[email protected]
  • Home
  • Team
  • Events
    • MC2MC Live: The Matrix of Innovation (22/05/2025)
    • MC2MC Live: Voyage to the Edge of the Cloud (26/06/2025)
    • Past events gallery
  • Speakers
    • Call for Speakers
    • Speaker information
  • Photos
  • Contact
  • Sponsors
  • About
    • Code of Conduct
    • Privacy Policy

Intune Patch My PC – Full Guide – Part 3

Posted on May 3, 2020
Tim H. posted a new blog post on his site Cloud-Boy.be.
This article will describe how to setup Intune Patch My PC. This will be a full guide! Because it was such a long blog post, I divided it in parts. Every part will be released day after day. Situation:
  • Azure AD Joined Intune managed devices
Target:
  • Implementing Patch My PC for 3rd party applications and 3rd party applications update management
Patch my PC’s mission is to simplify how enterprises create, manage, update, and deploy third-party applications within System Center Configuration Manager. Our solution is used by over 1,600 enterprises worldwide, helping to maintain applications on over 5 million devices. They also have a public preview running for integration with Intune. In my blog post we will go over this and set it up. You can find more info about Patch my PC on their website. Requirements for running Patch My PC Publishing service:
  • Microsoft .NET Framework 4.5
  • Supported Operating Systems
    • Windows Server 2008
    • Windows Server 2008
    • Windows Server 2012
    • Windows Server 2012
    • Windows Server 2016
    • Windows Server 2019
    • Windows 10 (x64) – Microsoft Intune only
Prerequisites for running Patch My PC Publishing service:
  • When using Windows Server operating systems, WSUS should be installed and configured.
  • If using Windows 10 client for Microsoft Intune only
    • Optional feature RSAT: Windows Server Updates Services Tools should be pre-installed

1. Configure the Patch My PC publishing Service

  • So, in our previous post (Intune Patch My PC – Full Guide – Part 2) we stopped at the moment where we completed our app registration in Azure AD. So let’s pick up here.
  • We copied our Application ID and Secret Password somewhere safe, we will need this in the following steps.
  • Go back to the Patch My PC Publishing Service and click on the ‘Intune Apps’ tab. Click the checkbox Automatically create Win32 application in Microsoft Intune.
  • Next, click the ‘Options’ button.
  • Copy your Tenant name (if you don’t know where to find it, go to endpoint.microsoft.com, click on ‘Tenant administration’, and you’ll find it under the ‘Tenant status’ blade.
  • Now we have all we need (Tenant name, Application ID & Application Secret Key). Paste them correctly in the Patch My PC Publishing Service. click ‘Test’ to validate we can successfully connect to your Intune tenant.
  • If all went well you’ll get the message that you’re ‘Succesfully connected to Intune’.

READ MORE..

Previous Post
Microsoft MVP Enterprise Mobility Award 2020 – 2021
Next Post
Intune Patch My PC – Full Guide – Part 4

Recent Posts

  • MC2MC Live: Jurassic Cloud Adventures (24/04/25) April 28, 2025
  • MC2MC Live: Cloudy with a Chance of Data (20/03/25) March 22, 2025
  • MC2MC Live: Forward to the Past (2024) December 23, 2024
  • MC2MC Live: The Cloud Strikes Back (2024) November 18, 2024
  • MC2MC Live: Safeguarding the Digital Frontier (2024) September 30, 2024

Categories

  • Autopilot (1)
  • Azure (29)
  • Azure AD (2)
  • Azure Virtual Desktop (2)
  • Big Data (1)
  • ConfigMgr (3)
  • Containers (2)
  • EMS (7)
  • GitHub (3)
  • Guides (6)
  • Hyper-V (1)
  • IaC (1)
  • Intune (20)
  • M365 (20)
  • MC2MC (39)
  • MC2MC Live (2)
  • MDATP (3)
  • PowerApps (3)
  • PowerAutomate (6)
  • PowerShell (4)
  • Security (10)
  • Veeam (1)
  • Visual Studio Code (1)
  • Viva (1)
  • Windows 10 (16)
  • Windows 11 (1)
  • Windows 365 (2)
  • Windows Autopilot (3)
  • Windows Server (1)
  • Windows Updates (1)
  • Windows365 (1)
  • Women In Tech (2)

RSS Jasper Bernaers

  • How a modern and secure workplace can help your organization become relevant
  • Actionable steps to decrease the risk of a Cyberattack
  • Cybersecurity in a remote connected world
  • Cybersecurity for local governments – in 10 steps

RSS Wim Matthyssen

  • Azure Arc: Keep your Azure Connected Machine agent up-to-date on a Windows Server
  • Azure Arc: Securely connect to an Azure Arc-enabled Windows Server with RDP over SSH
  • How to install OpenSSH on a Windows Server 2019/2022/2025 using a PowerShell script
  • PowerShell script: BgInfo deployment script for Windows Server 2025

RSS Tim De Keukelaere

  • How to configure RBAC permissions for available uninstall in Intune
  • WMUG NL Tuesdays – Latest and greatest in the world of Configuration Manager
  • Microsoft MVP 2020-2021 Award
  • A first look at the Configuration Manager Community Hub

RSS Micha Wets

  • AVD Client Cleanup script/tool
  • MSIX app attach Start Menu fixed in Windows Virtual Desktop
  • Windows Virtual Desktop Workshop December update
  • Windows Virtual Desktop Spring 2020 edition workshop

RSS Robbe Van den Daele

  • Detecting non-privileged Windows Hello abuse
  • MDE Device Discovery - Improving the monitored network page
  • Correlating Defender for Endpoint and Global Secure Access Logs
  • Parsing CEF messages without Azure Monitor Agent

© 2025 MC2MC vzw