windows-itpro-docs/windows/deployment/update/update-compliance-configuration-manual.md

8.2 KiB

title, ms.reviewer, manager, description, keywords, ms.prod, ms.mktglfcycl, ms.pagetype, audience, author, ms.author, ms.localizationpriority, ms.collection, ms.topic
title ms.reviewer manager description keywords ms.prod ms.mktglfcycl ms.pagetype audience author ms.author ms.localizationpriority ms.collection ms.topic
Manually configuring devices for Update Compliance laurawi Manually configuring devices for Update Compliance update compliance, oms, operations management suite, prerequisites, requirements, updates, upgrades, antivirus, antimalware, signature, log analytics, wdav w10 deploy deploy itpro jaimeo jaimeo medium M365-analytics article

Manually Configuring Devices for Update Compliance

Applies to

  • Windows 10
  • Windows 11

Note

As of May 10, 2021, a new policy is required to use Update Compliance: "Allow Update Compliance Processing." For more details, see the Mobile Device Management policies and Group policies tables.

There are a number of requirements to consider when manually configuring devices for Update Compliance. These can potentially change with newer versions of Windows client. The Update Compliance Configuration Script will be updated when any configuration requirements change so only a redeployment of the script will be required.

The requirements are separated into different categories:

  1. Ensuring the required policies for Update Compliance are correctly configured.
  2. Devices in every network topography must send data to the required endpoints for Update Compliance. For example, devices in both main and satellite offices, which might have different network configurations must be able to reach the endpoints.
  3. Ensure Required Windows services are running or are scheduled to run. It is recommended all Microsoft and Windows services are set to their out-of-box defaults to ensure proper functionality.

Required policies

Update Compliance has a number of policies that must be appropriately configured in order for devices to be processed by Microsoft and visible in Update Compliance. They are enumerated below, separated by whether the policies will be configured via Mobile Device Management (MDM) or Group Policy. For both tables:

  • Policy corresponds to the location and name of the policy.
  • Value Indicates what value the policy must be set to. Update Compliance requires at least Basic (or Required) diagnostic data, but can function off Enhanced or Full (or Optional).
  • Function details why the policy is required and what function it serves for Update Compliance. It will also detail a minimum version the policy is required, if any.

Mobile Device Management policies

Each MDM Policy links to its documentation in the CSP hierarchy, providing its exact location in the hierarchy and more details.

Policy Data type Value Function
Provider/ProviderID/CommercialID String Your CommercialID Identifies the device as belonging to your organization.
System/AllowTelemetry Integer 1 - Basic Configures the maximum allowed diagnostic data to be sent to Microsoft. Individual users can still set this value lower than what the policy defines. For more information, see the following policy.
System/ConfigureTelemetryOptInSettingsUx Integer 1 - Disable Telemetry opt-in Settings (in Windows 10, version 1803 and later) Determines whether users of the device can adjust diagnostic data to levels lower than the level defined by AllowTelemetry. We recommend that you disable this policy or the effective diagnostic data level on devices might not be sufficient.
System/AllowDeviceNameInDiagnosticData Integer 1 - Allowed Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or set to 0 (Disabled), Device Name will not be sent and will not be visible in Update Compliance, showing # instead.
System/AllowUpdateComplianceProcessing Integer 16 - Allowed Enables data flow through Update Compliance's data processing system and indicates a device's explicit enrollment to the service.

Group policies

All Group policies that need to be configured for Update Compliance are under Computer Configuration>Administrative Templates>Windows Components\Data Collection and Preview Builds. All of these policies must be in the Enabled state and set to the defined Value below.

Policy Value Function
Configure the Commercial ID Your CommercialID Identifies the device as belonging to your organization.
Allow Telemetry 1 - Basic Configures the maximum allowed diagnostic data to be sent to Microsoft. Individual users can still set this value lower than what the policy defines. See the following policy for more information.
Configure telemetry opt-in setting user interface 1 - Disable diagnostic data opt-in Settings (in Windows 10, version 1803 and later) Determines whether users of the device can adjust diagnostic data to levels lower than the level defined by AllowTelemetry. We recommend that you disable this policy, otherwise the effective diagnostic data level on devices might not be sufficient.
Allow device name to be sent in Windows diagnostic data 1 - Enabled Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or Disabled, Device Name will not be sent and will not be visible in Update Compliance, showing # instead.
Allow Update Compliance processing 16 - Enabled Enables data flow through Update Compliance's data processing system and indicates a device's explicit enrollment to the service.

Required endpoints

To enable data sharing between devices, your network, and Microsoft's Diagnostic Data Service, configure your proxy to allow devices to contact the below endpoints.

Endpoint Function
https://v10c.events.data.microsoft.com Connected User Experience and Diagnostic component endpoint for Windows 10, version 1803 and later. DeviceCensus.exe must run on a regular cadence and contact this endpoint in order to receive the majority of WaaSUpdateStatus information for Update Compliance.
https://v10.vortex-win.data.microsoft.com Connected User Experience and Diagnostic component endpoint for Windows 10, version 1709 or earlier.
https://settings-win.data.microsoft.com Required for Windows Update functionality.
http://adl.windows.com Required for Windows Update functionality.
https://watson.telemetry.microsoft.com Windows Error Reporting (WER), used to provide more advanced error reporting if certain Feature Update deployment failures occur.
https://oca.telemetry.microsoft.com Online Crash Analysis, used to provide device-specific recommendations and detailed errors in the event of certain crashes.
https://login.live.com This endpoint facilitates MSA access and is required to create the primary identifier we use for devices. Without this service, devices will not be visible in the solution. The Microsoft Account Sign-in Assistant service must also be running (wlidsvc).

Required services

Many Windows and Microsoft services are required to ensure that not only the device can function, but Update Compliance can see device data. It is recommended that you allow all default services from the out-of-box experience to remain running. The Update Compliance Configuration Script checks whether the majority of these services are running or are allowed to run automatically.