Next Topic

Previous Topic

Book Contents

Only OS Updates

The ‘Only OS Updates’ Patch Strategy configures how updates for Windows and Apple machines are performed on assigned machines.

When this patch strategy is selected, two sections appear:

Configure Windows Group Policies Related to Windows Update

This section contains all Windows Group Policies related to Windows Updates. They can be configured in VSA in a similar way to what an administrator would do on a Domain Controller if their organization uses Active Directory.

Policy can have following statuses:

After unassigning a machine from the profile all policies are set back to Not Configured status (default Windows configuration).

Windows policies configured in this section are applied on a machine level. It means that if an endpoint user configured any of the policies listed in this section, their configuration will be overridden when the scan and analysis profile is applied. However, this configuration has lower priority than Windows Policies configured by an administrator on a domain controller (in case their organization uses Active Directory).

To understand the Native Windows Patching Controls Configuration from Microsoft, please click here.

Configure Automatic Updates Policy

This policy specifies whether the computer will receive security updates and other important downloads through the Windows automatic updating service.

Note: This policy does not apply to Windows RT.

Policy can have following statuses:

Turn on recommended updates via Automatic Updates

This policy specifies whether Automatic Updates will deliver both important as well as recommended updates from the Windows Update service.

Policy can have following statuses:

Automatic Updates detection frequency

This policy specifies the hours that Windows will use to determine how long to wait before checking for available updates.

Note: The "Specify intranet Microsoft update service location" setting must be enabled for this policy to have effect. If the "Configure Automatic Updates" policy is disabled, this policy has no effect. This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs.

Policy can have following statuses:

Allow Automatic Updates immediate installation

This policy specifies whether Automatic Updates should automatically install certain updates that neither interrupt Windows services nor restart Windows.

Note:If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

Policy can have following statuses:

Allow signed updates from an intranet Microsoft update service location

This policy specifies whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location.

Note: Updates from a service other than an intranet Microsoft update service must always be signed by Microsoft and are not affected by this policy setting. This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs.

Policy can have following statuses:

Delay restart for scheduled installations

This policy specifies the amount of time Automatic Updates will wait before proceeding with a scheduled restart.

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

Policy can have following statuses:

Enabling Windows Update Power Management to automatically wake up the computer to install scheduled updates

This policy specifies whether the Windows Update will use the Windows Power Management features to automatically wake up the system from hibernation, if there are updates scheduled for installation.

Policy can have following statuses:

No auto-restart with logged on users for scheduled automatic updates installations

This policy specifies that to complete a scheduled installation, Automatic Updates will wait for the computer to be restarted by any user who is logged on, instead of causing the computer to restart automatically.

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

Policy can have following statuses:

Re-prompt for restart with scheduled installations

This policy specifies the amount of time for Automatic Updates to wait before prompting again with a scheduled restart.

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect. This policy has no effect on Windows RT

Policy can have following statuses:

Do not display `Install Updates and Shut Down` option in Shut Down Windows dialog box

This policy allows to manage whether the 'Install Updates and Shut Down' option is displayed in the Shut Down Windows dialog box.

Policy can have following statuses:

Do not adjust default option to `Install Updates and Shut Down` in Shut Down Windows dialog box

This policy allows to manage whether the 'Install Updates and Shut Down' option is allowed to be the default choice in the Shut Down Windows dialog.

Note: This policy setting has no impact if the Computer Configuration\Administrative Templates\Windows Components\Windows Update\Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box policy setting is enabled.

Policy can have following statuses:

Turn on Software Notifications

This policy allows to control whether users see detailed enhanced notification messages about featured software from the Microsoft Update service. Enhanced notification messages convey the value and promote the installation and use of optional software. This policy setting is intended for use in loosely managed environments in which you allow the end user access to the Microsoft Update service. By default, this policy setting is disabled.

Note: By default, this policy setting is disabled. If you are not using the Microsoft Update service, then the Software Notifications policy setting has no effect. If the "Configure Automatic Updates" policy setting is disabled or is not configured, then the Software Notifications policy setting has no effect.

Policy can have following statuses:

Always automatically restart at the scheduled time

This policy specifies a restart timer always begins immediately after Windows Update installs important updates, instead of first notifying users on the login screen for at least two days.

Note: If the "No auto-restart with logged on users for scheduled automatic updates installations" policy is enabled, then this policy has no effect.

Policy can have following statuses:

Do not connect to any Windows Update Internet locations

This policy specifies to not retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Windows Store, when Windows Update is configured to receive updates from an intranet update service.

Note: This policy applies only when this PC is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy.

Policy can have following statuses:

Select when Preview Builds and Feature Updates are received

This policy specifies the level of Preview Build or Feature Updates to receive.

Policy can have following statuses:

Select when Quality Updates are received

This policy specifies when to received Quality Updates.

Note: If the "Allow Telemetry" policy is set to 0, this policy will have no effect.

Policy can have following statuses:

Allow updates to be downloaded automatically over metered connections

This policy specifies whether or not to download updates automatically, even over metered data connections.

Policy can have following statuses:

Turn off auto-restart for updates during active hours

This policy specifies the PC not to restart automatically after updates during active hours. If any of the following two policies are enabled, this policy has no effect:

  1. No auto-restart with logged on users for scheduled automatic updates installations.
  2. Always automatically restart at scheduled time.

Policy can have following statuses:

Note: The default max active hours range is 18 hours from the active hours start time unless otherwise configured via the Specify active hours range for auto-restarts policy.

Specify intranet Microsoft update service location

This policy specifies an intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network.

Note: If the "Configure Automatic Updates" policy is disabled, then this policy has no effect. If the "Alternate Download Server" is not set, it will use the intranet update service by default to download updates.

Policy can have following statuses:

Configure auto-restart reminder notifications for updates

This policy specifies when auto-restart reminders are displayed.

Policy can have following statuses:

Configure auto-restart required notification for updates

This policy specifies the method by which the auto-restart required notification is dismissed.

Policy can have following statuses:

Configure auto-restart warning notifications schedule for updates

This policy allows to control when notifications are displayed to warn users about a scheduled restart for the update installation deadline.

Policy can have following statuses:

Maximum Background Download Bandwidth (percentage)

This policy specifies the maximum background download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth.

Policy can have following statuses:

Maximum Foreground Download Bandwidth (percentage)

This policy specifies the maximum foreground download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth.

Policy can have following statuses:

Mac OS Update Settings

The following Mac OS settings are checked in the System Preferences > Apple Store dialog for each Operating System Update value selected in Software Management.

 

In Software Management

 

Ask user to download and install

Automatically download and ask user to install

Automatically download and schedule installation

Require automatic updates but let user configure

Turn off Operating System Update

Automatically check for updates

 

Download Newly available updates in Background

 

 

Install app updates

 

 

 

 

Install OS X updates

 

 

 

 

Install system data files and security updates

 

 

 

 

Mapping to MacOS Software Update

image-20211227-091908 (1)

Automatically check for updates. This checkbox is selected by default.

image-20211227-092243

Automatically install MacOS updates. This is disabled until Automatically check for updates are activated.
This checkbox is selected by default.

image-20211227-092243

Automatically install app updates from the App Store. This is disabled until Automatically check for updates are activated.This checkbox is selected by default.

image-20211227-092030 (1)

Automatically install system data files and security updates.This is disabled until Automatically check for updates are activated.This checkbox is selected by default.

Note: MacOS Software Update Settings options should be deployed during machine scan process.

Windows Native Patching Monitoring

This feature can work only if there are no other applications trying aggressively to change the Windows Update GPO. In case there is such an application the feature will stop trying to enforce its configuration and log the following log to the Windows Event Log:

"Software Management Native OS feature stopped Windows Patch Group Policy management due to external application interference." The log can also be seen on the following screenshot:

Capture wgp eventlog

Note: If case of this log the problem has to be investigated further. Once it is fixed the machine needs to be restarted or the profile reapplied from the VSA.

Software Management Native OS feature will stop applying the configuration and write the warning if there are over 20 changes in the OS patching GPOs in one hour.