mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #7891 from mestew/driver-policy-edit
WUFB DS Driver policy edit
This commit is contained in:
commit
6c4f01ecee
@ -330,3 +330,8 @@ GET https://graph.microsoft.com/beta/admin/windows/updates/deployments?orderby=c
|
|||||||
|
|
||||||
<!--Using include for removing device enrollment-->
|
<!--Using include for removing device enrollment-->
|
||||||
[!INCLUDE [Graph Explorer enroll devices](./includes/wufb-deployment-graph-unenroll.md)]
|
[!INCLUDE [Graph Explorer enroll devices](./includes/wufb-deployment-graph-unenroll.md)]
|
||||||
|
|
||||||
|
## Policy considerations for drivers
|
||||||
|
|
||||||
|
<!--Using include for Policy considerations for drivers-->
|
||||||
|
[!INCLUDE [Windows Update for Business deployment service driver policy considerations](./includes/wufb-deployment-driver-policy-considerations.md)]
|
@ -42,7 +42,7 @@ Windows Update for Business deployment service supports Windows client devices o
|
|||||||
|
|
||||||
### Windows operating system updates
|
### Windows operating system updates
|
||||||
|
|
||||||
- Expediting updates requires the *Update Health Tools* on the clients. The tools are are installed starting with [KB 4023057](https://support.microsoft.com/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a). To confirm the presence of the Update Health Tools on a device:
|
- Expediting updates requires the *Update Health Tools* on the clients. The tools are installed starting with [KB 4023057](https://support.microsoft.com/topic/kb4023057-update-for-windows-10-update-service-components-fccad0ca-dc10-2e46-9ed1-7e392450fb3a). To confirm the presence of the Update Health Tools on a device:
|
||||||
- Look for the folder **C:\Program Files\Microsoft Update Health Tools** or review *Add Remove Programs* for **Microsoft Update Health Tools**.
|
- Look for the folder **C:\Program Files\Microsoft Update Health Tools** or review *Add Remove Programs* for **Microsoft Update Health Tools**.
|
||||||
- As an Admin, run the following PowerShell script: `Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -match "Microsoft Update Health Tools"}`
|
- As an Admin, run the following PowerShell script: `Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -match "Microsoft Update Health Tools"}`
|
||||||
|
|
||||||
@ -91,6 +91,12 @@ When you use [Windows Update for Business reports](wufb-reports-overview.md) in
|
|||||||
<!--Using include for deployment service limitations-->
|
<!--Using include for deployment service limitations-->
|
||||||
[!INCLUDE [Windows Update for Business deployment service limitations](./includes/wufb-deployment-limitations.md)]
|
[!INCLUDE [Windows Update for Business deployment service limitations](./includes/wufb-deployment-limitations.md)]
|
||||||
|
|
||||||
|
## Policy considerations for drivers
|
||||||
|
|
||||||
|
<!--Using include for Policy considerations for drivers-->
|
||||||
|
[!INCLUDE [Windows Update for Business deployment service driver policy considerations](./includes/wufb-deployment-driver-policy-considerations.md)]
|
||||||
|
|
||||||
|
|
||||||
## General tips for the deployment service
|
## General tips for the deployment service
|
||||||
|
|
||||||
Follow these suggestions for the best results with the service:
|
Follow these suggestions for the best results with the service:
|
||||||
|
@ -54,3 +54,8 @@ While expedite update deployments will override an update deferral for the updat
|
|||||||
|
|
||||||
<!--Using include for Update Health Tools log location-->
|
<!--Using include for Update Health Tools log location-->
|
||||||
[!INCLUDE [Windows Update for Business deployment service permissions using Graph Explorer](./includes/wufb-deployment-update-health-tools-logs.md)]
|
[!INCLUDE [Windows Update for Business deployment service permissions using Graph Explorer](./includes/wufb-deployment-update-health-tools-logs.md)]
|
||||||
|
|
||||||
|
## Policy considerations for drivers
|
||||||
|
|
||||||
|
<!--Using include for Policy considerations for drivers-->
|
||||||
|
[!INCLUDE [Windows Update for Business deployment service driver policy considerations](./includes/wufb-deployment-driver-policy-considerations.md)]
|
||||||
|
@ -0,0 +1,45 @@
|
|||||||
|
---
|
||||||
|
author: mestew
|
||||||
|
ms.author: mstewart
|
||||||
|
manager: aaroncz
|
||||||
|
ms.technology: itpro-updates
|
||||||
|
ms.prod: windows-client
|
||||||
|
ms.topic: include
|
||||||
|
ms.date: 02/14/2023
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
---
|
||||||
|
<!--This file is shared by deployment-service-drivers.md, deployment-service-troubleshoot.md, and the deployment-service-prerequisites.md articles. Headings may be driven by article context. 7512398 -->
|
||||||
|
|
||||||
|
It's possible for the service to receive content approval but the content doesn't get installed on the device because of a Group Policy, CSP, or registry setting on the device. In some cases, organizations specifically configure these policies to fit their current or future needs. For instance, organizations may want to review applicable driver content through the deployment service, but not allow installation. Configuring this sort of behavior can be useful, especially when transitioning management of driver updates due to changing organizational needs. The following list describes driver related update policies that can affect deployments through the deployment service:
|
||||||
|
|
||||||
|
### Policies that exclude drivers from Windows Update for a device
|
||||||
|
|
||||||
|
The following policies exclude drivers from Windows Update for a device:
|
||||||
|
|
||||||
|
- **Locations of policies that exclude drivers**:
|
||||||
|
- **Group Policy**: `\Windows Components\Windows Update\Do not include drivers with Windows Updates` set to `enabled`
|
||||||
|
- **CSP**: [ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update#excludewudriversinqualityupdate) set to `1`
|
||||||
|
- **Registry**: `HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\ExcludeWUDriversFromQualityUpdates` set to `1`
|
||||||
|
- **Intune**: [**Windows Drivers** update setting](/mem/intune/protect/windows-update-settings#update-settings) for the update ring set to `Allow`
|
||||||
|
|
||||||
|
**Behavior with the deployment service**: Devices with driver exclusion polices that are enrolled for **drivers** and added to an audience though the deployment service:
|
||||||
|
- Will display the applicable driver content in the deployment service
|
||||||
|
- Won't install drivers that are approved from the deployment service
|
||||||
|
- If drivers are deployed to a device that's blocking them, the deployment service displays the driver is being offered and reporting displays the install is pending.
|
||||||
|
|
||||||
|
### Policies that define the source for driver updates
|
||||||
|
|
||||||
|
The following policies define the source for driver updates as either Windows Update or Windows Server Update Service (WSUS):
|
||||||
|
|
||||||
|
- **Locations of policies that define an update source**:
|
||||||
|
- **Group Policy**: `\Windows Components\Windows Update\Manage updates offered from Windows Server Update Service\Specify source service for specific classes of Windows Updates` set to `enabled` with the `Driver Updates` option set to `Windows Update`
|
||||||
|
- **CSP**: [SetPolicyDrivenUpdateSourceForDriverUpdates](/windows/client-management/mdm/policy-csp-update#setpolicydrivenupdatesourcefordriverupdates) set to `0` for Windows Update as the source
|
||||||
|
- **Registry**: `HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\SetPolicyDrivenUpdateSourceForDriverUpdates` set to `0`. Under `\AU`, `UseUpdateClassPolicySource` also needs to be set to `1`
|
||||||
|
- **Intune**: Not applicable. Intune deploys updates using Windows Update for Business. [Co-managed clients from Configuration Manager](/mem/configmgr/comanage/overview?toc=/mem/configmgr/cloud-attach/toc.json&bc=/mem/configmgr/cloud-attach/breadcrumb/toc.json) with the workload for Windows Update policies set to Intune will also use Windows Update for Business.
|
||||||
|
|
||||||
|
**Behavior with the deployment service**: Devices with these update source policies that are enrolled for **drivers** and added to an audience though the deployment service:
|
||||||
|
- Will display the applicable driver content in the deployment service
|
||||||
|
- Will install drivers that are approved from the deployment service
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> When the scan source for drivers is set to WSUS, the deployment service doesn't get inventory events from devices. This means that the deployment service won't be able to report the applicability of a driver for the device.
|
@ -15,7 +15,7 @@ For this article, you'll use Graph Explorer to make requests to the [Microsoft G
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
>
|
>
|
||||||
> - Requests listed in this article require signing in with a Microsoft 365 account. If needed, a free one month trial is available for [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium).
|
> - Requests listed in this article require signing in with a Microsoft 365 account. If needed, a free one month trial is available for [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium).
|
||||||
> - Using a test tenant to verify the deployment process first is highly recommended. If you use a production tenant, ensure you verify which client devices you're targeting with deployments.
|
> - Using a test tenant to learn and verify the deployment process is highly recommended. Graph Explorer is intended to be a learning tool. Ensure you understand [granting consent](/graph/security-authorization) and the [consent type](/graph/api/resources/oauth2permissiongrant#properties) for Graph Explorer before proceeding.
|
||||||
|
|
||||||
1. From a browser, go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) and sign in using an Azure Active Directory (Azure AD) user account.
|
1. From a browser, go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) and sign in using an Azure Active Directory (Azure AD) user account.
|
||||||
1. You may need to enable the [`WindowsUpdates.ReadWrite.All` permission](/graph/permissions-reference#windows-updates-permissions) to use the queries in this article. To enable the permission:
|
1. You may need to enable the [`WindowsUpdates.ReadWrite.All` permission](/graph/permissions-reference#windows-updates-permissions) to use the queries in this article. To enable the permission:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user