Group policy windows update policy

Для централизованной настройки параметров получения и установки обновлений на рабочих станциях и серверах Windows можно использовать групповые политики. В этой статье мы рассмотрим базовые параметры GPO, которые позволяют управлять установкой обновлений на компьютерах, получающих обновления от локального сервера WSUS или напрямую с серверов Windows Update в интернете.

Содержание:

  • Настройка параметров получения обновлений клиентам WSUS через GPO
  • Назначить групповые политики WSUS на OU с компьютерами
  • Применение групповых политик Windows Update на клиентах
  • GPO для получения и установки обновлений Windows Update через Интернет

Настройка параметров получения обновлений клиентам WSUS через GPO

Если у вас развернут собственный сервер обновлений Windows Server Update Services (WSUS), вы должны настроить рабочие стации и сервера в вашем домене AD для получения обновлений с него (а не с серверов Microsoft Update через Интернет).

В нашем случае мы хотим создать две разные политики установки обновлений для рабочих станций и серверов. Для этого откройте консоль управления WSUS (
wsus.msc
) на сервере и создайте в разделе Computers -> All Computers две группы компьютеров:

  • Workstations
  • Servers

Затем перейдите в раздел настройки сервера WSUS (Options), и в параметре Computers измените значение Use Group Policy or registry setting on computers (Использовать на компьютерах групповую политику или параметры реестра).

Настройка параметров клиентов wsus через GPO

Эта опция включает client side targeting для клиентов WSUS (таргетинг на стороне клиента). Благодаря этому вы сможете автоматически распределить компьютеры по группам обновлений в консоли WSUS по специальной метке в реестре клиента (такая метка создается через GPO или напрямую в реестре.

Теперь откройте консоль управления доменные групповыми политиками (Group Policy Management) и создайте две новые групповые политики: ServerWSUSPolicy и WorkstationWSUSPolicy.

Начнем с описания серверной политики ServerWSUSPolicy.

Настройки параметров службы обновлений Windows, находятся в разделе GPO: Computer Configuration -> Policies-> Administrative templates-> Windows Component-> Windows Update (Конфигурация компьютера -> Административные шаблоны -> Компоненты Windows -> Центр обновления Windows).

групповая политика для настройки wsus клиентов

Мы хотим, чтобы продуктивные сервера не устанавливали обновления автоматически и не перезагружались без подтверждения администратора. Для этого настроим GPO так, чтобы сервера автоматически скачивали доступные обновления, но не устанавливали их. Администраторы будут запускать установку обновлений вручную (из панели управления или с помощью модуля PSWindowsUpdate) в согласованные окна обслуживания.

Настроим следующие параметры политики:

  • Configure Automatic Updates (Настройка автоматического обновления):
    Enable
    .
    3 – Auto download and notify for install
    (Автоматически загружать обновления и уведомлять об их готовности к установке) – клиент автоматически скачивает новые обновлений и оповещает об их наличии;
  • Specify Intranet Microsoft update service location (Указать размещение службы обновлений Майкрософт в интрасети): Enable. Set the intranet update service for detecting updates (Укажите службу обновлений в интрасети для поиска обновлений):
    http://srv-wsus.winitpro.ru:8530
    , Set the intranet statistics server (Укажите сервер статистики в интрасети):
    http://srv-wsus.winitpro.ru:8530
    – здесь нужно указать адрес вашего сервера WSUS и сервера статистики (обычно они совпадают);
  • No auto-restart with logged on users for scheduled automatic updates installations (Не выполнять автоматическую перезагрузку при автоматической установке обновлений, если в системе работают пользователя):
    Enable
    – запретить автоматическую перезагрузку при наличии сессии пользователя;
  • Enable client-side targeting (Разрешить клиенту присоединение к целевой группе):
    Enable
    . Target group name for this computer (Имя целевой группы для данного компьютера):
    Servers
    – в консоли WSUS отнести клиенты к группе Servers

Для рабочих станций мы хотим включить автоматическую загрузку и установку Windows Update сразу после получения новых обновлений. Компьютеры после установки обновлений должны перезагружаться автоматически в нерабочее время (с предварительным предупреждением пользователей).

В настройках WorkstationWSUSPolicy указываем:

  • Allow Automatic Updates immediate installation (Разрешить немедленную установку автоматических обновлений):
    Disabled
    — запрет на немедленную установку обновлений при их получении;
  • Allow non-administrators to receive update notifications (Разрешить пользователям, не являющимся администраторами, получать уведомления об обновлениях):
    Enabled
    — отображать не-администраторам предупреждение о появлении новых обновлений и разрешить их ручную установку;
  • Configure auto-restart reminder notifications for updates и Configure auto-restart warning notifications schedule for updates – показывать пользователям уведомления о перезагрузке
  • Configure Automatic Updates:
    Enabled
    . Configure automatic updating:
    4 — Auto download and schedule the install
    . Scheduled install day:
    0 — Every day
    . Scheduled install time:
    05:00
    – при получении новых обновлений клиент скачивает в локальный кэш и планирует их автоматическую установку на 5:00 утра;
  • Enable client-side targeting:
    Workstations
    – в консоли WSUS отнести клиента к группе Workstations;
  • No auto-restart with logged on users for scheduled automatic updates installations:
    Disabled
    — система автоматически перезагрузится через 5 минут после окончания установки обновлений;
  • Specify Intranet Microsoft update service location: Enable. Set the intranet update service for detecting updates:
    http://srv-wsus.winitpro.ru:8530
    , Set the intranet statistics server:
    http://srv-wsus.winitpro.ru:8530
    –адрес WSUS сервера.
  • Включите опции Do not allow update deferral policies to cause scans against Windows Update (ссылка) и Do not connect to any Windows Update Internet locations. Это позволит предотвратить обращение клиента к серверам Windows Update в интернете.
  • Turn off auto-restart for updates during active hours
    Enabled
    . Отключить авто перезагрузку после установки обновлений в рабочее время (задать интервал рабочего времени в политике Active Hours Start и Active Hours End. Например, с 8 AM до 5 PM)

Групповая политика установки обновлений wsus на рабочих станциях

В обеих GPO включите принудительный запуск службы Windows Update (
wuauserv
) на компьютерах. Для этого в разделе Computer Configuration -> Policies-> Windows Setings -> Security Settings -> System Services найдите службу Windows Update и задайте для нее автоматический запуск (Automatic).

автозапуск службы обновлений windows

Назначить групповые политики WSUS на OU с компьютерами

Затем в консоли управления GPO прилинкуйте созданные вами политики к соответствующим контейнерам (подразумевается что для серверов и рабочих станций в AD созданы отдельные контейнеры OU).

Совет. Мы рассматриваем лишь один довольно простой вариант привязки политик WSUS к клиентам. В реальных организациях возможно привязать одну политику WSUS на все компьютеры домена (GPO с настройками WSUS вешается на корень домена), разнести различные виды клиентов по разным OU (как в нашем примере – мы создали разные политики WSUS для серверов и рабочих станций). В больших распределенных доменах можно привязывать различные WSUS сервера к сайтам AD, или же назначать GPO на основании фильтров WMI, или скомбинировать перечисленные способы.

Щелкните в консоли GPMC по нужному OU, выберите пункт меню Link as Existing GPO и привяжите нужную политику WSUS.

Привязка групповой политики wsus к OU Active Directory

Совет. Также привяжите серверную политику WSUS к OU Domain Controllers.

Аналогично назначьте политику для компьютеров на OU с рабочими станциями.

Применение групповых политик Windows Update на клиентах

Дождитесь применения новых настроек GPO на клиентах или обновите их вручную:

gpupdate /force

Чтобы с клиента ускорить процесс регистрации и сканирования состояния на сервере WSUS, выполните команды:

$updateSession = new-object -com "Microsoft.Update.Session"; $updates=$updateSession.CreateupdateSearcher().Search($criteria).Updates
wuauclt /reportnow

Все настройки Windows Update, которые мы задали групповыми политиками должны появится на клиентах в ветке реестре HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate.

Настройки из этой ветки можно экспортировать в REG файл и использовать его для переноса настроек WSUS на другие компьютеры, на которых нельзя задать параметры обновления с помощью GPO (компьютеры в рабочей группе, изолированных сегментах, DMZ и т.д.)

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"WUServer"="http://srv-wsus.winitpro.ru:8530"
"WUStatusServer"="http://srv-wsus.winitpro.ru:8530"
"UpdateServiceUrlAlternate"=""
"TargetGroupEnabled"=dword:00000001
"TargetGroup"="Servers"
"ElevateNonAdmins"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"NoAutoUpdate"=dword:00000000 –
"AUOptions"=dword:00000003
"ScheduledInstallDay"=dword:00000000
"ScheduledInstallTime"=dword:00000003
"ScheduledInstallEveryWeek"=dword:00000001
"UseWUServer"=dword:00000001
"NoAutoRebootWithLoggedOnUsers"=dword:00000001

reg файл для настройки клиента на WSUS сервер

Через некоторое время все клиенты появятся в назначенных группах компьютеров в консоли WSUS. Здесь будут видны имена компьютеров, IP адреса, версии ОС, процент их пропатченности и дата последнего сканирования.

Клиенты в консоли обновлений wsus

Клиенты скачивают CAB файлы обновлений в каталог
%windir%\SoftwareDistribution\Download
. Логи сканирования, загрузки и установки обновлений можно получить из файлов WindowsUpdate.log.

Папка SoftwareDistribution Download кэш скачанных обновлений Windows на компьютере

GPO для получения и установки обновлений Windows Update через Интернет

Если у вас отсутствует собственный сервер WSUS, вы можете использовать рассмотренные выше групповые политики для настройки параметров получения и установки обновлений на компьютеры из интернета (с серверов Windows Update).

В этом случае задайте в Not configured все параметры GPO, которые задают получение обновлений с WSUS:

  • Specify Intranet Microsoft update service location: Not set
  • Target group name for this computer: Not Set
  • Do not allow update deferral policies to cause scans against Windows Update: Disabled
  • Do not connect to any Windows Update Internet locations: Disabled

При таких настройках через GPO вы можете управлять тем, как компьютеры скачивают и устанавливают обновления Windows.

Такоие настройки GPO позволяет вам управлять тем, как компьютеры скачивают и устанавливают обновления Windows.

Estimated reading time: 4 minutes

Mastering Windows Update Management with Group Policy

Managing Windows Updates via Group Policy (GPO) remains a cornerstone for IT admins in 2025, especially with Windows 11 24H2 and Server 2022 dominating. Whether you’re delaying feature updates, enforcing patch schedules, or integrating with Intune, this guide dives into every step, tool, and trick to keep your systems current and secure. From local setups to domain-wide policies, we’ve got the details—plus PowerShell alternatives and cloud options.

Step 1: Access Group Policy Editor

For standalone PCs or domain controllers, GPO is your friend. Here’s how to start:

Local Machine: Press Win + R, type gpedit.msc, and hit Enter. Works on Windows 11 Pro/Enterprise or Server 2022.
Domain: On a domain controller, open Group Policy Management (GPMC) via Server Manager > Tools, then create or edit a GPO (e.g., “Windows Update Policy”).

Note: Link the GPO to an OU (e.g., “Workstations”) in GPMC for domain-wide effect. Use gpupdate /force to apply changes instantly.

Step 2: Configure Update Policies

Navigate to: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Manage end user experience. Key settings:

  • Configure Automatic Updates: Set to “4 – Auto download and schedule the install.” Pick a day/time (e.g., Sunday 3 AM). Options: 2 (notify), 3 (auto download, notify), 4 (schedule), 5 (user choice).
  • Specify intranet Microsoft update service location: For WSUS, enter your server (e.g., http://wsus.company.local:8530) in both fields.
  • Defer feature updates: Under Windows Update for Business, set “Select when Feature Updates are received” to 180 days—keeps you off bleeding-edge builds like 24H2’s early bugs.
  • No auto-restart with logged-on users: Enable to avoid midday reboots—critical for servers.

Pro Tip: Use Get-GPOReport -Name "Windows Update Policy" -ReportType HTML in PowerShell to audit settings.

Step 3: Test and Troubleshoot

Force an update check: wuauclt.exe /detectnow (still works in 2025, despite deprecation rumors). Check Event Viewer under Applications and Services Logs > Microsoft > Windows > WindowsUpdateClient for errors—Event ID 19 means success.

Common Fix: If updates fail, reset the client with net stop wuauserv, delete C:\Windows\SoftwareDistribution, then net start wuauserv.

Alternative: PowerShell for GPO

For scripting fans, manage policies with PowerShell:

# Requires GroupPolicy module
Import-Module GroupPolicy
$policy = "Windows Update Policy"
$gpo = Get-GPO -Name $policy
Set-GPRegistryValue -Name $policy -Key "HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU" -ValueName "AUOptions" -Type DWord -Value 4
Set-GPRegistryValue -Name $policy -Key "HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU" -ValueName "ScheduledInstallDay" -Type DWord -Value 1  # Sunday

Notes: Run on a DC as admin. Adjust “Value” for other options (e.g., 2 for notify).

Cloud Option: Intune Integration

For hybrid or cloud-first setups, Intune’s taking over GPO’s role:

Setup: In Intune (intune.microsoft.com), go to Devices > Windows > Update Rings. Create a ring, set feature update deferral (180 days), and assign to an Azure AD group.
Bonus: Add a Compliance Policy to flag non-updated devices—email alerts beat manual checks.

Best Practices

  • Stagger Updates: Use multiple GPOs (e.g., “Test Group,” “Production”) to roll out patches in waves.
  • Monitor: WSUS Reporting or Intune’s dashboard—aim for 95% compliance.
  • Security: Enable “Do not connect to Windows Update Internet locations” to force internal sources.

FAQ

Q: Does GPO work with Windows 11 Home?
A: No, Home lacks gpedit.msc—upgrade to Pro or use registry hacks.

Q: Can WSUS and Intune coexist?
A: Yes, but avoid overlap—set Intune to “Windows Update for Business only” if WSUS is primary.

Q: Why defer updates?
A: Early builds (e.g., 24H2) often have bugs—180 days lets Microsoft patch them.

Glossary

  • GPO: Group Policy Object—rules applied to users/devices in Active Directory.
  • WSUS: Windows Server Update Services—local update server.
  • Intune: Microsoft’s cloud MDM for device management.
  • VSS: Volume Shadow Copy Service—used by updates for consistency.

Next Steps: See our Windows Server Backup Guide for recovery prep.

Group Policies allow centrally configuring Windows Update settings that determine how updates are received and installed on workstations and servers in a domain network. In this article, we’ll look at the basic GPO options that you can use to manage Windows Update settings on computers that receive updates from an intranet WSUS server or directly from Windows Update servers on the Internet.

Contents:

  • Configure Windows Update GPO Settings for WSUS Clients
  • Assign the Windows Update GPOs to the WSUS Clients
  • Applying Windows Update Group Policy to Client Computers
  • Configure Clients to Receive Updates from the Internet via GPO

Configure Windows Update GPO Settings for WSUS Clients

Once you have installed the local Windows Server Update Services (WSUS) host, configure the workstations and servers in your Active Directory to receive updates from it (instead of from Microsoft Update servers over the Internet).

In our example, we want to create two different update installation policies for workstations and servers. To do this, open the WSUS management console (wsus.msc) on the server and create two computer groups under the Computers -> All Computers section.

  • Workstations
  • Servers

Then open the WSUS Options and in the Computers parameter, change the value to Use Group Policy or registry setting on computers.

wsus gpo client side targeting

This option enables client-side targeting for WSUS clients. This allows computers to be automatically assigned to update groups using a special registry parameter that contains the WSUS computer group name (this registry parameter is set by GPO or by direct registry modification).

Then open the Group Policy Management console (gpmc.msc) and create two new GPOs: ServerWSUSPolicy and WorkstationWSUSPolicy.

Let’s start with the description of the server update policy, named ServerWSUSPolicy.

The settings for the Windows Update service are located in this GPO section: Computer Configuration -> Policies –> Administrative Templates -> Windows Component-> Windows Update.

Windows Update Settings for servers using GPO

The server update policy should prevent production servers from automatically installing updates or restarting without the administrator’s approval. Let’s configure the GPO so that the servers automatically download available updates, but do not install them. During scheduled maintenance windows, administrators can manually initiate the installation of updates (from the Settings app or using the PSWindowsUpdate module).

Configure the following policy options:

  • Configure Automatic Updates: Enable. 3 – Auto download and notify for install – client automatically downloads new updates and notifies about them;
  • Specify Intranet Microsoft update service location: Enable. Set the intranet update service for detecting updates: http://hq-wsus.woshub.com:8530, Set the intranet statistics server: http://hq-wsus.woshub.com:8530 – set the address of the local WSUS server and the statistics server (they are usually the same)
  • No auto-restart with logged on users for scheduled automatic updates installations: Enable – disable the automatic restart if there are active user sessions
  • Enable client-side targeting: Enable. Target group name for this computer: Servers – assign clients to the Servers group in the WSUS console.

wsus gpo settings workstations summary

For workstations, we want to enable Windows Update to automatically download and install new updates as they become available. Users’ computers should be automatically rebooted (with user notification) after installing updates during non-working hours.

Configure the following settings in the WorkstationWSUSPolicy GPO:

  • Allow Automatic Updates immediate installation Disabled —prevent updates from being installed as soon as they are received;
  • Allow non-administrators to receive update notifications Enabled — show non-admin users a notification about new updates and allow manual installation;
  • Configure auto-restart reminder notifications for updates and Configure auto-restart warning notifications schedule for updates: Enabled – display reboot notifications to users
  • Configure Automatic Updates: Enabled . Configure automatic updating: 4 — Auto download and schedule the install . Scheduled install day: 0 — Every day . Scheduled install time: 05:00AM – client downloads new updates and schedules them to install automatically at 5:00 am;
  • Enable client-side targeting: Workstations – this will assign the client to the Workstations group in the WSUS console;
  • No auto-restart with logged on users for scheduled automatic update installations: Disabled
  • Specify Intranet Microsoft update service location: Enabled. Set the intranet update service for detecting updates: http://hq-wsus.woshub.com:8530, Set the intranet statistics server: http://hq-wsus.woshub.com:8530</emcode– is the address of the internal WSUS server.
  • Enable Do not allow update deferral policies to cause scans against Windows Update (so-called Dual Scan) and Do not connect to any Windows Update Internet locations. This prevents the client from contacting Windows Update servers on the Internet.
  • Turn off auto-restart for updates during active hoursEnabled  Disable automatic restart after installing updates during working hours (set the working time interval in the Active Hours Start and Active Hours End options. For example, from 8 AM to 5 PM

Force the Windows Update service (wuauserv) to start automatically on domain computers in both GPOs. To do this, go to Computer Configuration -> Policies-> Windows Settings -> Security Settings -> System Services, find the Windows Update service, and set it to start automatically.

Windows Update Service Automatic Start

Assign the Windows Update GPOs to the WSUS Clients

Then link the policies you have created to the appropriate containers (OUs) in the GPO management console (It is assumed that separate Organizational Units are created in AD for server and workstation objects).

Tip. We considered only one fairly simple strategy for linking WSUS update policies to clients.  In real-world organizations, it is possible to link a single WSUS policy to all domain computers (GPO with WSUS settings attached to a domain root) or to distribute different types of clients across different OUs (as in our example, we have created different WSUS policies for the server and the workstations.). In large distributed domains, you may want to link different WSUS servers to AD sites, link GPOs based on WMI filters, or use a combination of the above methods.

In the Group Policy Management console, click on the required OU, select Link an Existing GPO, and select ServerWSUSpolicy.

linking wsus gpo to active directory ou

Tip. Also, link the WSUS server policy to the Domain Controllers OU.

Similarly, assign the Workstation Update policy to the OU containing the users’ computers.

Applying Windows Update Group Policy to Client Computers

Wait for the new GPO settings to be applied to the clients, or update them manually:
gpupdate /force
To force the clients to check in and report their status to the WSUS server, run:

$updateSession = new-object -com "Microsoft.Update.Session"; $updates=$updateSession.CreateupdateSearcher().Search($criteria).Updates
wuauclt /reportnow

Any Windows Update settings set through Group Policy should appear on the client in the registry key HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate. This reg key can be exported to a REG file and used to apply WSUS update settings to other computers that cannot be configured via GPO (computers in workgroups, isolated segments, DMZ, etc.)

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"WUServer"="http://hq-wsus.woshub.com:8530"
"WUStatusServer"="http://hq-wsus.woshub.com:8530"
"UpdateServiceUrlAlternate"=""
"TargetGroupEnabled"=dword:00000001
"TargetGroup"="Servers"
"ElevateNonAdmins"=dword:00000000
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"NoAutoUpdate"=dword:00000000 –
"AUOptions"=dword:00000003
"ScheduledInstallDay"=dword:00000000
"ScheduledInstallTime"=dword:00000003
"ScheduledInstallEveryWeek"=dword:00000001
"UseWUServer"=dword:00000001
"NoAutoRebootWithLoggedOnUsers"=dword:00000001

reg file with wsus settings

After a while, clients will appear in their assigned computer groups in the WSUS console. Here you can see computer names, IP addresses, OS versions, the percentage of assigned patches they have installed, and the date of the last scan.

windows clients in wsus console

Client computers download the CAB update files to the %windir%\SoftwareDistribution\Download directory. The WindowsUpdate.log files provide detailed logs of how the client scans for updates against WSUS, downloads, and installs them.

If you encounter error 0x80244010 when getting updates on clients, try changing the frequency of checking for updates on the WSUS server using the Automatic Update detection frequency policy option.

Configure Clients to Receive Updates from the Internet via GPO

Suppose you don’t have an intranet WSUS server. In that case, you can use the GPO settings discussed above to configure the settings for automatically receiving and installing updates on client computers from the Internet (from Windows Update servers).

In this case, set any GPO parameters that set receiving updates from WSUS to Not Configured:

  • Specify Intranet Microsoft update service location: Not Configured
  • Target group name for this computer: Not Configured
  • Do not allow update deferral policies to cause scans against Windows Update: Disabled
  • Do not connect to any Windows Update Internet locations: Disabled

Windows Update GPO settings for getting updates from Microsoft Update services on the Internet

These GPO settings control how your domain computers download and install Windows updates from Microsoft Internet Update servers.

subcomponent subcomponent—text

In this tutorial, we’ll show you how to configure Windows updates using Group Policy so you can keep your system as secure and up-to-date as possible.

We’ve stressed the importance of keeping your systems up to date countless times on this blog and even looked at different ways of managing your updates. But today, we’re going to look at how you can set up automatic Windows updates using Group Policy, also referred to as GPO. In this tutorial, we’ll just be focusing on Windows 10, and although the process for Windows Server will be similar, we’ll address that operating system in a separate tutorial in the future.

NOTE: You can find many other tutorials and articles on Group Policy here.

Before you get started…

To successfully complete this tutorial, you will need the following:

  • To be registered on the Jotelulu platform and to have logged in.
  • A Windows Server with AD DS installed.
  • A user account with administrator privileges.

Creating a Windows Update Policy Using GPO

To create a Group Policy, you will need to first open Server Manager, click on the Tools menu and select Group Policy Management (1).

NOTE: You can also open the Group Policy Management window by running “GPMC.MSC”.

Open the Group Policy Management window

Open the Group Policy Management window

Next, find the domain that you wish to work on and expand the tree structure until you find the organisational unit (OU) to which your new update policy will apply (2).

Once you have found it, right-click on the Delegation and click on Create a GPO in this domain, and Link it here… (3).

Create a Group Policy in the domain and link it to the organisational unit

Create a Group Policy in the domain and link it to the organisational unit

At this point, a window will appear in which you need to give a name to the new GPO (4). Take your time to pick a suitable name. In the future, you may have quite a lot of GPOs. So, try to name it something descriptive and easy to understand so that you can find it in the future. For the purposes of this tutorial, we’ve named it «Windows Update Policy».

Once you have entered a name, click on OK (5).

Name the new GPO

Name the new GPO

The next step is to configure your new Group Policy. Find your policy in the tree on the left-hand side of the screen, right-click on it and click on Edit… (6).

Editing the new GPO

Editing the new GPO

At this point, the Group Policy Management Editor will open. The purpose of this GPO is to update the Windows devices within a given delegation. So, expand the following path on the left-hand side of the screen: Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update (7).

Expand the tree until you reach Windows Update

Expand the tree until you reach Windows Update

Once you have done this, make sure that Windows Update is highlighted in the left-hand pane (8). Then, in the right-hand pane, double-click on the setting called Configure Automatic Updates (9).

At this point, a window will appear where you will configure your updates. First, click on the radio button next to «Enabled» (10). Then, select an option from the drop-down menu below «Configure automatic updating (11). We recommend choosing «7 – Auto Downloading, Notify to Install, Notify to Restart».

Next, mark the checkbox next to «Install during automatic maintenance» (12).

Then, you need to select when and how often you want your devices to update (13):

  • Scheduled install day (how often updates are installed).
  • Scheduled install time (at what time updates are installed).

You should also mark the checkbox «Install updates for other Microsoft products» (14) in order to update other software packages like Office, Visual Studio, etc.

Finally, to apply your changes, click on Apply (15) and OK (16).

Configure your automatic updates

Configure your automatic updates

Back in the Group Policy Management Editor, you should now see that Configure Automatic Updates is «Enabled» (17).

Check that Automatic Updates is updated

Check that Automatic Updates is updated

Congratulations! You’ve just created a policy to apply automatic updates to all devices within an Organisational Unit (OU).

Summary

As you’re probably tired of hearing by now, keeping all your network devices updated is a critical task and can consume quite a lot of time. That’s why it’s definitely worth taking the time to automate them whenever possible.

In this short tutorial, we’ve shown how you can minimise your workload and set up Windows Updates using Group Policy (GPO). It’s a really quick and easy task once you know the steps to follow, but if you come up against any problems, don’t hesitate to contact us so we can help you.

Meanwhile, check out our other tutorials to learn more about a range of topics, including configuring Windows features, deploying network services and much, much more!

Thanks for choosing Jotelulu!

I am still pretty early in my journey of learning how to manage Windows 10 Pro updates, but I am a little encouraged to find that there are several setting in Group Policy that are not available in the UI. If it works as expected (and documented), at least with build 1709, you have these capabilities:

  • Extend maximum Active Hours from 12 to 18
  • Schedule updates e.g. during the night; can even restrict to certain days of the week and/or weeks of the month
  • Prevent restarts if a user is logged on

The two key article on this are Build deployment rings for Windows 10 updates and Walkthrough: use Group Policy to configure Windows Update for Business (currently only updated to version 1607).

Manage device restarts after updates has valuable info on group policy settings and the corresponding registry keys for gaining control over restarts.

Even if the machine is not domain-joined, if it’s Pro, you can set these values directly in the registry. Configure Automatic Updates using Registry Editor is a reference of all registry settings.

Group Policy Setup

To see these features in Group Policy Management, you’ll have to install the latest Administrative Templates (.admx) for group policy. The 1709 templates are here.

Loosely following the “Build deployment rings” article above, I decided to create three policies:

  • Windows 10 Update – Common Settings (uses WMI to target Windows 10 computers)
  • Windows 10 Update – Broad Ring (uses WMI to target Windows 10 computers)
  • Windows 10 Update – Fast IT Ring (applies only to my own management computer)

Note If you set your Windows 10 WMI filter to

select * from Win32_OperatingSystem Where Version like '10.%'

it will also include (and apply these policies to) Windows Server 2016. This filter forces it to apply to Windows 10 clients only:

select * from Win32_OperatingSystem Where Version like '10.%' and  ProductType='1'

I’ll post my current settings in each policy below.

Windows 10 Update – Common Settings

Note that Allow Telemetry must be at least 1 for any of this to work, and Automatic updating must be 4 for scheduled updates to work. I’m doing 3am updates every day, don’t restart if someone is logged on, use an 18-hour Active Hours window of 6am to midnight, and block preview builds.

Win10 Updates with Group Policy 01

Update April 9, 2018 4/9/2018 If you use WSUS, under Windows Components > Windows Update, enable “Do not allow update deferral policies to cause scans against Windows Update” per Susan Bradley’s recommendation here. See more info in this TechNet article. The setting has no effect if you’re not using WSUS.

Update May 26, 2020 It turns out that “Turn off auto-restart for updates during active hours” has no effect when “No auto-restart with logged on users” is enabled (see the instructions in the GPO itself). I have now disabled “Turn off auto-restart for updates during active hours.” This allows machines to automatically reboot after installation of updates, as long as no one is logged in. Paired with a script that automatically logs off users each evening, this works pretty well to get Windows 10 machines patched without further intervention.

Windows 10 Update – Broad Ring

Win10 Updates with Group Policy 02

Yes, 11 days, thinking that if an update comes out on Tuesday, I want it installed on Saturday.

Windows 10 Update – Fast IT Ring

Win10 Updates with Group Policy 03

Not dropping to Semi-Annual (Targeted) as recommend by Microsoft; just getting the Semi-Annual Channel after 60 days instead of 120 and quality updates after 4 days.

Client View

After setting up and applying the policies, it takes awhile (20-30 minutes?) until the Settings app reflects the change. The Active hours option disappears:

Win10 Updates with Group Policy 04

Restart options shows the time, but gives the option to change the schedule:

Win10 Updates with Group Policy 05

Advanced options was originally showing the 120- and 11-day values, grayed out. Maybe they will return once updates have installed.

Win10 Updates with Group Policy 06

View configured update policies shows what settings are coming from Group Policy, but not what the values are:

Win10 Updates with Group Policy 07

I left my computer logged on last night. It apparently installed updates overnight, but the restart was blocked by policy. I see this now:

Win10 Updates with Group Policy 08

Registry values

Most of the settings wind up in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate and the AU subkey. Here’s what those keys look like in a domain-joined Windows 10 1709 machine (paste to a .reg file if you want to import). This list does not include “Do not allow update deferral policies to cause scans against Windows Update” as it was created for a non-WSUS environment.

Update May 26, 2020 This now shows a Windows 10 1909 machine with the SetActiveHours option disabled. See details above.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate]
"DeferFeatureUpdates"=dword:00000001
"BranchReadinessLevel"=dword:00000020
"DeferFeatureUpdatesPeriodInDays"=dword:00000078
"PauseFeatureUpdatesStartTime"=""
"DeferQualityUpdates"=dword:00000001
"DeferQualityUpdatesPeriodInDays"=dword:0000000b
"PauseQualityUpdatesStartTime"=""
"ManagePreviewBuilds"=dword:00000001
"ManagePreviewBuildsPolicyValue"=dword:00000000
"DisableDualScan"=dword:00000001
"SetActiveHours"=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"NoAutoRebootWithLoggedOnUsers"=dword:00000001
"NoAutoUpdate"=dword:00000000
"AUOptions"=dword:00000004
"ScheduledInstallDay"=dword:00000000
"ScheduledInstallTime"=dword:00000003
"ScheduledInstallEveryWeek"=dword:00000001
"AllowMUUpdateService"=dword:00000001

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Windows 10 home обновить до про
  • Файл подкачки windows 10 где ставить
  • Как подключить второй монитор к компьютеру на windows 10 через материнскую плату
  • Windows 2000 beta 3 startup sound
  • Программа архивации данных windows 10 грузит диск