mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
added a WU-settings topic
This commit is contained in:
parent
91c0d61985
commit
981a56afb6
159
windows/deployment/update/waas-wu-settings.md
Normal file
159
windows/deployment/update/waas-wu-settings.md
Normal file
@ -0,0 +1,159 @@
|
|||||||
|
---
|
||||||
|
title: Manage additional Windows Update settings (Windows 10)
|
||||||
|
description: Additional settings to control the behavior of Windows Update (WU) in Windows 10
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
author: DaniHalfin
|
||||||
|
localizationpriority: high
|
||||||
|
---
|
||||||
|
|
||||||
|
# Manage additional Windows Update settings
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> **Looking for consumer information?** See [Windows Update: FAQ](https://support.microsoft.com/help/12373/windows-update-faq)
|
||||||
|
|
||||||
|
You can use Group Policy settings or mobile device management (MDM) to configure the behavior of Windows Update (WU) on your Windows 10 devices. You can configure the update detection frequenct, select when updates are recieved, specify the update service location and more.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>In Windows 10, any Group Policy user configuration settings for Windows Update were deprecated and are no longer supported on this platform.
|
||||||
|
|
||||||
|
## Summary of Windows Update settings
|
||||||
|
|
||||||
|
| Group Policy setting | MDM setting | Supported from version |
|
||||||
|
| --- | --- | --- |
|
||||||
|
| [Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location) | [UpdateServiceUrl](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-updateserviceurl) and [UpdateServiceUrlAlternate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-updateserviceurlalternate) | |
|
||||||
|
| [Automatic Updates Detection Frequency](#automatic-updates-detection-frequency) | [DetectionFrequency](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-detectionfrequency) | 1703 |
|
||||||
|
| [Remove access to use all Windows Update features](#remove-access-to-use-all-windows-update-features) | | |
|
||||||
|
| [Do not connect to any Windows Update Internet locations](#do-not-connect-to-any-windows-update-internet-locations) | | |
|
||||||
|
| [Enable client-side targeting](#enable-client-side-targeting) | | |
|
||||||
|
| [Allow signed updates from an intranet Microsoft update service location](#allow-signed-updates-from-an-intranet-microsoft-update-service-location) | [AllowNonMicrosoftSignedUpdate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allownonmicrosoftsignedupdate) | |
|
||||||
|
| [Do not include drivers with Windows Updates](#do-not-include-drivers-with-windows-updates) | [ExcludeWUDriversInQualityUpdate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-excludewudriversinqualityupdate) | 1607 |
|
||||||
|
| [Configure Automatic Updates](#configure-automatic-updates) | [AllowAutoUpdate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allowautoupdate) | |
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Additional information about settings to manage device restarts and restart notifications for updates is available on [Manage device restarts after updates](waas-restart.md).
|
||||||
|
|
||||||
|
|
||||||
|
## Scanning for updates
|
||||||
|
|
||||||
|
TODO: Story
|
||||||
|
|
||||||
|
For additional settings that configure when Feature and Quality updates are received, see [Configure Windows Update for Business](waas-configure-wufb.md).
|
||||||
|
|
||||||
|
### Specify Intranet Microsoft update service location
|
||||||
|
|
||||||
|
Specifies an intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network.
|
||||||
|
This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network.
|
||||||
|
|
||||||
|
To use this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Specify Intranet Microsoft update service location**. You must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update Agent to download updates from an alternate download server instead of the intranet update service.
|
||||||
|
|
||||||
|
If the setting is set to *Enabled*, the Automatic Updates client connects to the specified intranet Microsoft update service (or alternate download server), instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don’t have to go through a firewall to get updates, and it gives you the opportunity to test updates after deploying them.
|
||||||
|
If the setting is set to *Disabled* or *Not Configured*, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.
|
||||||
|
|
||||||
|
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.
|
||||||
|
The option to download files with missing Urls allows content to be downloaded from the Alternate Download Server when there are no download Urls for files in the update metadata. This option should only be used when the intranet update service does not provide download Urls in the update metadata for files which are present on the alternate download server.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If the "Configure Automatic Updates" policy is disabled, then this policy has no effect.
|
||||||
|
>
|
||||||
|
>If the "Alternate Download Server" is not set, it will use the intranet update service by default to download updates.
|
||||||
|
>
|
||||||
|
>The option to "Download files with no Url..." is only used if the "Alternate Download Server" is set.
|
||||||
|
|
||||||
|
To configure this policy with MDM, use [UpdateServiceUrl](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-updateserviceurl) and [UpdateServiceUrlAlternate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-updateserviceurlalternate).
|
||||||
|
|
||||||
|
|
||||||
|
### Automatic Updates detection frequency
|
||||||
|
|
||||||
|
Specifies the hours that Windows will use to determine how long to wait before checking for available updates. The exact wait time is determined by using the hours specified here minus zero to twenty percent of the hours specified. For example, if this policy is used to specify a 20-hour detection frequency, then all clients to which this policy is applied will check for updates anywhere between 16 to 20 hours.
|
||||||
|
|
||||||
|
To set this setting with Group Policy, navigate to **Computer Configuration\Administrative Templates\Windows Components\Windows Update\Automatic Updates detection frequency**.
|
||||||
|
|
||||||
|
If the setting is set to *Enabled*, Windows will check for available updates at the specified interval.
|
||||||
|
If the setting is set to *Disabled* or *Not Configured*, Windows will check for available updates at the default interval of 22 hours.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The “Specify intranet Microsoft update service location” setting must be enabled for this policy to have effect.
|
||||||
|
>
|
||||||
|
>If the “Configure Automatic Updates” policy is disabled, this policy has no effect.
|
||||||
|
|
||||||
|
To configure this policy with MDM, use [DetectionFrequency](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-detectionfrequency).
|
||||||
|
|
||||||
|
|
||||||
|
### Remove access to use all Windows Update features
|
||||||
|
|
||||||
|
By enabling the Group Policy setting under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features**, administrators can disable the "Check for updates" option for users. Any background update scans, downloads and installations will continue to work as configured.
|
||||||
|
|
||||||
|
### Do not connect to any Windows Update Internet locations
|
||||||
|
|
||||||
|
Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store.
|
||||||
|
|
||||||
|
Use **Computer Configuration\Administrative Templates\Windows Components\Windows update\Do not connect to any Windows Update Internet locations** to enable this policy. When enabled, this policy will disable the functionality discribed above, and may cause connection to public services such as the Microsoft Store, Windows Update for Business and Delivery Optimization to stop working.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>This policy applies only when the device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy.
|
||||||
|
|
||||||
|
### Enable client-side targeting
|
||||||
|
|
||||||
|
Specifies the target group name or names that should be used to receive updates from an intranet Microsoft update service.
|
||||||
|
|
||||||
|
This Group Policy setting can be found under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Enable client-side targeting**.
|
||||||
|
If the setting is set to *Enabled*, the specified target group information is sent to the intranet Microsoft update service which uses it to determine which updates should be deployed to this computer.
|
||||||
|
If the setting is set to *Disabled* or *Not Configured*, no target group information will be sent to the intranet Microsoft update service.
|
||||||
|
|
||||||
|
If the intranet Microsoft update service supports multiple target groups this policy can specify multiple group names separated by semicolons. Otherwise, a single group must be specified.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>This policy applies only when the intranet Microsoft update service the device is directed to is configured to support client-side targeting. If the “Specify intranet Microsoft update service location” policy is disabled or not configured, this policy has no effect.
|
||||||
|
|
||||||
|
**TODO: Which services support this feature**
|
||||||
|
|
||||||
|
### Allow signed updates from an intranet Microsoft update service location
|
||||||
|
|
||||||
|
This policy setting allows you to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location.
|
||||||
|
|
||||||
|
To configure this setting in Group Policy, go to **Computer Configuration\Administrative Templates\Windows Components\Windows update\Allow signed updates from an intranet Microsoft update service location**.
|
||||||
|
|
||||||
|
If you enable this policy setting, Automatic Updates accepts updates received through an intranet Microsoft update service location, as specified by **[Specify Intranet Microsoft update service location](#specify-intranet-microsoft-update-service-location)**, if they are signed by a certificate found in the “Trusted Publishers” certificate store of the local computer.
|
||||||
|
If you disable or do not configure this policy setting, updates from an intranet Microsoft update service location must be signed by Microsoft.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Updates from a service other than an intranet Microsoft update service must always be signed by Microsoft and are not affected by this policy setting.
|
||||||
|
|
||||||
|
To configure this policy with MDM, use [AllowNonMicrosoftSignedUpdate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allownonmicrosoftsignedupdate).
|
||||||
|
|
||||||
|
## Installing updates
|
||||||
|
|
||||||
|
TODO: Story
|
||||||
|
|
||||||
|
### Do not include drivers with Windows Updates
|
||||||
|
|
||||||
|
Allows admins to exlucde Windows Update (WU) drivers during updates.
|
||||||
|
|
||||||
|
To configure this setting in Group Policy, use **Computer Configuration\Administrative Templates\Windows Components\Windows update\Do not include drivers with Windows Updates**.
|
||||||
|
Enable this policy to not include drivers with Windows quality updates.
|
||||||
|
If you disable or do not configure this policy, Windows Update will include updates that have a Driver classification.
|
||||||
|
|
||||||
|
### Configure Automatic Updates
|
||||||
|
|
||||||
|
Enables the IT admin to manage automatic update behavior to scan, download, and install updates.
|
||||||
|
|
||||||
|
When enabling this setting through Group Policy, under **Computer Configuration\Administrative Templates\Windows Components\Windows update\Configure Automatic Updates**, you must select one of the four options:
|
||||||
|
|
||||||
|
**2 - Notify for download and auto install** - When Windows finds updates that apply to this device, users will be notified that updates are ready to be downloaded. After going to **Settings > Update & security > Windows Update**, users can download and install any available updates.
|
||||||
|
|
||||||
|
**3 - Auto download and notify for Install** - Windows finds updates that apply to the device and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to **Settings > Update & security > Windows Update**, users can install them.
|
||||||
|
|
||||||
|
**4 - Auto download and schedule the instal** - Specify the schedule using the options in the Group Policy Setting. For more informationa about this setting, see [Schedule update installation](waas-restart,md#schedule-update-installation).
|
||||||
|
|
||||||
|
**5 - Allow local admin to choose setting** - With this option, local administrators will be allowed to use the settings app to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates.
|
||||||
|
|
||||||
|
If this setting is set to *Disabled*, any updates that are available on Windows Update must be downloaded and installed manually. To do this, users must go to **Settings > Update & security > Windows Update**.
|
||||||
|
|
||||||
|
If this setting is set to *Not Configured*, an administrator can still configure Automatic Updates through the settings app, under **Settings > Update & security > Windows Update > Advanced options**.
|
Loading…
x
Reference in New Issue
Block a user