Skip to content

Commit 0222887

Browse files
Merge pull request #105948 from MGoedtel/task1680583c
updated the cfg windows update article
2 parents 1536cee + e736e53 commit 0222887

File tree

2 files changed

+50
-18
lines changed

2 files changed

+50
-18
lines changed

articles/automation/automation-configure-windows-update.md

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,41 +3,41 @@ title: Configure Windows Update settings to work with Azure Update Management
33
description: This article describes the Windows Update settings that you configure to work with Azure Update Management.
44
services: automation
55
ms.subservice: update-management
6-
ms.date: 10/02/2019
6+
ms.date: 03/02/2020
77
ms.topic: conceptual
88
---
99
# Configure Windows Update settings for Update Management
1010

11-
Azure Update Management relies on Windows Update to download and install Windows updates. As a result, Update Management respects many of the settings used by Windows Update. If you use settings to enable non-Windows updates, Update Management will also manage those updates. If you want to enable downloading of updates before an update deployment occurs, update deployment can be faster, more efficient, and less likely to exceed the maintenance window.
11+
Azure Update Management relies on [Windows Update client](https://docs.microsoft.com//windows/deployment/update/windows-update-overview) to download and install Windows updates. There are specific settings that are used by the Windows Update client when connecting to Windows Server Update Services (WSUS) or Windows Update. Many of these settings can be managed with:
12+
13+
- Local Group Policy Editor
14+
- Group Policy
15+
- PowerShell
16+
- Directly editing the Registry
17+
18+
Update Management respects many of the settings specified to control the Windows Update client. If you use settings to enable non-Windows updates, Update Management will also manage those updates. If you want to enable downloading of updates before an update deployment occurs, update deployment can be faster, more efficient, and less likely to exceed the maintenance window.
1219

1320
## Pre-download updates
1421

15-
To configure automatic downloading of updates in Group Policy, set the [Configure Automatic Updates setting](/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates##configure-automatic-updates) to **3**. This setting enables downloads of the required updates in the background, but it doesn't install them. In this way, Update Management remains in control of schedules, but updates can be downloaded outside the Update Management maintenance window. This behavior prevents "Maintenance window exceeded" errors in Update Management.
22+
To configure automatic downloading of updates but don't automatically install them, you can use Group Policy to set the [Configure Automatic Updates setting](/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates##configure-automatic-updates) to **3**. This setting enables downloads of the required updates in the background, and notifies you that the updates are ready to install. In this way, Update Management remains in control of schedules, but updates can be downloaded outside the Update Management maintenance window. This behavior prevents **Maintenance window exceeded** errors in Update Management.
1623

17-
You can also turn on this setting by running the following PowerShell command on a system that you want to configure for auto-downloading of updates:
24+
You can enable this setting setting using PowerShell, by running the following command:
1825

1926
```powershell
2027
$WUSettings = (New-Object -com "Microsoft.Update.AutoUpdate").Settings
2128
$WUSettings.NotificationLevel = 3
2229
$WUSettings.Save()
2330
```
2431

25-
## Disable automatic installation
26-
27-
By default on Azure virtual machines (VMs), automatic installation of updates is enabled. This might cause updates to be installed before you schedule them for installation by Update Management. You can disable this behavior by setting the `NoAutoUpdate` registry key to `1`. The following PowerShell snippet shows how to do this:
28-
29-
```powershell
30-
$AutoUpdatePath = "HKLM:SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU"
31-
Set-ItemProperty -Path $AutoUpdatePath -Name NoAutoUpdate -Value 1
32-
```
33-
3432
## Configure reboot settings
3533

36-
The registry keys listed in [Configuring Automatic Updates by editing the registry](/windows/deployment/update/waas-wu-settings#configuring-automatic-updates-by-editing-the-registry) and [Registry keys used to manage restart](/windows/deployment/update/waas-restart#registry-keys-used-to-manage-restart) can cause your machines to reboot, even if you specify **Never Reboot** in the **Update Deployment** settings. You should configure these registry keys to best suit your environment.
34+
The registry keys listed in [Configuring Automatic Updates by editing the registry](/windows/deployment/update/waas-wu-settings#configuring-automatic-updates-by-editing-the-registry) and [Registry keys used to manage restart](/windows/deployment/update/waas-restart#registry-keys-used-to-manage-restart) can cause your machines to reboot, even if you specify **Never Reboot** in the **Update Deployment** settings. Configure these registry keys to best suit your environment.
3735

3836
## Enable updates for other Microsoft products
3937

40-
By default, Windows Update provides updates only for Windows. If you enable the **Give me updates for other Microsoft products when I update Windows** setting, you also receive updates for other products, including security patches for Microsoft SQL Server and other Microsoft software. This option can't be configured by Group Policy. Run the following PowerShell command on the systems that you want to enable other Microsoft updates on. Update Management will comply with this setting.
38+
By default, Windows Update client is configured to provide updates only for Windows. If you enable the **Give me updates for other Microsoft products when I update Windows** setting, you also receive updates for other products, including security patches for Microsoft SQL Server and other Microsoft software. This option can be configured if you have downloaded and copied the latest [Administrative template files](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) available for Windows 2016 and higher.
39+
40+
If you are running Windows Server 2012 R2, this setting cannot be configured by Group Policy. Run the following PowerShell command on those machines. Update Management complies with this setting.
4141

4242
```powershell
4343
$ServiceManager = (New-Object -com "Microsoft.Update.ServiceManager")
@@ -48,11 +48,13 @@ $ServiceManager.AddService2($ServiceId,7,"")
4848

4949
## WSUS configuration settings
5050

51-
Update Management complies with Windows Server Update Services (WSUS) settings. The WSUS settings you can configure for working with Update Management are listed below.
51+
Update Management supports WSUS settings. The WSUS settings you can configure for working with Update Management are listed below.
5252

5353
### Intranet Microsoft update service location
5454

55-
You can specify sources for scanning and downloading updates under [Specify intranet Microsoft Update service location](/windows/deployment/update/waas-wu-settings#specify-intranet-microsoft-update-service-location).
55+
You can specify sources for scanning and downloading updates under [Specify intranet Microsoft Update service location](/windows/deployment/update/waas-wu-settings#specify-intranet-microsoft-update-service-location). By default, Windows Update client is configured to download updates from Windows Update. When you specify a WSUS server as a source for your machines, if the updates aren't approved in WSUS, update deployment fails.
56+
57+
To restrict machines to just that internal update service, configure [Do not connect to any Windows Update Internet locations](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates#do-not-connect-to-any-windows-update-internet-locations).
5658

5759
## Next steps
5860

articles/automation/troubleshoot/update-management.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to troubleshoot and resolve issues with the Update Manage
44
services: automation
55
author: mgoedtel
66
ms.author: magoedte
7-
ms.date: 05/31/2019
7+
ms.date: 03/02/2020
88
ms.topic: conceptual
99
ms.service: automation
1010
manager: carmonm
@@ -19,6 +19,36 @@ If you encounter issues while you're trying to onboard the solution on a virtual
1919

2020
The following section highlights specific error messages and possible resolutions for each. For other onboarding issues see [Troubleshoot solution onboarding](onboarding.md).
2121

22+
## Scenario: Superseded update indicated as missing in Update Management
23+
24+
### Issue
25+
26+
Old updates are appearing in Update Management in the Azure Account as missing even though they have been superseded. A superseded update is one that doesn't have to be installed because a later update that corrects the same vulnerability is available. Update Management ignores the superseded update and makes it not applicable in favor of the superseding update. For information about a related issue, see [Update is superseded](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#the-update-is-not-applicable-to-your-computer).
27+
28+
### Cause
29+
30+
Superseded updates are not being correctly indicated as declined so that they can be considered not applicable.
31+
32+
### Resolution
33+
34+
When a superseded update becomes 100 percent not applicable, you should change the approval state of that update to **Declined**. To do this for all your updates:
35+
36+
1. In the Automation Account, select **Update Management** to view machine status. See [View update assessments](../manage-update-multi.md#view-an-update-assessment).
37+
38+
2. Check the superseded update to make sure that it is 100 percent not applicable.
39+
40+
3. Mark the update as declined unless you have a question about the update.
41+
42+
4. Select Computers and, in the Compliance column, force a rescan for compliance. See [Manage updates for multiple machines](../manage-update-multi.md).
43+
44+
5. Repeat the steps above for other superseded updates.
45+
46+
6. Run the cleanup wizard to delete files from the declined updates.
47+
48+
7. For WSUS, manually clean all superseded updates to refresh the infrastructure.
49+
50+
8. Repeat this procedure regularly to correct the display issue and minimize the amount of disk space used for update management.
51+
2252
## <a name="nologs"></a>Scenario: Machines don't show up in the portal under Update Management
2353

2454
### Issue

0 commit comments

Comments
 (0)