You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-center/configure-wu-agent.md
+27-1Lines changed: 27 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ The registry keys listed in [Configuring Automatic Updates by editing the regist
39
39
40
40
## Enable updates for other Microsoft products
41
41
42
-
By default, the Windows Update client is configured to provide updates only for Windows operating system. If you enable the **Give me updates for other Microsoft products when I update Windows**setting, you also receive updates for other Microsoft products, including security patches for Microsoft SQL Server and other Microsoft software.
42
+
By default, the Windows Update client is configured to provide updates only for Windows operating system. In Windows update, select **Check online for Windows updates**. It will check updates for other Microsoft products to enable the **Give me updates for other Microsoft products when I update Windows**to receive updates for other Microsoft products, including security patches for Microsoft SQL Server and other Microsoft software.
43
43
44
44
Use one of the following options to perform the settings change at scale:
45
45
@@ -54,6 +54,32 @@ Use one of the following options to perform the settings change at scale:
54
54
55
55
- For servers running Server 2016 or later which are not using Update Manager (preview) scheduled patching (that has the VM PatchSettings set to AutomaticByOS = Azure-Orchestrated) you can use Group Policy to control this by downloading and using the latest Group Policy [Administrative template files](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
56
56
57
+
58
+
## Configure a Windows server for Microsoft updates
59
+
60
+
The Windows update client on Windows servers can get their patches from either of the following Microsoft hosted patch repositories:
61
+
- Windows update - hosts operating system patches.
62
+
- Microsoft update - hosts operating system and other Microsoft patches. For example MS Office, SQL Server and so on.
63
+
64
+
> [!NOTE]
65
+
> For the application of patches, you can choose the update client at the time of installation, or later using Group policy or by directly editing the registry.
66
+
> To get the non-operating system Microsoft patches or to install only the OS patches, we recommend you to change the patch repository as this is an operating system setting and not an option that you can configure within Update management center (preview).
67
+
68
+
### Edit the registry
69
+
70
+
If scheduled patching is configured on your machine using the Update management center (preview), the Auto update on the client is disabled. To edit the registry and configure the setting, see [First party updates on Windows](support-matrix.md#first-party-updates-on-windows).
71
+
72
+
### Patching using group policy on Azure Update management
73
+
74
+
If your machine is patched using Automation Update management, and has Automatic updates enabled on the client, you can use the group policy to have complete control. To patch using group policy, follow these steps:
75
+
76
+
1. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Update** > **Manage end user experience**.
77
+
1. Select **Configure Automatic Updates**.
78
+
1. Select or deselect the **Install updates for other Microsoft products** option.
79
+
80
+
:::image type="content" source="./media/configure-wu-agent/configure-updates-group-policy-inline.png" alt-text="Screenshot of selection or deselection of install updates for other Microsoft products." lightbox="./media/configure-wu-agent/configure-updates-group-policy-expanded.png":::
81
+
82
+
57
83
## Make WSUS configuration settings
58
84
59
85
Update Manager (preview) supports WSUS settings. You can specify sources for scanning and downloading updates using instructions in [Specify intranet Microsoft Update service location](/windows/deployment/update/waas-wu-settings#specify-intranet-microsoft-update-service-location). By default, the Windows Update client is configured to download updates from Windows Update. When you specify a WSUS server as a source for your machines, the update deployment fails, if the updates aren't approved in WSUS.
Copy file name to clipboardExpand all lines: articles/update-center/view-updates.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,6 +101,7 @@ To check the updates on your machines at scale, follow these steps:
101
101
> [!NOTE]
102
102
> In update Manager (preview), you can initiate a software updates compliance scan on the machine to get the current list of operating system (guest) updates including the security and critical updates. On Windows, the software update scan is performed by the Windows Update Agent. On Linux, the software update scan is performed using OVAL-compatible tools to test for the presence of vulnerabilities based on the OVAL Definitions for that platform, which is retrieved from a local or remote repository.
0 commit comments