Skip to content

Commit a8567ad

Browse files
authored
Merge pull request #91931 from v-rihow/automation-configure-windows-update
edit pass: automation-configure-windows-update
2 parents 40675dd + e62d56c commit a8567ad

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed
Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure Windows Update settings to work with Azure Update Management
3-
description: This article describes the Windows Update settings that you configure to work with Update Management
3+
description: This article describes the Windows Update settings that you configure to work with Azure Update Management.
44
services: automation
55
ms.service: automation
66
ms.subservice: update-management
@@ -12,13 +12,13 @@ manager: carmonm
1212
---
1313
# Configure Windows Update settings for Update Management
1414

15-
Update Management relies on Windows Update to download and install Windows Updates. As a result, we respect many of the settings used by Windows Update. If you use settings to enable non-Windows updates, Update Management will manage those updates as well. If you want to enable downloading updates before an update deployment occurs, update deployments can go faster and be less likely to exceed the maintenance window.
15+
Azure Update Management relies on Windows Update to download and install Windows updates. As a result, Update Management respects many of the settings used by Windows Update. If you use settings to enable non-Windows updates, Update Management will also manage those updates. If you want to enable downloading of updates before an update deployment occurs, update deployment can be faster, more efficient, and less likely to exceed the maintenance window.
1616

17-
## Pre download updates
17+
## Pre-download updates
1818

19-
To configure automatically downloading updates in Group Policy, you can set the [Configure Automatic Updates setting](/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates##configure-automatic-updates) to **3**. This downloads the updates needed in the background, but doesn't install them. This keeps Update Management in control of schedules but allow updates to download outside of the Update Management maintenance window. This can prevent **Maintenance window exceeded** errors in Update Management.
19+
To configure automatic downloading of updates in Group Policy, set the [Configure Automatic Updates setting](/windows-server/administration/windows-server-update-services/deploy/4-configure-group-policy-settings-for-automatic-updates##configure-automatic-updates) to **3**. This setting enables downloads of the required updates in the background, but it doesn't install them. In this way, Update Management remains in control of schedules, but updates can be downloaded outside the Update Management maintenance window. This behavior prevents "Maintenance window exceeded" errors in Update Management.
2020

21-
You can also set this with PowerShell, run the following PowerShell on a system that you want to auto-download updates.
21+
You can also turn on this setting by running the following PowerShell command on a system that you want to configure for auto-downloading of updates:
2222

2323
```powershell
2424
$WUSettings = (New-Object -com "Microsoft.Update.AutoUpdate").Settings
@@ -28,20 +28,20 @@ $WUSettings.Save()
2828

2929
## Disable automatic installation
3030

31-
Azure VMs have Automatic installation of updates enabled by default. This can cause updates to be installed before you schedule them to be installed by Update Management. You can disable this behavior by setting the `NoAutoUpdate` registry key to `1`. The following PowerShell snippet shows you one way to do this.
31+
By default on Azure virtual machines (VMs), automatic installation of updates is enabled. This might cause updates to be installed before you schedule them for installation by Update Management. You can disable this behavior by setting the `NoAutoUpdate` registry key to `1`. The following PowerShell snippet shows how to do this:
3232

3333
```powershell
3434
$AutoUpdatePath = "HKLM:SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU"
3535
Set-ItemProperty -Path $AutoUpdatePath -Name NoAutoUpdate -Value 1
3636
```
3737

38-
## Configure Reboot settings
38+
## Configure reboot settings
3939

40-
The Registry keys listed under [Configuring Automatic Updates by editing the registry](/windows/deployment/update/waas-wu-settings#configuring-automatic-updates-by-editing-the-rej7uijui7jgistry) and [Registry keys used to manage restart](/windows/deployment/update/waas-restart#registry-keys-used-to-manage-restart) can cause your machines to reboot, even if you have specified **Never Reboot** in the Update Deployment settings. You should configure these registry keys as desired for your environment.
40+
The registry keys listed in [Configuring Automatic Updates by editing the registry](/windows/deployment/update/waas-wu-settings#configuring-automatic-updates-by-editing-the-registry) and [Registry keys used to manage restart](/windows/deployment/update/waas-restart#registry-keys-used-to-manage-restart) can cause your machines to reboot, even if you specify **Never Reboot** in the **Update Deployment** settings. You should configure these registry keys to best suit your environment.
4141

4242
## Enable updates for other Microsoft products
4343

44-
By default, Windows Update only provides updates for Windows. If you enable **Give me updates for other Microsoft products when I update Windows**, you're provided with updates for other products, including security patches for SQL Server or other first party software. This option can't be configured by Group Policy. Run the following PowerShell on the systems that you wish to enable other first party patches on, and Update Management will honor this setting.
44+
By default, Windows Update provides updates only for Windows. If you enable the **Give me updates for other Microsoft products when I update Windows** setting, you also receive updates for other products, including security patches for Microsoft SQL Server and other Microsoft software. This option can't be configured by Group Policy. Run the following PowerShell command on the systems that you want to enable other Microsoft updates on. Update Management will comply with this setting.
4545

4646
```powershell
4747
$ServiceManager = (New-Object -com "Microsoft.Update.ServiceManager")
@@ -50,14 +50,14 @@ $ServiceID = "7971f918-a847-4430-9279-4a52d1efe18d"
5050
$ServiceManager.AddService2($ServiceId,7,"")
5151
```
5252

53-
## WSUS Configuration Settings
53+
## WSUS configuration settings
5454

55-
**Update Management** respects WSUS configuration settings. The list of WSUS settings you can configure for working with Update Management is listed below.
55+
Update Management complies with Windows Server Update Services (WSUS) settings. The WSUS settings you can configure for working with Update Management are listed below.
5656

5757
### Intranet Microsoft update service location
5858

59-
You can specify sources for scanning and downloading updates under [Intranet Microsoft Update Service Location](/windows/deployment/update/waas-wu-settings#specify-intranet-microsoft-update-service-location).
59+
You can specify sources for scanning and downloading updates under [Specify intranet Microsoft Update service location](/windows/deployment/update/waas-wu-settings#specify-intranet-microsoft-update-service-location).
6060

61-
## Next Steps
61+
## Next steps
6262

63-
After configuring Windows Update settings, you can schedule an Update Deployment by following the instructions under [Manage updates and patches for your Azure VMs](automation-tutorial-update-management.md)
63+
After you configure Windows Update settings, you can schedule an update deployment by following the instructions in [Manage updates and patches for your Azure VMs](automation-tutorial-update-management.md).

0 commit comments

Comments
 (0)