Add iOS software update policies in Intune

Software update policies let you force supervised iOS devices to automatically install the latest available OS update. When configuring a policy, you can add the days and times when you don't want devices to install an update.

This feature applies to:

  • iOS 10.3 and later (supervised)

The device checks in with Intune about every 8 hours. If an update is available, and it's not during a restricted time, then the device downloads and installs the latest OS update. There isn't any user interaction needed to update the device. The policy doesn't prevent a user from updating the OS manually.

Configure the policy

  1. Sign in to Intune.

  2. Select Software updates > Update policies for iOS > Create.

  3. Enter the following settings:

    • Name: Enter a name for your software updates policy. For example, enter iOS restricted update times.
    • Description: Enter a description for your policy. This setting is optional, but recommended.
  4. Select Settings > Configure. Enter the following settings:

    • Select times to prevent update installations: Specify a restricted time frame when updates aren't forcibly installed.

      • Overnight blocks aren't supported and might not function. For example, don't configure a policy with a Start time of 8 PM and an End time of 6 AM.
      • A policy that starts at 12 AM and ends at 12 AM is evaluated as 0 hours and not 24 hours, which results in no restriction.

      When setting the restricted timeframe, enter the following details:

      • Days: Choose the day(s) of week when updates aren't installed. For example, check Monday, Wednesday, and Friday to prevent updates from being installed on these days.
      • Time zone: Choose a time zone.
      • Start time: Choose the start time of the restricted time frame. For example, enter 5 AM so updates aren't installed starting at 5 AM.
      • End time: Choose the end time of the restricted time frame. For example, enter 1 AM so updates can be installed starting at 1 AM.
    • Delay visibility of software updates to end users with no change to scheduled updates (days):

      **If you want to delay the visibility of software updates for a specific amount of time on your supervised iOS devices, please configure those settings in Device Restrictions.

      [! Important]
      A policy that has a Start time and End time set to 12 AM is evaluated as 0 hours, and not 24 hours. This results in no restriction.

  5. Select OK > Create to save your changes, and create the policy.

The profile is created and shown in the policy list.

For guidance from the Intune support team, see Delay visibility of software updates in Intune for supervised devices.


Apple MDM doesn't allow you to force a device to install updates by a certain time or date.

Change the restricted times for the policy

  1. In Software updates, select Update policies for iOS.

  2. Choose an existing policy > Properties.

  3. Update the restricted time:

    1. Choose the days of the week
    2. Choose the time zone that this policy is applied
    3. Enter the start and end time for the blacklisted hours


    If the Start time and End time are both set to 12am, then Intune does not check for restrictions on when to install updates. This means than any configurations you have for Select times to prevent update installations are ignored, and updates can install at any time.

Assign the policy to users

Existing policies are assigned to groups, users, or devices. When assigned, the policy is applied.

  1. In Software updates, select Update policies for iOS.
  2. Choose an existing policy > Assignments.
  3. Select the Azure Active Directory groups, users, or devices to include or exclude from this policy.
  4. Choose Save to deploy the policy to your groups.

The devices used by the users targeted by the policy are evaluated for update compliance. This policy also supports userless devices.

Monitor device installation failures

Software updates > Installation failures for iOS devices shows a list of supervised iOS devices targeted by an update policy, attempted an update, and couldn't be updated. For each device, you can view the status on why the device hasn't been automatically updated. Healthy, up-to-date devices aren't shown in the list. "Up-to-date" devices include the latest update that the device itself supports.

Next steps

Assign the profile and monitor its status.