Windows server core update

Windows Server Core 2012, как и любой другой продукт Microsoft необходимо поддерживать в актуальном состоянии, вовремя устанавливая обновления безопасности, выпускаемые компанией Microsoft (список последних обновлений и патчей на продукты Microsoft доступен в разделе Обзор обновлений безопасности Microsoft).

Установка обновлений безопасности на Windows Server Core 2012 несколько отличается от оной для графического варианта установки Windows Server 2012 (Full GUI). Естественно основное отличие в том, что в Core режиме отсутствует графические элементы управления, позволяющие настроить и запустить установку обновлений (всплывающий балон в трее, и соответствующий элемент в консоли Server Manager). Конечно, из Core режима можно переключится в графический, установить обновления и удалить GUI (подробно процедура переключений между режимами описана в статье Переключение между графическим и Core режимами в Windows Server 2012), однако это не очень удобно и требует дополнительных затрат времени администратора.

Как установить обновления на windows 2012 server core

Разберем стандартные способы установки обновлений на Windows Server 2012:

  1. Автоматическое обновление с сервера Microsoft Windows Update или WSUS (Как настроить сервер обновлений WSUS на Windows Server 2012)– сервер автоматически скачивает и устанавливает обновления с заданного сервера WSUS или центра обновлений Microsoft . Этот вариант в большинстве случаев не приемлем, т.к. установка обновлений на серверах обычно выполняется в заранее запланированное окно обслуживания.
  2. Ручной запуск установки обновлений, полученных с сервера обновлений (Windows Update или WSUS). В такой конфигурации сервер автоматически скачивает обновления с сервера обновлений, но запуск установки патчей осуществляется вручную администратором (предпочтительный вариант).
  3. Ручная установка обновлений. Администратор самостоятельно скачивает обновления и вручную устанавливает их на сервере.

Управление автоматическим обновлением в Sever Core 2012

Текущие настройки службы обновлений можно получить с помощью команды:

Cscript scregedit.wsf /AU /v

Включить автоматическую установке обновлений можно с помощью команд:

Net stop wsuaserv cscript scregedit.wst /AU 4  

net start wsuaserv

Отключить автоматическое обновление можно так:

Net stop wsuaserv

cscript scregedit.wsf /AU 1

net start wsuaserv

Запустить принудительный поиск доступных обновлений можно с помощью команды:

wuauclt /detectnow

Если сервер должен установить обновления автоматически, но не перезагружаться, можно отключить автоматическую перезагрузку Windows после установки обновлений.

Ручная установка обновлений, полученных с WSUS

Эта методика установки обновлений на Windows Core 2012 является оптимальной в большинстве случаев: с помощью групповой политики или путем ручной модификации реестра указывается WSUS сервер и задается режим ручного запуска установки обновлений, затем в профилактическое окно администратор сервера вручную стартует установку обновлений. Возникает вопрос: как же запустить установку обновлений, полученных со WSUS сервера, на Windows Core 2012? В этом нам поможет утилита sconfig, входящая в стандартную поставку Windows Core.

Запустите утилиту

sconfig

sconfig в windows server 2012

Выберите 6 пункт: Download and Install Updates

Скачать и установить обновления на windows server 2012 core

На вопрос необходимо ли искать все или рекомендованные обновления, выберем все (A).

поиск обновлений на windows server 2012

Система обнаружит и отобразит список обнаруженных обновлений и предложит их установить (все сразу, по одному) или совсем отказаться от их установки.

Выбор устанавливаемых обновлений windows 2012 core

Если выбрана установка обновлений, систем приступит к закачке и установке обновлений Windows Server Core 2012.

Устанавливаются обновлений на windows core 2012

После установки обновлений, система может потребовать перезагрузки.

Перезагрузка сервера после установки обновлений на Windows 2012 core

Ручная установка обновлений

Обновлений на Server Core можно установить и вручную, хотя это и достаточно трудоемкий и в большой степени ручной процесс. Необходимо сначала вручную скачать нужные обновлений с сайта Microsoft Update, распаковать их, скопировать на сервер и вручную последовательно их установить.

Вручную обновление можно установить командой:

Wusa <kbupdate>.msu /quiet

В случае необходимости удалить установленное обновление можно так:

Wusa /uninstall <kbupdate>.msu /quiet

Если необходимо узнать, какие обновлений уже установлены, можно вывести их список по методике, описанной в статье Как в Windows вывести список всех установленных обновлений.

In this guide, I will show you how to patch server core installation with the latest Windows Updates. Through Windows Update, you can install the latest patches on the server core automatically or manually install the latest updates.

When you install the Server Core, it is recommended to install the latest patches to keep it secure and updated. Unlike Windows Server (installed with Desktop Experience), the Server Core doesn’t have a GUI to check for updates.

When you have multiple server core installations in your setup, patching all them of the servers becomes a critical task. By patching a server core installation, you get the performance improvements and the known issues or bugs are fixed.

Install and Update Third Party Applications with Patch My PC

Install and Update Third Party Applications with Patch My PC

Methods to Patch Server Core Installations

There are three methods that you can use to patch a server running Windows Server Core:

  • Using Windows Updates automatically: By using Windows Update, either automatically or with command-line tools, you can patch server core installations.
  • Windows Server Update Services (WSUS): Using Windows Server Update Services (WSUS), you can service servers running a Server Core installation.
  • Manually install updates on Server Core: Organizations that do not use Windows update or WSUS, you can apply updates manually and keep the server core updated.

Patch Server Core with latest Windows Updates

We’ll now go through the steps to automatically install the latest updates on the server core using Windows Update. The first step involves configuring the update setting on the server core. When a server core is first installed, the update setting is set to Download only. However, the SConfig screen allows you to modify this configuration.

Configure Update Setting on Server Core

Configure Update Setting on Server Core

You will be presented with three update options:

  • Automatic
  • Download Only
  • Manual Updates

To enable automatic updates on the server core, type “A” and press the Enter key.

Enable Automatic Updates on Server Core

Enable Automatic Updates on Server Core

On the SConfig screen, notice that the update setting is now changed to Automatic. We have now enabled automatic updates on the Windows Server core. In the next step, we will check for the latest updates from Microsoft and install them. Select the option 6 to install the updates.

Patch Server Core with latest Windows Updates

Patch Server Core with latest Windows Updates

There are three options presented when you choose to install updates on server core:

  • All quality updates
  • Recommended quality updates only
  • Feature Updates

Type the option “1” and press the enter key. The Server Core now checks for the quality updates. From the screenshot below, we see there are 4 Windows updates applicable for the server core.

You can install all the updates, select and install single update or choose not to install any update.

Patch Server Core with latest Windows Updates

Patch Server Core with latest Windows Updates

To install all the latest updates on Server Core, select the option “A” and press the enter key. The updates are now downloaded and installed on the server core. Remember that downloading and installing the updates will take time. Make sure the server has connectivity to the internet.

Patch Server Core with latest Windows Updates

Patch Server Core with latest Windows Updates

After sometime, the updates are installed on the server core, and we see a server restart is required to complete the installation of updates. Type “Y” and press the enter key to confirm the server restart.

Patch Server Core with latest Windows Updates

Patch Server Core with latest Windows Updates

Check Installed Updates on Server Core

There are multiple ways to check the installed updates on server core. You can use any of the commands listed below to get Windows updates installed on server core.

  • get-wmiobject -class win32_quickfixengineering
  • get-hotfix
  • run wmic qfe list from the command line
  • View updates by running a command systeminfo.exe
Check Installed Updates on Server Core

Check Installed Updates on Server Core

Manually Patch Server Core Installation

To manually install updates on the server core installation, you have to download the update and make it available to the server core installation. At a command prompt, run the following command:

Wusa update.msu /quiet

Depending on the updates that are installed, you may need to restart the computer, although the system will not notify you of this. To uninstall an update manually, run the following command on server core:

Wusa /uninstall update.msu /quiet

Additional Resources

  • Patch a Server Core Installation
  • Deploy Software Updates Using SCCM ConfigMgr
  • Step-by-Step Guide to Import Updates into SCCM | ConfigMgr
  • How to Run WSUS Server Cleanup Wizard to Clean Updates

Still Need Help?

If you need further assistance on the above article or want to discuss other technical issues, check out some of these options.

 

We’re all used to updating our Windows Server operating systems with the Windows Update GUI, but did you know that you can update your server using command prompt and “sconfig”?

The past few years I’ve been managing quite a few Windows Server Core Instances that as we all know, do not have a GUI. In order to update those instances, you need to run Windows Update using the command line, but this method actually also works on normal Windows Server instances with the GUI as well!

Windows Update from CLI (Command Prompt)

Please enjoy this video or read on for why and how!

Why?

Using a GUI is great, however sometimes it’s not needed, and sometimes it even causes problems if it looses the backend connection where it’s pulling the data from. I’ve seen this true on newer Windows operating systems where the Windows Update GUI stops updating and you just sit there thinking the updates are running, when they are actually all complete.

The GUI also creates additional overhead and clutter. If there was an easier alternative to perform this function, wouldn’t it just make sense?

On Windows Server instances that have a GUI, I find it way faster and more responsive to just open an elevated (Administrative) command prompt, and kick off Windows Updates from there.

How

You can use this method on all modern Windows Server versions:

  • Windows Server (with a GUI)
  • Windows Server Core (without a GUI)

This also works with Windows Server Update Services so you can use this method either connecting to Windows Update (Microsoft Update) or Windows Server Update Services (WSUS).

Now lets get started!

  1. Open an Administrative (elevated) command prompt
  2. Run “sconfig” to launch the “Server Configuration” application
    command prompt launch sconfig

  3. Select option “6” to “Download and Install Windows Updates”
    sconfig Server Configuration menu

  4. Choose “A” for all updates, or “R” for recommended updates, and a scan will start
  5. After the available updates are shown, choose “A” for all updates, “N” for no updates, or “S” for single update selection

After performing the above, the updates will download and install.

sconfig Windows Update running

“sconfig” Windows Update downloading and installing

I find it so much easier to use this method when updating many/multiple servers instead of the GUI. Once the updates are complete and you’re back at the “Server Configuration” application, you can use option “13” to restart Windows.

Windows Server Update Services (WSUS) can use a lot of resources, so why not use Windows Server Core and make the most of the resources you have. In this post I’ll go through the initial steps on how to deploy and configure a WSUS server using command line and PowerShell. This guide is also suitable for regular GUI Windows Server installations.

Installing Windows Server Core

Boot the server from the Windows Server media and on the “Select the Operating System you want to install” screen, select the option “Windows Server Standard” or “Datacenter” edition. The other options with “Desktop Experience” in brackets are the options for the other server editions with a GUI also installed.

Please note: You can no longer add and remove the GUI (Desktop Experience) with Windows Server 2016 as you could with Windows Server 2012 & 2012 R2. This is due to numerous problems with keeping the installation and removal process consistent with updates. With Windows Server 2016, the only way to add or remove the GUI is to re-install and select one of the server editions with the “Desktop Experience” option.

Initial Configuration

Once the install process has completed, you will be prompted with a command line window, and asked to set the Administrator password.

  1. Set the Administrator password.
  2. Type sconfig to get the Server Configuration menu. It’s pretty straight forward. In the Server Configuration menu, you can configure all the basics required for the server.
  3. For the first Domain Controller in the new forest, you’ll need to configure at least the Network Settings — IP address, subnet mask, gateway, and DNS.
  4. You may also want to configure the computer name. Configuring the computer name will require a restart.
  5. After the restart, log in to the server with the Administrator password you set in step 1.

Tip: “sconfig” is also present in the GUI version of Windows Server, making initial configuration of new servers easier.

Additional Storage Configuration

You may want to configure additional locally attached disks or iSCSI/MPIO storage. Creating new volumes that are locally attached can be done via the diskpart command line tool. Here’s the series of commands to create a new, NTFS formatted volume, with the drive letter of E:\ and the name “Data”, from a second disk in the server using the diskpart tool. First, run diskpart from the command line, then use the following commands:

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
list disk
select disk 1
online disk
attributes disk clear readonly
clean
convert mbr -or gpt
create partition primary
select part 1
active
format fs=ntfs label=Data quick
assign letter E:
list volume

iSCSI storage can be configured using the same GUI tools you would use in the GUI version of Windows Server. The MPIO feature must be installed before the tool is available. You can do this via PowerShell:

1
Install-WindowsFeature -Name 'Multipath-IO'

When MPIO is installed you can load the MPIO utility using mpiocpl. For the iSCSI utility you can use iscsicpl. iSCSI is installed as part of the base Windows Server feature set.

Install Windows Server Update Services (WSUS)

The following PowerShell command will install the WSUS feature:

1
Install-WindowsFeature -Name UpdateServices -IncludeManagementTools

Now we need to run some post install tasks. We’ll create a directory for the WSUS content on the E:\ drive.

To configure WSUS to use the directory we just created and the Windows Internal Database (WID is based on SQL Express), run the following command:

1
2
CD "C:\Program Files\Update Services\Tools"
.\wsusutil.exe postinstall CONTENT_DIR=E:\WSUS_Content

Alternatively you might want to use an external SQL server for the WSUS database, if so run the following command instead:

1
2
CD "C:\Program Files\Update Services\Tools"
.\wsusutil.exe postinstall SQL_INSTANCE_NAME="SQLSERVER\SQLINSTANCE" CONTENT_DIR=E:\WSUS_Content

WSUS is now running and able to be configured further. This is possible with PowerShell, but not as straightforward as the installation above so we’ll be using the WSUS MMC on a remote computer or on the server itself if you installed Windows Server with the Desktop Experience.

To obtain the WSUS MMC on a remote computer we’ll need to install the Remote Server Administration tools (RSAT), run the following command in an elevated PowerShell session:

1
Get-WindowsCapability -Name RSAT* -Online | Add-WindowsCapability -Online

To view WSUS reports you’ll also need to download and install the following:

  • Microsoft Report Viewer 2012 Runtime redistributable
  • Microsoft System CLR Types for Microsoft SQL Server 2012: x64 version, x86 version

In case the links to Microsoft System CLR Types fail in future, here is the main download page link. This page links to components from the Microsoft SQL Server 2012 Feature Pack, you need to go to the Install Instructions section and download the specific component you need.

Configuring Windows Server Update Services

Once you have downloaded and installed all the software listed above on our admin PC, you can continue with the configuration.

  1. Open the Windows Service Update Services Microsoft Management Console (WSUS MMC).
  2. You should see a “Before You Begin” wizard. Click Next.
  3. Join the Microsoft Update Improvement Program if you wish.
  4. Choose Upstream server, as this is the first WSUS server we’ll choose “Synchronize from Microsoft Update”.
  5. Specify the Proxy Server settings if needed.
  6. Click “Start Connecting”.
  7. Select the applicable languages for our environment.
  8. Select the applicable Products. I recommend selecting all products as we’ll only be downloading updates that we actually need.
  9. Select the Classifications. I recommend selecting all except Drivers and Driver Sets. Drivers in WSUS increase the size of the database immensely.
  10. Configure the Sync Schedule. I recommend leaving this on manual until setup and synchronisation has been completed.
  11. Check the Begin initial synchronization box. This may also take a while.
  12. Click Finish.

Once the initial configuration is complete, now we can start to configure WSUS for every day operation.

  1. In the WSUS MMC go to the Options node.
  2. Setup a Synchronization Schedule. I recommend once or twice a day, out of regular hours. Click OK.
  3. Go to Automatic Approvals.
  4. There’s a built-in rule to automatically approve Critical and Security updates, meaning that they will be downloaded and distributed via WSUS without any admin interaction. I recommend enabling this, but don’t run the rule.
  5. You may also want to add a rule for Definition Updates from Exchange, Office, and Windows Defender if applicable to you. Click OK.
  6. Now go to Computers.
  7. Set the option here to Use Group Policy or registry settings on computers and click OK.
  8. Go to E-Mail notifications and enable them if you want status reports and Emails about the new updates that have been synchronised. Click OK.
  9. In the WSUS MMC, go to the Computers node.
  10. Create the computer groups that you require here. I recommend a ‘pilot’ group and a ‘regular’ group both for client devices and servers.

Configuring Group Policy

To enable our clients to get updates from WSUS using the settings above, you’ll need to configure the group policy for them.

  1. Open the Group Policy Management MMC and go to the Group Policy Objects node.
  2. Right click on the node and select New to create a new GPO for WSUS. Give it a name and click OK.
  3. Right click on the new GPO and click Edit to open it.
  4. Navigate to Computer Configuration/Policies/Administrative Templates/Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
  5. Go to the setting “Specify intranet Microsoft update service location”.
  6. We’ll configure both “Set the intranet update service for detecting updates” and “Set the intranet statistics server” to http://wsus-server-name.contoso.com:8530
  7. Go to “Enable client-side targeting” and enter the name of a group that you created in WSUS.
  8. For multiple groups, repeat steps 2 — 7 for each group.
  9. You can use Active Directory Security Groups to control which client devices have read access to the GPO with the desired WSUS group configuration.

There are lots of other settings in GPO to configure Windows Update that I recommend taking a look, specifically “Configure Automatic Updates” located in Computer Configuration/Policies/Administrative Templates/Windows Components/Windows Update/Manage end user experience which controls when client devices install updates.

Managing Updates

After some time (approximately 24 hours) our client devices should have contacted the WSUS server and be in the correct group. Now we need to approve the updates required for our environment.

  1. On the overview of our WSUS server, click on “Updates needed by computers”.
  2. Change the drop down menu “Approval” to “Unapproved” and click “Refresh”.
  3. Right-click on the Title bar and enable the “Supersedence” column.
  4. Click on the very tiny “Supersedence” column to sort the updates by Supersedence.
  5. Approve the top critical, security and any other updates you want to be installed on our devices.
  6. Once the devices have downloaded, installed, and reported back to the WSUS server, we’ll have a better idea if any more updates are required.

Maintenance and Troubleshooting

Keeping WSUS running over time requires some maintenance. I created a custom PowerShell script that runs every day to perform the maintenance on the database. More specifically it declines and deletes old updates, and old computers. It can also send a notification over e-mail or a webhook with information about it’s clean up run. I’ve posted about it here.

You can also clean up the WSUS database manually using the “Server Cleanup Wizard” found in Options. You can also run this via PowerShell:

1
2
Get-WsusServer -Name Wsus-Server-Name -PortNumber 8530
Get-WsusServer | Invoke-WsusServerCleanup CleanupObsoleteUpdates -CleanupUnneededContentFiles -CompressUpdates -DeclineExpiredUpdates -DeclineSupersededUpdates

You may encounter an error when trying to connect to the WSUS server using the MMC — Error: Unexpected Error, appears as Event ID 7053 in Event Viewer.

I’ve known this error to occur frequently. One fix is to navigate to %appdata%\Microsoft\MMC and delete the wsus file and then try connecting again.

IIS Configuration

I highly recommend configuring these IIS AppPool settings relating to WSUS. In an elevated PowerShell session run the following commands:

1
2
3
4
5
6
7
Import-Module WebAdministration
Set-ItemProperty -Path IIS:\AppPools\WsusPool -Name queueLength -Value 25000
Set-ItemProperty -Path IIS:\AppPools\WsusPool -Name cpu.resetInterval -Value "00.00:15:00"
Set-ItemProperty -Path IIS:\AppPools\WsusPool -Name processModel.idleTimeout -Value "00.00:00:00"
Set-ItemProperty -Path IIS:\AppPools\WsusPool -Name failure.loadBalancerCapabilities -Value "TcpLevel"
Set-ItemProperty -Path IIS:\AppPools\WsusPool -Name recycling.periodicRestart.privateMemory -Value 0
Set-ItemProperty -Path IIS:\AppPools\WsusPool -Name recycling.periodicRestart.time -Value "00.00:00:00"

In the IIS Manager these PowerShell commands change the following values:

WSUS -> Application Pools -> WsusPool -> Advanced Settings

General:
Queue Length: 25000

CPU:
Limit Interval (minutes): 15

Process Model:
Idle Time-out (minutes): 0

Rapid-Fail Protection:
“Service Unavailable” Response: TcpLevel

Recycling:
Private Memory Limit (KB): 0
Regular Time Interval (minutes): 0

Finally, you can also try the following command, if needed:

1
2
CD "C:\Program Files\Update Services\Tools"
.\wsusutil.exe postinstall /servicing

Support My Work

If you would like to support me, please check out the link below.

  • PayPal

If you have any questions or comments, please leave them below.

Thanks
-Mike

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Как обновить skype для windows 7
  • Cirrus logic cs8409 windows 10 driver
  • Intel gma 3600 driver windows 10 32 bit
  • Консоль групповых политик windows
  • Acpi 80860f14 driver windows 7