
No-Faffing Managed IT Support & Cyber Security Support. Made in Yorkshire, built for the UK.
In a recent YouTube video, Jonathan Edwards examines why Microsoft 365 does not automatically patch all applications on managed devices and showcases an alternative tool that fills the gap. The video opens with a clear problem statement: while Microsoft keeps its own apps updated, third-party software often falls outside that scope. Consequently, Edwards demonstrates a third-party solution and walks viewers through practical features that aim to simplify patch management for busy IT teams.
Edwards methodically shows the tool’s dashboard, key modules, and deployment patterns, and he uses real demos to make the point practical rather than theoretical. He highlights items such as inventory visibility, automated rollouts, and a large pre-packaged app library to illustrate how the product would operate in a live environment. Therefore, the video serves as both a diagnosis of a common operational gap and a hands-on introduction to a proposed remedy.
Edwards explains that Microsoft 365 primarily updates its own suite through a Click-to-Run mechanism, which is tailored to Office apps and managed update channels. As a result, this design does not extend to many third-party or legacy applications installed on endpoints, leaving a patching gap that can expose organizations to vulnerabilities. Moreover, the video notes that administrators often assume a single pane covers everything, but the reality is more fragmented.
He also reviews Microsoft’s recommended tools, such as Microsoft Endpoint Manager and Windows Update for Business, and stresses that while these platforms broaden coverage, they add complexity. For example, integrating Configuration Manager, Intune, and update rings demands careful policy planning and testing across diverse device types. Consequently, organizations face tradeoffs between depth of control, administrative overhead, and timely coverage when they rely on native Microsoft tooling alone.
In the demonstration, Edwards introduces Robopack and walks through its core elements, including Radar for inventory, Radar Tracking for devices outside conventional groups, an App Library of thousands of packages, and Patch Groups for consistent rollout patterns. He shows how the tool discovers app versions across devices and flags those that are out of date, which helps teams prioritize remediation. Furthermore, he highlights the ability to upload custom installers so teams can handle niche or in-house applications without manual packaging.
The video emphasizes practical workflows: admins can set one rollout pattern and apply it across many apps, and the product can retroactively patch users who were missed by initial deployments. Edwards notes that this is useful for MSPs managing multiple tenants as well as in-house IT teams seeking to reduce repetitive packaging work. Therefore, the tool’s automation aims to lower labor costs while increasing coverage, although it requires trust and validation before wide adoption.
Edwards gives a balanced view of tradeoffs. On one hand, third-party patch tools can speed remediation, provide broader app coverage, and relieve manual packaging burdens; on the other hand, they introduce new considerations around vendor trust, integration risk, and licensing costs. Consequently, IT leaders must weigh immediate gains in coverage against long-term vendor dependency and the complexity of another management plane.
He also discusses practical challenges such as testing updates in staged environments, managing bandwidth for large rollouts, and avoiding conflicts with existing update policies from Intune or group policy. Moreover, accurate inventory and reliable rollback mechanisms become essential when a third-party update inadvertently causes issues. Therefore, implementing a supplemental patching tool requires clear governance, robust testing procedures, and careful coordination with existing endpoint management policies.
Edwards recommends a measured approach: start with discovery to quantify the gap, then pilot targeted apps with clear rollback and monitoring rules. For many organizations, a hybrid strategy that uses native Microsoft tools for OS and core Office updates while employing a specialized tool for diverse third-party apps can balance control and coverage. This approach reduces immediate risk while preserving the benefits of established Microsoft workflows.
Finally, Edwards places the issue in broader context, noting upcoming platform lifecycle events and why a comprehensive strategy matters for security and compliance. He urges teams to pair any patching improvements with backup, testing, and training so that automation does not outpace governance. In sum, the video by Jonathan Edwards offers a clear-eyed appraisal of a common operational gap and a pragmatic look at one tool that seeks to close it, while also reminding viewers of the tradeoffs and responsibilities involved in adopting new management technologies.
Microsoft 365 patch limitations, third-party application patching, app patch management tool, Microsoft 365 can't patch apps, enterprise patch management solution, vulnerability remediation for apps, automated third-party patching, patching non-Microsoft apps