Skip to content

Commit 9e807e5

Browse files
authored
Merge pull request #245031 from SnehaSudhirG/14July-WindowsUpdateUMC
Added info and provided the ref links
2 parents 8546832 + 7310b60 commit 9e807e5

File tree

4 files changed

+28
-1
lines changed

4 files changed

+28
-1
lines changed

articles/update-center/configure-wu-agent.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The registry keys listed in [Configuring Automatic Updates by editing the regist
3939

4040
## Enable updates for other Microsoft products
4141

42-
By default, the Windows Update client is configured to provide updates only for Windows operating system. If you enable the **Give me updates for other Microsoft products when I update Windows** setting, you also receive updates for other Microsoft products, including security patches for Microsoft SQL Server and other Microsoft software.
42+
By default, the Windows Update client is configured to provide updates only for Windows operating system. In Windows update, select **Check online for Windows updates**. It will check updates for other Microsoft products to enable the **Give me updates for other Microsoft products when I update Windows** to receive updates for other Microsoft products, including security patches for Microsoft SQL Server and other Microsoft software.
4343

4444
Use one of the following options to perform the settings change at scale:
4545

@@ -54,6 +54,32 @@ Use one of the following options to perform the settings change at scale:
5454
5555
- For servers running Server 2016 or later which are not using Update Manager (preview) scheduled patching (that has the VM PatchSettings set to AutomaticByOS = Azure-Orchestrated) you can use Group Policy to control this by downloading and using the latest Group Policy [Administrative template files](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
5656
57+
58+
## Configure a Windows server for Microsoft updates
59+
60+
The Windows update client on Windows servers can get their patches from either of the following Microsoft hosted patch repositories:
61+
- Windows update - hosts operating system patches.
62+
- Microsoft update - hosts operating system and other Microsoft patches. For example MS Office, SQL Server and so on.
63+
64+
> [!NOTE]
65+
> For the application of patches, you can choose the update client at the time of installation, or later using Group policy or by directly editing the registry.
66+
> To get the non-operating system Microsoft patches or to install only the OS patches, we recommend you to change the patch repository as this is an operating system setting and not an option that you can configure within Update management center (preview).
67+
68+
### Edit the registry
69+
70+
If scheduled patching is configured on your machine using the Update management center (preview), the Auto update on the client is disabled. To edit the registry and configure the setting, see [First party updates on Windows](support-matrix.md#first-party-updates-on-windows).
71+
72+
### Patching using group policy on Azure Update management
73+
74+
If your machine is patched using Automation Update management, and has Automatic updates enabled on the client, you can use the group policy to have complete control. To patch using group policy, follow these steps:
75+
76+
1. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Update** > **Manage end user experience**.
77+
1. Select **Configure Automatic Updates**.
78+
1. Select or deselect the **Install updates for other Microsoft products** option.
79+
80+
:::image type="content" source="./media/configure-wu-agent/configure-updates-group-policy-inline.png" alt-text="Screenshot of selection or deselection of install updates for other Microsoft products." lightbox="./media/configure-wu-agent/configure-updates-group-policy-expanded.png":::
81+
82+
5783
## Make WSUS configuration settings
5884
5985
Update Manager (preview) supports WSUS settings. You can specify sources for scanning and downloading updates using instructions in [Specify intranet Microsoft Update service location](/windows/deployment/update/waas-wu-settings#specify-intranet-microsoft-update-service-location). By default, the Windows Update client is configured to download updates from Windows Update. When you specify a WSUS server as a source for your machines, the update deployment fails, if the updates aren't approved in WSUS.
953 KB
Loading
953 KB
Loading

articles/update-center/view-updates.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,7 @@ To check the updates on your machines at scale, follow these steps:
101101
> [!NOTE]
102102
> In update Manager (preview), you can initiate a software updates compliance scan on the machine to get the current list of operating system (guest) updates including the security and critical updates. On Windows, the software update scan is performed by the Windows Update Agent. On Linux, the software update scan is performed using OVAL-compatible tools to test for the presence of vulnerabilities based on the OVAL Definitions for that platform, which is retrieved from a local or remote repository.
103103
104+
104105

105106
## Next steps
106107

0 commit comments

Comments
 (0)