Step-by-Step Guide To Getting Started With Microsoft Windows Server Update Services
Step-by-Step Guide To Getting Started With Microsoft Windows Server Update Services
Step-by-Step Guide To Getting Started With Microsoft Windows Server Update Services
Step-by Step Guide to Getting Started with Microsoft Windows Server Update Services
Software Requirements:
Disk Requirements:
Microsoft Windows 2000 Professional with Service Pack 3 (SP3) or Service Pack 4 (SP4),
Windows 2000 Server with SP3 or SP4, or Windows 2000 Advanced Server with SP3 or SP4.
Microsoft Windows XP Professional, with or without Service Pack 1 or Service Pack 2.
Microsoft Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition;
Windows Server 2003, Datacenter Edition; or Windows Server 2003, Web Edition.
Note:
The latest version of WSUSSetup.exe is available on the Microsoft Web site for
Windows Server Update Services at http://go.microsoft.com/fwlink/?LinkId=47374.
2. On the Welcome page of the wizard, click Next.
3. Read the terms of the license agreement carefully, click I accept the terms of the License
Agreement, and then click Next.
4. On the Select Update Source page, you can specify where clients get updates. If you select
the Store updates locally check box, updates are stored on the WSUS server and you select a
location in the file system to store updates. If you do not store updates locally, client computers
connect to Microsoft Update to get approved updates.
Keep the default options, and click Next.
Select Update Source Page
5. On the Database Options page, you select the software used to manage the WSUS database.
By default, WSUS Setup offers to install WMSDE if the computer you are installing to runs
Windows Server 2003.
If you cannot use WMSDE, you must provide a SQL Server instance for WSUS to use, by
clicking Use an existing database server on this computer and typing the instance name in
the SQL instance name box. For more information about database software options besides
WMSDE, see the “Deploying Microsoft Windows Server Update Services” white paper.
Keep the default options, and click Next.
Database Options Page
6. On the Web Site Selection page, you specify the Web site that WSUS will use. This page also
lists two important URLs based on this selection: the URL to which you will point WSUS client
computers to get updates, and the URL for the WSUS console where you will configure WSUS.
If you already have a Web site on port 80, you may need to create the WSUS Web site on a
custom port. For more information about running WSUS on a custom port, see the “Deploying
Microsoft Windows Server Update Services” white paper.
Keep the default option and click Next.
Web Site Selection Page
7. On the Mirror Update Settings page, you can specify the management role for this WSUS
server. If this is the first WSUS server on your network or you want a distributed management
topology, skip this screen.
If you want a central management topology, and this is not the first WSUS server on your
network, select the check box, and type the name of an additional WSUS server in the Server
name box. For more information about management roles, see the “Deploying Microsoft
Windows Server Update Services” white paper.
Keep the default option and click Next.
Mirror Update Settings Page
8. On the Ready to Install Windows Server Update Services page, review the selections and
click Next.
Ready to Install Windows Server Update Services Page
9. If the final page of the wizard confirms that WSUS installation was successfully completed, click
Finish.
Step 3: Configure the Network Connection
After installing WSUS, you are ready to access the WSUS console in order to configure WSUS and get
started. By default, WSUS is configured to use Microsoft Update as the location to obtain updates. If you
have a proxy server on your network, use the WSUS console to configure WSUS to use the proxy server.
If there is a corporate firewall between WSUS and the Internet, you might need to configure the firewall
to ensure that WSUS can obtain updates.
Although the connection between Microsoft Update and WSUS requires ports 80 and 443 to be open,
you can configure multiple WSUS servers to synchronize with a custom port
On your WSUS server, click Start, point to All Programs, point to Administrative Tools, and
then click Microsoft Windows Server Update Services
Note:
You must be a member of either the WSUS Administrators or the local Administrators security
groups on the server on which WSUS is installed in order to use the WSUS console.
If you do not add http://<WSUS Web site name> to the list of sites in the Local Intranet zone in
Internet Explorer on Windows Server 2003, you might be prompted for credentials each time you
open the WSUS console.
You can also open the WSUS console from Internet Explorer on any server or computer on your
network by entering the following URL: http://WSUSservername/WSUSAdmin.
1. On the WSUS console toolbar, click Options, and then click Synchronization Options.
2. In the Proxy server box, select the Use a proxy server when synchronizing check box, and
then type the proxy server name and port number (port 80 by default) in the corresponding
boxes.
3. If you want to connect to the proxy server by using specific user credentials, select the Use
user credentials to connect to the proxy server check box, and then type the user name,
domain, and password of the user in the corresponding boxes. If you want to enable basic
authentication for the user connecting to the proxy server, select the Allow basic
authentication (password in clear text) check box.
4. Under Tasks, click Save settings, and then click OK in the confirmation dialog box.
1. On the WSUS console toolbar, click Options, and then click Synchronization Options.
2. Under Tasks, click Synchronize now
After the synchronization finishes, click Updates on the WSUS console toolbar to view the list of updates
The best way to configure Automatic Updates depends upon your network environment. In an Active
Directory environment, you can use an Active Directory-based Group Policy object (GPO). In a non-
Active Directory environment, use the Local Group Policy object. Whether you use the Local Group
Policy object or a GPO stored on a domain controller, you must point your client computers to the WSUS
server, and then configure Automatic Updates.
1. In Group Policy Object Editor, click either of the Administrative Templates nodes.
2. On the Action menu, click Add/Remove Templates.
3. Click Add.
4. In the Policy Templates dialog box, click wuau.adm, and then click Open.
5. In the Add/Remove Templates dialog box, click Close.
Note:
The setting Allow local admin to choose setting only appears if Automatic Updates has
updated itself to the version compatible with WSUS.
2. In the details pane, double-click Specify intranet Microsoft update service location.
3. Click Enabled, and type the HTTP URL of the same WSUS server in the Set the intranet
update service for detecting updates box and in the Set the intranet statistics server box.
For example, type http://servername in both boxes.
4. Click OK.
Note:
If you are using the Local Group Policy object to point this computer to WSUS, this setting
takes effect immediately and this computer should appear in the WSUS administrative
console in about 20 minutes. You can speed this process up by manually initiating a
detection cycle.
If you want to refresh Group Policy sooner, you can go to a command prompt on the client computer
and type: gpupdate /force.
For client computers configured with the Local GPO, Group Policy is applied immediately and it will take
about 20 minutes.
Once Group Policy is applied, you can initiate detection manually. If you perform this step, you do not
have to wait 20 minutes for the client computer to contact WSUS.
Setting up computer groups is a three-step process. First, you specify how you are going to assign
computers to the computer groups. There are two options: server-side targeting and client-side
targeting. Server-side targeting involves manually adding each computer to its group by using WSUS.
Client-side targeting involves automatically adding the clients by using either Group Policy or registry
keys. Second, you create the computer group on WSUS. Third, you move the computers into groups by
using whichever method you chose in the first step.
You can use Step 6 to set up a test group that contains at least one test computer.
To create a group
1. On the WSUS console toolbar, click Computers.
2. Under Tasks, click Create a computer group.
3. In the Group name box, type Test, and then click OK.
The Synchronization Options page is the central access point in the WSUS console for customizing how
your WSUS server synchronizes updates. On this page, you can specify which updates are synchronized
automatically, where your server gets updates, connection settings, and the synchronization schedule.
After you synchronize updates to your WSUS server, you must then approve them before the WSUS
server can perform any action for them. The exceptions to this are updates classified as Critical
Updates and Security Updates, which are automatically approved for detection.
You specify update products and classifications on the Synchronization Options page under Products
and Classifications. Products are grouped in a hierarchy, by product family.
The default setting for Products is All Windows Products, and for Update classifications, the default
setting is Critical Updates and Security Updates. You must specify update classifications individually.
Note
If you want to stop synchronizing updates for one or more specific products or product
families, clear the appropriate check boxes in the Add/Remove Products dialog box,
and then click OK. Your WSUS server will stop synchronizing new updates for the
products you have cleared. However, updates that were synchronized for those products
before you cleared them will remain on your WSUS server and will be available on the
Updates page.
Note
If your computer already belongs to a computer group, then after you perform this task it
will belong to the new computer group you specify and not to the earlier computer group.
However, it will remain a member of the All Computers group.
Note
After you perform this task, you will not be able to manage update distribution for the
client computer on the WSUS console, nor will the client computer will not be able to
receive updates from the WSUS server.
You can assign computers to computer groups by using one of two methods, server-side or client-side
targeting, depending on whether or not you want to automate the process. With server-side targeting,
you use the Move the selected computer task on the Computers page to move one or more client
computers to one computer group at a time. With client-side targeting, you use Group Policy or edit the
registry settings on client computers to enable those computers to automatically add themselves into
the computer groups. You must specify which method you will use by selecting one of the two options
on the Computers Options page.
Server-side Targeting
With server-side targeting, you use the WSUS console to both create groups and then assign computers
to the groups. Server-side targeting is an excellent option if you do not have many client computers to
update and you want to move client computers into computer groups manually.
To enable server-side targeting on your WSUS server, click the Use the Move computers task in
Windows Server Update Services option on the Computers Options page.
Client-side Targeting
With client-side targeting, you enable client-computers to add themselves to the computer groups you
create in the WSUS console. You can enable client-side targeting through Group Policy (in an Active
Directory network environment) or by editing registry entries (in a non-Active Directory network
environment) for the client computers. When the client computers connect to the WSUS server, they
will add themselves into the correct computer group. Client-side targeting is an excellent option if you
have many client computers and want to automate the process of assigning them to computer groups.
To enable client-side targeting on your WSUS server, click the Use Group Policy or registry settings
on client computers option on the Computers Options page.
Managing Updates
Updates Overview
Updates are used for patching or providing a full file replacement for software that is installed on a
computer. Every update that is available on Microsoft Update is made up of two components
Metadata provides information about the update. For example, metadata supplies information for the
properties of an update, thus enabling you to find out what the update is useful for. Metadata also
includes end-user license agreements (EULAs). The metadata package downloaded for an update is
typically much smaller than the actual update file package.
Update files are the actual files required to install an update on a computer.
Viewing Updates
View the list of updates. The list of updates displays updates that have been synchronized from the
update source to your server running Windows Server Update Services (WSUS) and are available for
approval.
To view updates
1. On the WSUS console toolbar, click Updates. Updates are displayed in the list of updates.
2. To sort by additional information, download status, title, classification, release date, or
approval status, click the appropriate column heading.
Approving Updates
After updates have been synchronized to your WSUS server, you must approve them to initiate a
deployment action. When you approve an update, you are essentially telling WSUS what to do with it
(for example, your choices are Install, Detect only, Remove, or Decline update). When approving an
update, you specify a default approval setting for the All Computers group, and any necessary settings
for each computer group in the Approve Updates dialog box. If you do not approve an update, its
approval status remains Not approved and your WSUS server performs no action for the update. The
exceptions to this are in the Critical Updates and Security Updates classifications, which by default are
automatically approved for detection after they are synchronized.
When you select this option, users in the targeted computer group will receive a notification
dialog box and an Automatic Updates icon on their taskbar when updates are ready to be
installed on their computers. They can then install the updates immediately, or at a later time, by
clicking the Automatic Updates icon. If you have configured Automatic Updates, either by Group
Policy or locally, to notify the user before installation, these notifications will be offered to any
non-administrator who logs onto the computer in the targeted computer group
Important
You cannot set a deadline for automatic installation for an update if user input is required (for
example, accepting a license agreement or specifying a setting relevant to the update). If you set
a deadline for such an installation synchronization will fail. To determine whether an update will
require user input, look at the May request user input field in the update properties for an
update displayed on the Updates page. Also check for a message in the Approve Updates box
which says "The selected update requires user input and does not support and installation
deadline."
To decline updates
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click one or more updates that you want to decline.
3. In Update Tasks, click Decline update or Decline selected updates, depending on
whether you have selected one or multiple updates to decline.
On the Automatic Approval Options page, you can configure your WSUS server to
automatically approve installation or detection for updates and associated metadata when
they are downloaded to the WSUS server during synchronization. This is different from
approving
The Automatic Approval Options page contains an option to automatically approve revisions to
existing updates as they become available. This option is selected by default. A revision is a version of an
update that has changes (for example, it might have expired, or have an updated EULA, UI text, or
applicability rules for computers). If you configure your WSUS server to automatically approve new
revisions of an update but an expired revision for the update is synchronized, your WSUS server will
automatically decline the update. If you choose not to automatically approve the revised version of an
update, your WSUS server will use the older revision, and you must manually approve the update
revision.
If you have purchased a "per user" license agreement for Office, you must ensure that each user's
installation of Office is updated (for example, there might be two users who run individually licensed
copies of Microsoft Office on the same computer). This means a particular user has to be logged on
to the computer for that specific copy of Office to be updated. For example, if two people both have
accounts on a computer that is running Microsoft Office, then each of them has to log on and update
his or her Office installation, otherwise one of them will not have an updated version of Office.
Users can access the public Microsoft Office Online Web site and can look for updates to their Office
installation through the Microsoft Office Update wizard. Using Group Policy, you might want to create
policies that prevent users from getting their own Office updates from Microsoft Office Online.
Unlike Windows Update or Microsoft Office Online, which are public Web sites that users can visit
directly, Microsoft Update is accessed only by WSUS servers. It is currently in beta release and
makes security updates available only for Office XP and Office 2003. Some critical updates are not
available through Microsoft Update. Therefore, some updates might appear on the Microsoft Office
Online Web site that are not available on Microsoft Update.
Your installations (instances) of Microsoft SQL Server on one computer can possibly get complex,
because you can enable any of the following SQL Server scenarios:
Multiple instances of SQL server on the computer at the same time.
Multiple versions (releases) of SQL.
SQL Server instances in multiple languages on the same computer.
Typically, there is nothing extra you have to do to update these multiple instances; you just need
to make sure that when you specify your synchronization options (for example, product, update
classifications, and language options), you account for requirements for the versions of the SQL Server
instances you have on the computer.
Storing Updates
Note
If your WSUS server is running in replica mode, you will not be able to perform this task.
For more information about replica mode, see Running in Replica Mode.