/KIR/Policy/<ADMX Policy Name>.
Note
Replace <ADMX Policy Name> with the value of the recorded policy name from the ADMX file. For example, " KB5034129_240124_0305_3_FeaturePreview ".
Data type: Select String.
Value: Open the ADMX file with a text editor (for example, Notepad). Copy and paste the entire contents of the ADMX file you intend to ingest into this field.
Select Save.
C. Add custom configuration settings to set the new velocity policy
This configuration setting is used to configure the preview policy, which is defined in the previous step.
Follow these steps to add the activation configuration settings:
In Configuration settings, select Add.
Enter the following properties:
Name: Enter a descriptive name for the configuration setting. Name your settings so you can identify them later. For example, "Velocity Preview: 04/30 Preview ###### – Windows 10 21H2."
Description: Enter a description for the setting. This setting is optional but recommended.
OMA-URI: Enter the string ./Device/Vendor/MSFT/Policy/Config/KIR~Policy~KnownIssueRollback~<Parent Category>/<ADMX Policy Name>.
Note
Replace <Parent Category> with the parent category string recorded in the previous step. For example, "KnownIssueRollback_Win_11". Replace <ADMX Policy Name> with the same policy name used in the previous step.
Data type: Select String.
Value: Enter <enabled/>.
Select Save.
Select Next.
D. Assign devices to the preview activation custom configuration profile
After you've defined what the custom configuration profile does, follow these steps to identify which devices you'll configure:
- In Assignments, select Add all devices.
- Select Next.
E. Review and create the preview activation custom configuration profile
Review the settings of your custom configuration profile and select Create.
3. Monitoring the preview
Follow these steps to monitor the configuration profile progress:
Go to Devices > Configuration profiles, and select an existing profile. For example, select a macOS profile.
Select the Overview tab. In this view, the Profile assignment status includes the following statuses:
- Succeeded: Policy is applied successfully.
- Error: The policy failed to apply. The message typically displays an error code that links to an explanation.
- Conflict: Two settings are applied to the same device, and Intune can't sort out the conflict. An administrator should review the conflict.
- Pending: The device hasn't checked in with Intune to receive the policy yet.
- Not applicable: The device can't receive the policy. For example, the policy updates a setting specific to Windows Server 2022, but the device is using Windows 11, version 23H2.
For more information, see Monitor device configuration profiles in Microsoft Intune.