WSUSOperations Guide
WSUSOperations Guide
WSUSOperations Guide
Abstract
This paper documents the major tasks involved in administering and troubleshooting
Microsoft® Windows Server™ Update Services.
The information contained in this document represents the current view of Microsoft
Corporation on the issues discussed as of the date of publication. Because Microsoft
must respond to changing market conditions, it should not be interpreted to be a
commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any
information presented after the date of publication.
Complying with all applicable copyright laws is the responsibility of the user. Without
limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose,
without the express written permission of Microsoft Corporation.
Microsoft, SQL Server, Windows, and Windows Server are either registered trademarks
or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks
of their respective owners.
Contents
Microsoft Windows Server Update Services Operations Guide.........................................1
Abstract.......................................................................................................................1
Contents.............................................................................................................................3
Note
A downloadable copy of this document is available at
http://go.microsoft.com/fwlink/?LinkId=58310
In this guide
In this guide
• Microsoft Update: the Microsoft Web site that WSUS components connect to for
updates to Microsoft products.
• Automatic Updates: the client computer component built into Windows 2000
with SP3, Microsoft Windows XP, and Windows Server 2003 operating systems.
Automatic Updates enables both server and client computers to receive updates from
Microsoft Update or from a server running WSUS.
• Managing Updates
The Synchronization Options page is the central access point in the WSUS console for
customizing how your WSUS server synchronizes updates. On this page, you can specify
which updates are synchronized automatically, where your server gets updates,
connection settings, and the synchronization schedule.
After you synchronize updates to your WSUS server, you must then approve them before
the WSUS server can perform any action for them. The exceptions to this are updates
classified as Critical Updates and Security Updates, which are automatically approved
for detection. For more information, see "Approving updates for detection in Approving
Updates.
Note
Because WSUS initiates all its network traffic, there is no need to configure
Windows Firewall on a WSUS server connected directly to Microsoft update.
You specify update products and classifications on the Synchronization Options page
under Products and Classifications. Products are grouped in a hierarchy, by product
family. For example, if you select Windows, you automatically select every product that
falls under that product hierarchy. By selecting the parent check box you not only select
all items under it, but all future releases too. Selecting the child check boxes will not
select the parent check boxes. The default setting for Products is All Windows Products,
and for Update classifications, the default setting is Critical Updates and Security
Updates. You must specify update classifications individually.
If your WSUS server is running in replica mode, you will not be able to perform this task.
For more information about replica mode, see Running in Replica Mode.
Synchronization Options.
Note
If you want to stop synchronizing updates for one or more specific products
or product families, clear the appropriate check boxes in the Add/Remove
Products dialog box, and then click OK. Your WSUS server will stop
synchronizing new updates for the products you have cleared. However,
updates that were synchronized for those products before you cleared them
will remain on your WSUS server and will be available on the Updates page.
You specify proxy-server settings on the Synchronization Options page under Proxy
server. This setting will apply only when your WSUS server runs synchronizations. By
default this option is not enabled, and your WSUS server will connect directly to the
upstream server or Microsoft Update. By default, the proxy-server option is not selected,
which means that your WSUS server will attempt to connect directly to another WSUS
server or Microsoft Update during synchronization.
Because WSUS initiates all of its network traffic, you do not need to configure Windows
Firewall on a WSUS server connected directly to Microsoft Update.
Synchronization Options.
2. Under Proxy server, select the Use a proxy server when synchronizing
check box, and then type the server name and port number (port 80 is the
default) of the proxy server.
• If you want to enable basic authentication for the user connecting to the
proxy server, select the Allow basic authentication (password in clear
text) check box.
Options for customizing how your WSUS server synchronizes with the update source
include the following:
• You can specify a custom port for synchronization. For general information about
configuring ports, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
• If your WSUS server is running in replica mode, you just need to type the
server name in the Server name box. The upstream server does not have to
be the administration server (for example, it can be another replica mode
server). For more information about replica mode, see Running in Replica
Mode.
2. Under Schedule, click Synchronize daily at, and then in the list select the
time you want synchronization to start each day.
The central access point in the WSUS console for managing computers is the
Computers page, which displays a list of computers that have been configured to get
updates from the WSUS server. The computers are displayed by computer group, and
you can filter the computer list to a specific computer group. By selecting a computer in
the list, you can view its properties, which include general details about the computer and
the status of updates for it—for example, the installation or detection status of an update
for a particular computer.
You can also manage computer groups on the Computers page, which includes creating
the groups and assigning computers to them. For more information about managing
computer groups, see Managing Computer Groups.
Important
You must first set up a client computer to contact the WSUS server before you
can manage it from that server. Until you perform this task, your WSUS server
will not recognize your client computer, and will not display it in the computer list
on the Computers page. For more information about setting up a client
13
computer, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
A client computer can only be set to communicate with one WSUS server at a
time. If you later change this setting and specify a different WSUS server, the
client computer stops contacting the WSUS server specified earlier. However, the
client computer will remain on the list of computers and in the computer groups
specified on that earlier WSUS server. In addition, the original WSUS server will
report the last time the client computer contacted it (which will be accurate—it will
be before the client computer stopped connecting to it). To stop the client
computer from displaying on the earlier specified WSUS server, you must
remove the computer from the WSUS server.
2. In Groups, click the computer group to which the computer currently belongs
to.
3. In the list of computers, click the computer for which you want to view
properties.
• Click the Status tab for approval and update status for the computer.
3. In the list of computers, click the computer that you want to move.
5. In the Computer group dialog box, click the computer group that you want
to move the computer to, and then click OK.
Note
If your computer already belongs to a computer group, then after you perform
this task it will belong to the new computer group you specify and not to the
earlier computer group. However, it will remain a member of the All
Computers group.
2. In Groups, click the computer group to which the computer currently belongs
to.
4. Under Tasks, click Remove the selected computer, and then click OK.
Note
After you perform this task, you will not be able to manage update distribution
for the client computer on the WSUS console, nor will the client computer will
not be able to receive updates from the WSUS server.
By default, each computer is already assigned to the All Computers group. Computers
will also be assigned to the Unassigned Computers group until you assign them to
another group. Regardless of the group you assign a computer to, it will also remain in
the All Computers group. A computer can be in only one other group in addition to the All
Computers group.
15
You can assign computers to computer groups by using one of two methods, server-side
or client-side targeting, depending on whether or not you want to automate the process.
With server-side targeting, you use the Move the selected computer task on the
Computers page to move one or more client computers to one computer group at a time.
With client-side targeting, you use Group Policy or edit the registry settings on client
computers to enable those computers to automatically add themselves into the computer
groups. You must specify which method you will use by selecting one of the two options
on the Computers Options page.
Note
If your WSUS server is running in replica mode, you will not be able to create
computer groups on that server, you will only inherit the computer groups created
on the administration server from which your server inherits its settings. For more
information about replica mode, see Running in Replica Mode.
Server-side Targeting
With server-side targeting, you use the WSUS console to both create groups and then
assign computers to the groups. Server-side targeting is an excellent option if you do not
have many client computers to update and you want to move client computers into
computer groups manually.
To enable server-side targeting on your WSUS server, click the Use the Move
computers task in Windows Server Update Services option on the Computers
Options page.
Client-side Targeting
With client-side targeting, you enable client-computers to add themselves to the
computer groups you create in the WSUS console. You can enable client-side targeting
through Group Policy (in an Active Directory network environment) or by editing registry
entries (in a non-Active Directory network environment) for the client computers. When
the client computers connect to the WSUS server, they will add themselves into the
correct computer group. Client-side targeting is an excellent option if you have many
client computers and want to automate the process of assigning them to computer
groups.
To enable client-side targeting on your WSUS server, click the Use Group Policy or
registry settings on client computers option on the Computers Options page.
Options.
• If you want to create groups and assign computers through the WSUS
console (server-side targeting), click Use the Move computers task in
Windows Server Update Services.
• If you want to create groups and assign computers by using Group Policy
or by editing registry settings on the client computer (client-side targeting),
click Use Group Policy or registry settings on computers.
Regardless of the method you use to assign client computers to computer groups, you
must also create the computer groups in the WSUS console. In you use the client-side
targeting method, you must create the computer groups in the WSUS console before
your client computers can add themselves to them.
3. In Group name, type a name for your new computer group, and then click
OK.
3. Under Tasks, click Delete the selected group, and then click OK.
Note
You cannot remove the Unassigned Computers or All Computers group.
Every client computer remains a member of the All Computers group in
addition to any group you assign it to. Client computers are members of the
Unassigned Computers group only until you assign them to a computer
group.
17
Managing Updates
In this section
• Updates Overview
• Viewing Updates
• Approving Updates
• Testing Updates
• Storing Updates
Updates Overview
Updates are used for patching or providing a full file replacement for software that is
installed on a computer. Every update that is available on Microsoft Update is made up of
two components:
• Update files are the actual files required to install an update on a computer.
Although the order you might need to perform the following general tasks might be
different, necessitated by your organizational needs, the following is an example of the
order of general tasks you might undertake in updating computers by using WSUS.
• What computer groups you want to create, and the method you will use to
assign computers to them (for example, server-side or client-side targeting)
3. Get the updates and associated metadata on your WSUS server through
synchronization from either Microsoft Update or an upstream WSUS server,
depending on the location you have specified for your update source.
4. Approve or decline updates by group from the Updates page. You can approve
updates for either installation or detection only. For detection only, WSUS does not
install updates but instead checks computers in the groups you specified, to see if a
specific update is needed. To get the result of the detection (or, in other words, to find
out if the update is needed), check the Status of Updates report. You can set a
deadline for automatic installation or detection. For installation, you have the option of
allowing users to install the updates themselves (if they are local administrators on
their client computers).
Update Classifications
Update classifications represent the type of update. For any given product or product
family, updates could be available among multiple classifications (for example,
Windows XP family Critical Updates and Security Updates). The following table lists
examples of update classifications.
Viewing Updates
On the Updates page, you can do the following:
• View the list of updates. The list of updates displays updates that have been
synchronized from the update source to your server running Windows Server Update
Services (WSUS) and are available for approval. You can filter the list of updates by
using criteria such as classifications and products, approval status, synchronization
21
date, and text string. In addition, you can sort the list of updates by clicking the
appropriate column heading in the list of updates title bar
• Decline updates.
To view updates
1. On the WSUS console toolbar, click Updates. Updates are displayed in the
list of updates.
2. Under View, select the appropriate criteria for your filter in the list boxes, and
then click Apply. The list of updates will reflect your chosen criteria. The
Contains Text box, under View, enables you to enter text to search on the
following criteria for an update: Title, Description, and Microsoft Knowledge
Base (KB) article number. Each of these items is a property listed on the
Details tab in the update properties.
2. In the list of updates, click the update for which you want to view properties.
3. In the properties pane, click one of the tabs for the following:
• The Details tab displays both general properties (for example, title,
description, and release date) and installation information (for example,
requirements for installation, including whether the update is uninstallable)
about the update. In addition, the Details tab indicates if the update
supersedes or is superseded by another update.
22
• The Status tab displays download, approval, and installation status for
the update by computer group. You can further expand computer groups to
see update status by computer.
Note
You can perform this procedure on only one update at a time. If you select
multiple updates, the first update selected will be displayed in the properties
pane.
Approving Updates
After updates have been synchronized to your WSUS server, you must approve them to
initiate a deployment action. When you approve an update, you are essentially telling
WSUS what to do with it (for example, your choices are Install, Detect only, Remove, or
Decline update). When approving an update, you specify a default approval setting for
the All Computers group, and any necessary settings for each computer group in the
Approve Updates dialog box. If you do not approve an update, its approval status
remains Not approved and your WSUS server performs no action for the update. The
exceptions to this are in the Critical Updates and Security Updates classifications,
which by default are automatically approved for detection after they are synchronized.
The Updates page is the central access point in the WSUS console for approving
updates. On the Updates page, you can specify the action you want WSUS to exercise
for the update by computer group. You do this by selecting one of the options under
Tasks. The following provides more information about the different approvals you can
enable on the Updates page.
If your WSUS server is running in replica mode, you will not be able to approve updates
on your WSUS server. For more information about replica mode, see Running in Replica
Mode.
By default, Critical Updates and Security Updates are automatically approved for
detection.
2. In the list of updates, click one or more updates that you want to approve for
detection.
4. In the Approve Updates dialog box, verify that Approval is set to Detect
only for the All Computers group.
5. If you want to set a different default approval setting for one or more groups,
under Group approval settings for the selected updates, find the group(s) for
which you want to set the special approval setting, and then, in the Approval
column, select an approval setting.
• Use the settings on the client computers to determine when to install updates.
When you select this option, users in the targeted computer group will receive a
notification dialog box and an Automatic Updates icon on their taskbar when
updates are ready to be installed on their computers. They can then install the
updates immediately, or at a later time, by clicking the Automatic Updates icon. If
you have configured Automatic Updates, either by Group Policy or locally, to notify
the user before installation, these notifications will be offered to any non-administrator
who logs onto the computer in the targeted computer group.
• Set a deadline for automatic installation. When you select this option, you set
specific times and dates to install updates, overriding any settings on the client
computers. In addition, you can specify a past date for the deadline if you want to run
an approval action immediately (that is, when the client computers next contact the
WSUS server).
24
Important
You cannot set a deadline for automatic installation for an update if user input is
required (for example, accepting a license agreement or specifying a setting
relevant to the update). If you set a deadline for such an installation
synchronization will fail. To determine whether an update will require user input,
look at the May request user input field in the update properties for an update
displayed on the Updates page. Also check for a message in the Approve
Updates box which says "The selected update requires user input and does
not support and installation deadline."
2. In the list of updates, click one or more updates that you want to approve for
installation.
4. In the Approve Updates dialog box, verify that Approval is set to Install for
the All Computers group.
5. To specify how and when the update will be installed for computers in the
computer group, next to Deadline, click None, and then click one of the following
options:
• If you want to enable users to determine when to install the updates, click
Use client settings to determine update installation time, and then click
OK. If you have configured Automatic Updates, either by domain-based or
local Group Policy, to notify the user before installation, these notifications
will be offered to any non-administrator who logs onto the computer in the
targeted computer group.
• If you want the update to be installed automatically, click Install the
update by the selected date and time, specify the date and time of the
deadline, and then click OK. If you want the install to occur immediately (that
is, when the client computers next contact the WSUS server), you can
specify a past date for the deadline.
6. If you want to set a different default approval setting for one or more groups,
under Group approval settings for the selected updates, find the group(s) for
which you want to set the special approval setting, and then, in the Approval
column, click an approval setting.
25
Note
For more information about downloading and installing updates, see Best
Practices with Windows Server Update Services.
Declining Updates
This option is available as a task under Update Tasks on the Updates page. If you select
this option, the update is removed from the list of available updates. Declined updates will
appear in the updates list only if you select either Declined or All updates in the
Approval list when specifying the filter for the update list under View.
To decline updates
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click one or more updates that you want to decline.
2. In the list of updates, click one or more updates that you want to approve for
removal.
4. In the Approve Updates dialog box, verify that Approve is set to Remove
for the All Computers group.
the client computers next contact the WSUS server), you can specify a past date
for the deadline.
6. If you want to set a different default approval setting for one or more groups,
under Group approval settings for the selected updates, find the group(s) for
which you want to set the special approval setting, and then, in the Approval
column, click an approval setting.
You can configure automatic approval for updates by update classifications and groups. If
the installation and detection rules you set conflict, your WSUS server will follow the
installation rules.
On the Automatic Approval Options page, you can also select an option to
automatically approve revisions to existing updates as they become available. This option
is selected by default. A revision is a version of an update that has had changes made to
it (for example, it might have expired, or UI text, the EULA, or applicability rules for
computers might have changed). If you do not choose to automatically approve the
revised version of an update, WSUS will use the older version, and you must manually
approve the update revision.
On this page, you can also set a rule for automatically approving updates for installation.
In the event that rules conflict (for example, you have specified the same update
classification and same computer group combination in both the rule to automatically
approve for detection and automatically approve for installation), then your WSUS server
applies the rule to automatically approve for installation.
27
4. If you want to specify the computer groups for which to automatically approve
updates during synchronization:
On this page, you can also set a rule for automatically approving updates for detection. In
the event that rules conflict (for example, you have specified the same update
classification and same computer group combination in both the rule to automatically
approve for installation and automatically approve for detection), then your WSUS server
applies the rule to automatically approve for installation.
approve updates for installation by using the following rule check box (if it is
not already selected).
4. If you want to specify the computer groups for which to automatically approve
updates during synchronization:
• Improves the efficiency of its update file package, which is installed on client
computers if the update is approved for installation. For example, the superseded
update might contain files that are no longer relevant to the fix, or to the operating
systems now supported by the new update, so those files are not included in the
superseding update's file package.
• Updates newer versions of operating systems. It is also important to note that the
superseding update might not support earlier versions of operating systems.
In the list of updates on the Updates page, an icon next to the update indicates that it
has a supersedure relationship to another update. The Details tab in the properties for
the update tells you whether the update supersedes or is superseded by another update.
In addition, you can determine which updates supersede or are superseded by the
update by looking at the Supersedes and Superseded by entries. The properties box for
the update is available at various locations in the WSUS console (for example, on the
Updates page, on the Computers page).
WSUS does not automatically decline superseded updates, and it is recommended that
you do not assume that superseded updates should be declined in favor of the new,
superseding update. Before declining a superseded update, make sure that it is no longer
needed by any of your client computers. Following are examples of scenarios where you
might need to install a superseded update:
2. Check the resulting status of the approval action on your computers. Note
which computers show status as Not needed for the update, and then compare
the properties of those computers with the properties of the update.
3. Use the information available in the update properties to help you determine
which previously released version of the updates are available. For example,
look under Supersedes on the Details tab, and check the Description and KB
article number entries if appropriate.
5. When you find a superseded update that seems appropriate for the
remaining client computers, approve the update for installation.
6. Repeat this process until all of your client computers are updated with the
intended fix.
• If you have purchased a "per user" license agreement for Office, you must
ensure that each user's installation of Office is updated (for example, there might be
two users who run individually licensed copies of Microsoft Office on the same
computer). This means a particular user has to be logged on to the computer for that
specific copy of Office to be updated. For example, if two people both have accounts
on a computer that is running Microsoft Office, then each of them has to log on and
update his or her Office installation, otherwise one of them will not have an updated
version of Office.
31
• Users can access the public Microsoft Office Online Web site and can look for
updates to their Office installation through the Microsoft Office Update wizard. Using
Group Policy, you might want to create policies that prevent users from getting their
own Office updates from Microsoft Office Online.
• Unlike Windows Update or Microsoft Office Online, which are public Web sites
that users can visit directly, Microsoft Update is accessed only by WSUS servers. It is
currently in beta release and makes security updates available only for Office XP and
Office 2003. Some critical updates are not available through Microsoft Update.
Therefore, some updates might appear on the Microsoft Office Online Web site that
are not available on Microsoft Update.
Your installations (instances) of Microsoft SQL Server on one computer can possibly get
complex, because you can enable any of the following SQL Server scenarios:
Updating Microsoft SQL Server and Microsoft Exchange Servers That Are Part of a
Cluster
Both Microsoft SQL Server and Microsoft Exchange Server can be installed in a
clustered environment. If there is an update available for servers in a cluster that are
running these programs, each server in the cluster must be updated individually.
Microsoft recommends that you update passive cluster nodes individually (for example,
stop the cluster service for the server while you update it) until all cluster nodes are
updated.
Note
You can have both a stand-alone instance and a cluster instance of SQL Server
on the same server. If you are updating a server that is running both a stand-
alone instance and a cluster instance of SQL server, both SQL Server instances
32
will be updated if you have specified the correct synchronization options (product,
update classification, and language). For more information about setting
synchronization options, see Setting Up and Running Synchronizations.
Testing Updates
Until you install an update, you cannot be certain about the impact it will have on the
existing code running on your systems. By installing an update in a test environment
before deploying it to your production environment, you can analyze and assess its
impact before it has the opportunity to harm your production systems. This can prevent
unplanned downtime and lost productivity.
WSUS enables you to create custom computer groups, which you can use to test
updates. For example, the following figure depicts three computer groups: two custom
groups created by the administrator (Test and Accounting), as well as the built-in All
Computers group.
In this example, the Test group contains a small number of computers representative of
all the computers contained in the Accounting group. This creates a virtual test lab. The
administrator can first approve updates for the Test group. If the testing goes well, the
administrator can roll out the updates to the Accounting group.
You can expand this basic scenario to fit testing needs for your organization. For
example, you can create multiple test computer groups that resemble actual computer
groups containing computers with different configurations.
33
Storing Updates
In this section
If you decide to store update files on your server, the recommended minimum disk size is
30 GB. However, depending on the synchronization options you specify, you might need
to use a larger disk. For example, when specifying advanced synchronization options, as
in the following procedure, if you select options to download multiple languages and/or
the option to download express installation files, your server disk can easily reach 30 GB.
Therefore if you choose any of these options, install a larger disk (for example, 100 GB).
If your disk gets full, you can install a new, larger disk and then move the update files to
the new location. To do this, after you create the new disk drive, you will need to run the
WSUSutil.exe tool (with the movecontent command) to move the update files to the new
disk. For this procedure, see Managing WSUS from the Command Line.
Express installation files download in a package that is usually multiple times larger than
a regular update package. The express installation file package contains the different
versions of the update that will apply to specific client computer configurations. If you
select this option, the package containing all multiple versions of update files is
downloaded to your WSUS server. However, when your client computers connect to the
server, they will download only the update files they need, which are the files that are
compliant for the specific computer. You might have selected the express installation file
option if you are less concerned with external bandwidth than internal bandwidth usage.
The option to download and store express installation files is in covered in step 3 in the
following procedure.
3. Under Update Files, select whether to store update files on the server
running Windows Server Update Services (WSUS) or on Microsoft Update. If you
choose to store update files on your server, you can choose either to download
update files only when they are approved, or to download express installation
files.
4. If you selected to store the files on the WSUS server, under Languages,
select whether you want to limit the updates downloaded to your WSUS server
by language, and then click OK. Note that if you select to download all languages
(which is selected by default) that this will take more disk space. If possible,
consider limiting the languages you download if you are also choosing to store
update files on your WSUS server.
Note
If your WSUS server is running in replica mode, you will not be able to
perform this task. For more information about replica mode, see Running in
Replica Mode.
You might need to change the location where WSUS stores updates locally. This might
be required if the disk becomes full and there is no longer any room for new updates. You
might also have to do this if the disk where updates are stored fails and the replacement
disk uses a new drive letter.
You must create the new path for local WSUS update storage prior to using
WSUSutil.exe. The movecontent command takes an optional -skipcopy parameter. The
-skipcopy parameter enables you to change the location of local WSUS update storage
without copying any files. For more information about WSUSutil.exe, see Deploying
Microsoft Windows Server Update Services at http://go.microsoft.com/fwlink/?
linkid=41777&clcid=0x409.
where D:\WSUS1 is the new path for local WSUS update storage, and
D:\move.log is the path to the log file.
Note
If you do not want to use WSUSutil.exe to change the location of local WSUS
update storage, you can also use NTFS functionality to add a partition to the
current location of local WSUS update storage. For more information about
NTFS, go to Help and Support Center in Windows Server 2003.
• Information about client computers, updates, and client interaction with updates
Depending on your server and network configurations, you are running an MSDE,
WMSDE, or SQL Server 2000 database for your WSUS installation (for more information
about your database options when installing WSUS, see "Choose the Database Used for
WSUS" in Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
The following table describes non-deployment tasks you might have to perform as part of
regular operations.
Database Tasks
Database Tasks
In this section
If you chose to use the MSDE or WMSDE to host the WSUS database when you set up
your WSUS server and have been running WSUS for some time, you might be
considering upgrading the database engine to a full installation of SQL Server 2000.
Using SQL Server 2000 can provide the following:
• More storage capacity - For example, the MSDE can store a maximum of 2 GB
of data. Depending on the types of updates you synchronize regularly, you might find
that the 2 GB gets filled up quickly, and you need to frequently manage the space in
your database.
• Ability to administer the WSUS database directly - you can utilize the
management capabilities provided by SQL Server 2000 through the Enterprise
Manager.
Database Requirements
• WSUS requires SQL Server 2000 with Service Pack 3a. If you use the full
version of SQL Server, the SQL server administrator should first verify that the nested
triggers option on the SQL server is turned on. Do this before setting up the WSUS
database.
Scenarios
• Migrating the MSDE or WMSDE to SQL Server 2000 running on the same server
• Migrating the MSDE or WMSDE to SQL Server 2000 running on another server
(remote SQL)
Migrating the WSUS database from a MSDE or WMSDE instance to SQL Server 2000
instance running on the same server
This procedure migrates the WSUS database to a SQL Server 2000 instance running on
the same server. Note that there might be some differences in the procedures if your
server is running Windows 2000, which are noted within the procedure.
To migrate the WSUS database from an MSDE or WMSDE instance to a SQL Server
2000 instance on the same server
1. Install SQL Server 2000a (with the Server and Client Tools option) and SQL
Server 2000a Service Pack 3 or higher on your WSUS server.
2. In SQL Server Enterprise Manger, add the MSDE or WMSDE instance to the
SQL Server Group. This enables you to manage the MSDE or WMSDE instance in
Enterprise Manager:
a. Click Start, point to Programs, point to Microsoft SQL Server, and then
click Enterprise Manager.
b. Under the Console Root, expand Microsoft SQL Servers, right-click SQL
Server Group and then click New SQL Server Registration.
c. Complete the Register SQL Server wizard, choosing the following options
when prompted:
4. Stop the IIS Admin service and the Update Services service:
39
a. Click Start, point to Programs, point to Administrative Tools, and then click
Services.
5. Detach the WSUS database (SUSDB) from the WMSDE or MSDE instance
b. Right-click SUSDB, point to All Tasks, and then click Detach Database.
Click OK, and then click OK, when the confirmation dialog boxes appear.
6. Attach SUSDB to the destination SQL instance. Note that the default instance is
(Local)(Windows NT).
a. Under the instance node, right-click Databases, point to All Tasks, and then
click Attach Database.
b. In the Attach Database box, under MDF file of database to attach, browse
to the location of the susdb.mdf file (by default this is C:\Program
Files\Microsoft SQL Server\MSSQL$WSUS\Data if you installed the MSDE,
and C:\WSUS\MSSQL$WSUS\Data if you installed WMSDE), and then click OK.
(Note that SUSDB includes both SUSDB.mdf and SUSDB_log.ldf, which is the
master log file. SQL will add both for you.) Click OK again when the confirmation
dialog box appears.
7. In the destination SQL instance, add two new logins: [ServerName]\ASPNET and
NT AUTHORITY\NETWORK SERVICE (the NT AUTHORITY\NETWORK SERVICE
login is not required if the WSUS server is running Windows 2000 Server).
b. In the SQL Server Login Properties – New Login dialog box, in the Name
box, type: [ServerName]\ASPNET.
e. In the Database roles for SUSDB box, under Permit in Database Role,
select public, and select webService, and then click OK.
8. Edit the registry to point WSUS to the SQL instance that now holds SUSDB.
a. Click Start, click Run, type: regedit, and then click OK.
10. Open Services and then start the IIS Admin service and Update Services
service.
a. Click Start, point to Programs, point to Administrative Tools, and then click
Services.
11. Verify that the database migration has been successful by opening the WSUS
console from Internet Explorer (in the Address box, type: http://
[ServerName]/WSUSAdmin).
Note
You might have to restart the server for these settings to take effect.
Migrating the WSUS database from an MSDE or WMSDE instance to a SQL Server 2000
instance on another server
The goal of this scenario is to take the WSUS database (SUSDB) running in a MSDE or
WMSDE instance (which you can choose to install during WSUS Setup) and to move and
upgrade it to a SQL Server 2000 instance running on a remote server. By upgrading the
WSUS database you are able to manage it using all of the features provided by SQL
Server 2000.
At the completion of this scenario, you will have a WSUS implementation consisting of a
front-end server through which you access the WSUS console and administer WSUS,
and a back-end sever running SQL Server 2000, which will host the WSUS database.
• You cannot use a server configured as a domain controller for either the front end
or the back end of the remote SQL pair.
• You cannot use WMSDE or MSDE for database software on the back-end server.
• Both the front-end and the back-end servers must be joined to an Active
Directory domain.
There are 11 steps that make up this procedure. Some of the steps require a number of
sub-procedures.
For ease of explanation, Server1 and Server2 are used to indicate the front-end and
back-end servers respectively. Note that in each step, where appropriate, it is noted on
which server you must perform the procedures. More information about Server1 and
Server2:
Server1
Server2
To migrate the WSUS database from an MSDE or WMSDE instance to a SQL Server
2000 instance on another server
Notes:
42
• You must run WSUS Setup from a command line so that you can use command-
line options. Use the /b command-line option.
• You do not need to have IIS installed on the back-end server. Except for IIS, all
other prerequisites for a normal WSUS installation are required.
1. Download the WSUS setup files to the server. At the Run command or at a command
line, navigate to the folder containing the WSUS setup files you downloaded and type
the following command: wsussetup.exe /b
• On the Database Options page, in the Select SQL instance name box,
select the SQL Server instance where you want to install the WSUS database.
Note that <Default> will be the only instance available if you decide not to create
any new instances.
You must run a SQL script to identify how update storage is being managed on the front-
end server. Depending on whether client computers are getting updates locally from the
front-end server or are downloading updates directly from Microsoft, you will use one of
the following scripts. Note that you established where clients obtain updates when you
originally installed WSUS on the front-end server.
If you cannot remember how you configured the front-end server, you can find out by
reading the log file located on the front-end server by typing the following at a command
prompt:
Where [InstallDate] is the date you installed WSUS. From this file you need the value for
two keys: HostOnMu, and LocalContentCacheLocation.
• If you chose local storage on the front-end server, at a command prompt type:
Where
43
• [%drive%]\program files\update services\tools\osql\osql.exe is the default
location of the osql.exe tool on Server2.
Note
Do not use a network location or a UNC path. Do not add a trailing backslash (\).
Where
a. On the Server2, click Start, point to Administrative Tools, and then click
Computer Management.
b. In the tree, expand Local Users and Groups, and then click Groups.
This procedure has two parts--if Server2 is running Windows 2000 Server, you must first
create a global security group and add Server1 as a member, then configure permissions
on Server2.
Part 1: Create a global security group and add the front-end server as a member
1. On a computer with Active Directory Administrative Tools installed, click Start,
point to Administrative Tools, and then click Active Directory Users and Computers.
2. In the tree, right-click the folder in which you want to create the new group.
6. In Group Type, click Security, and then click OK. A global security group is
created.
9. Click Add.
12. In Enter the Object names to select (examples), enter the name of Server1, and
then click OK.
13. In the global security group properties dialog box, click OK.
1. On Server2, click Start, point to Administrative Tools, and then click Computer
Management.
2. In the tree, expand Local Users and Groups, and then click Groups.
6. Double-click the global security group you created in the preceding procedure,
and then click OK.
2. Right-click SUSDB, point to All Tasks, and then click Detach Database. Click
OK, and then click OK, when the confirmation dialog boxes appear.
3. Locate and then rename the existing susdb.mdf and susdb_log.ldf files. It is
important to note where they are stored in the file system. You will be copying the
files of the same name from Server1 later in this process to the same location.
Step 3 [On Server1]: Install Microsoft SQL Server 2000 with "Client Tools Only" option.
This step will enable you to use the SQL Server Enterprise Manager on Server1.
Step 4 [On Server1]: Stop the IIS Admin service and the Update Services service, and
close any Internet browser that is connecting to the WSUS console.
1. Click Start, point to Programs, point to Administrative Tools, and then click
Services.
2. Right-click SUSDB, point to All Tasks, and then click Detach Database. Click
OK, and then click OK, when the confirmation dialog boxes appear.
Step 6: Copy the SUSDB.mdf and SUSDB_log.ldf files from Server1 to Server2.
• In Step 2, you noted the folder location on Server2 where these files are stored.
Copy the files to this folder on Server2.
Step 7 [On Server2]: Attach the WSUS database to a SQL Server 2000 instance.
1. Under the [InstanceName] node, right-click Databases, point to All Tasks, and
then click Attach Database.
46
2. In the Attach Database box, under MDF file of database to attach, browse to
the location of the susdb.mdf file , and then click OK. (Note that SUSDB includes
both SUSDB.mdf and SUSDB_log.ldf, which is the master log file. SQL will add both
for you.) Click OK again when the confirmation dialog box appears.
Step 8 [On Server1]: Configure the front end computer to use the database on the
backend computer.
In this step, you edit the registry to point WSUS to destination SQL instance.
1. Click Start, click Run, type: regedit, and then click OK.
Note
When entering [Server2Name], do not add the domain name, such as [DomainName]\
[Server2Name].
Use Add or Remove Programs in Control Panel to uninstall the WMSDE or MSDE
instance. The name of the MSDE or WMSDE instance to remove is Microsoft SQL
Server Desktop Engine (WSUS).
Step 10 [On Server1]: Start the IIS Admin service and the Update Services service.
1. Click Start, point to Programs, point to Administrative Tools, and then click
Services.
From any computer in your network, open an Internet Explorer browser and access the
WSUS console at http://[Server1 name]\WSUSadmin.
Note
You might need to restart Server1 in order for these settings to take effect.
See Also
If your WSUS server is running in replica mode, you will be able to perform only limited
administration capabilities on the server, which will primarily consist of:
For more information about setting up and running in replica mode, see Deploying
Microsoft Windows Server Update Services at http://go.microsoft.com/fwlink/?
linkid=41777&clcid=0x409.
• WSUS server configuration information, which includes all settings for your
WSUS server (that is, options you specified through the WSUS console and
settings configured by WSUS automatically during setup).
• The folder where the update files are stored. Update files are the actual files
required to install an update on a computer. By default, update files are stored in the
%systemdrive%\WSUS\WSUSContent folder on your WSUS server. If you have
chosen to store update files on Microsoft Update (either during setup or on the
Options page), you do not have to back up the update file storage folder on your
WSUS server.
If you are using a full version of Microsoft SQL Server 2000 for your database, which is
not installed by WSUS, you can use SQL Server Enterprise manager as an alternative to
the Backup Utility. For more information about SQL Server Enterprise Manager, refer to
your SQL Server documentation. For more information about database options and
configurations for WSUS, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
4. Verify that Back up files and settings is selected, and then click Next.
5. Click Let me choose what to back up, and then click Next.
7. Use the Browse button to choose a place to save your backup, type a name
for the backup, and then click Next.
8. If you want to set additional specifications for your backup, including whether
it will be an incremental backup, whether you want to verify the backup, set a
recurring schedule for the backup, or other options, click Advanced, and then
follow the instructions in the wizard.
10. When the message appears that informs you that the backup is complete,
click Close.
4. Verify that Back up files and settings is selected, and then click Next.
5. Click Let me choose what to back up, and then click Next.
7. Use the Browse button to choose a place to save your backup, type a name
for the backup, and then click Next.
8. If you want to set additional specifications for your backup, including whether
it will be an incremental backup, whether you want to verify the backup, set a
recurring schedule for the backup, or other options, click Advanced, and then
follow the prompts that appear in the wizard.
10. When the message appears that informs you that the backup is complete,
click Close.
5. In the What to restore dialog box, under Items to restore, expand the file
that contains the WSUSContent folder (under %systemdrive%\WSUS\), and then
click Next.
6. If you want to set additional specifications for your restore, including whether
you want to restore the files or folders to a different location, replace existing
files, restore security settings, or specify other options, click Advanced, and then
follow the instructions in the wizard.
8. When the message appears that informs you that restoring is complete, click
Close.
6. If you want to set additional specifications for your restore, including whether
you want to restore the files or folders to a different location, replace existing
files, restore security settings, or specify other options, click Advanced, and then
51
8. When the message appears that informs you that restoring is complete, click
Close.
Important
Microsoft recommends that you do not edit the Default Domain or Default
Domain Controller GPOs.
Typically, when you configure WSUS through Group Policy (in an Active Directory
network environment), you set up your client computers to connect to a WSUS server
and download updates once a day. By default, this is every 22 hours (minus a random
time offset, described later in this topic) at which time the approval actions you specified
for the new updates (for example, installation, detection, or removal) run on the client
computer.
However, if you are aware of and want to protect computers against immediate security
threats, you might want to set up more a more frequent schedule for computers to
contact the WSUS server, download, and install updates.
To specify how and when computers are updated through Group Policy
1. In Group Policy Object Editor, expand Computer Configuration, expand
Administrative Templates, expand Windows Components, and then click
Windows Update.
52
2. In the details pane of Group Policy Object Editor, configure the appropriate
policies. See the following table for examples of the policies you might want to
set.
Policy Description
Policy Description
It will take a few minutes before the new policies you have configured take effect. It will
be about 20 minutes after Group Policy refreshes (applies any new settings to the client
computer). By default, computer Group Policy refreshes in the background every 90
minutes, with a random offset of 0 to 30 minutes. If you want to refresh Group Policy
sooner, you can go to a command prompt on the client computer and type:
gpupdate /force.
• Deploy updates by using a deadline in the future. For example, set the WSUS
servers or computers with a scheduled installation at a time when it is feasible for
them to be briefly offline (for example, on Sunday at 3:00 A.M).
There are a couple of Group Policies that enable you to configure when a computer is
restarted. However, when talking about servers, these policies have some limitations over
control:
2. Create a script to automate installing the updates and then restarting of your
server. This script would have the effect of a “button” you would push to initiate all
this, therefore the updates install and the server restarts when you run the script. You
can do this at the most appropriate time. For more information about creating scripts
to automate Automatic Updates tasks (for example downloading and installing
updates on server and client computers), see Windows Update Agent Software
Developer's Kit (http://go.microsoft.com/fwlink/?LinkID=43101)
• Provides and defines the syntax you would use to run specific tasks.
Running WSUSutil.exe
WSUSutil.exe is a tool that you can use to manage your WSUS server from the
command line. WSUSutil.exe is located in the %drive%\Program Files\Update
Services\Tools folder on your WSUS server. You can run specific commands with
WSUSutil.exe to perform specific functions, as summarized in the following table. The
syntax you would use to run WSUSutil.exe with specific commands follows the table.
56
Summary of Commands You Can Use with WSUSutil
The export
command enables
you to export update
metadata to an
export package file.
You cannot use this
parameter to export
update files, update
approvals, or server
settings.
The import
command imports
update metadata to a
server from an export
package file created
on another WSUS
server. This
synchronizes the
destination WSUS
server without using
a network
connection.
Syntax
Parameter Definition
Import
For background and procedural information about exporting and importing updates, see
"Set Up a Disconnected Network (Import and Export Updates)" in Deploying Microsoft
Windows Server Update Services at http://go.microsoft.com/fwlink/?linkid=41777.
Syntax
Parameter Definition
Parameter Definition
Migratesus
SUS 1.0 to WSUS migration scenarios and related procedures are covered extensively in
the "Migrate from a SUS Server to a WSUS Server" topic in Deploying Microsoft
Windows Update Services at http://go.microsoft.com/fwlink/?LinkID=41777.
Syntax
Parameter Definition
Movecontent
When you run this command, WSUSutil.exe does the following:
• Copies the update files from the old location into the new location.
• Updates the WSUS database to refer to the new location of the update files.
61
The destination folder where update files are moved to must be on an NTFS partition.
The content move tool will not try to copy update files if they already exist in the
destination folder. WSUSutil.exe sets the same permissions on the destination folder that
were set on the original folder.
Note
You can use xcopy, the Backup utility, or other non-WSUS specific methods to
copy update files from the old location into the new one. If you copy the files by
using a method other than WSUSutil.exe, you still need to run WSUSutil.exe to
perform the second part of the move. In this case you would use the skipcopy
parameter when running WSUSutil.exe. See "Syntax" below for more
information.
There are two scenarios in which you might move update files from one WSUS drive to
another:
If the drive where WSUS stores update files is full, you can do one of the following:
• Add more space to your current drive by using NTFS functionality. This is done
without using WSUSutil.exe. This method does not affect WSUS configuration or
operation.
• Install a new drive, and then move the update files from the old drive to the new
location by using Wsusutil.exe.
If the hard disk that stores update files fails, you must do the following:
1. Install the new disk on your computer, and then restore the update files from your
backup files. Note: If you have not backed up your update files, WSUSutil.exe
downloads the missing files at the end of the content move operation.
2. Run the content move operation, specifying the location for the new disk. In
addition, you specify the skipcopy parameter, because you are either putting the
files in the new folder through the Backup utility or the source folder does not exist;
the update files will be downloaded at the end of this process.
3. When the move operation is complete, all the missing files are downloaded.
Syntax
62
At the command line %drive%\Program Files\Update Services\Tools>, type:
Parameter Definition
Reset
You use this command if you store updates locally on your WSUS server and want to
ensure that the metadata information stored in your WSUS database is accurate. With
this command, you verify that every update metadata row in the WSUS database
corresponds to update files stored in the local update file storage location on your WSUS
server. If update files are missing or have been corrupted, WSUS downloads the update
files again. This command might be useful to run after you restore your database, or as a
first step when troubleshooting update approvals.
Syntax
wsusutil reset
Deleteunneededrevisions
If you use an MSDE database in your WSUS implementation (for example, if you are
using WSUS on a server running Windows 2000), you might need to run this command
periodically when the database reaches its 2-GB limit because once the database is full,
you cannot synchronize new updates to your server, add new computers, or import
events from existing client computers.
63
With regular use, it is possible that the 2 GB will be reached quickly, as updates can be
very large, and update publishers typically create multiple revisions of each update,
which your server will synchronize automatically for the products and update
classifications you specify. In addition, event information for client computers also
populates the database. When your MSDE database is close to reaching its limit, you will
receive a notification on the WSUS console Home page alerting you to run this command
soon. When you run this command, unneeded revisions and the events associated with
those revisions are deleted from the database.
Unneeded revisions are revisions to software or drivers updates that have not been
deployed to a computer group in at least one month; they are also the latest revisions to
expired driver updates that have not been deployed to a computer group for at least one
month. The one-month time period in both of these cases can be changed, indirectly. It
automatically gets reduced by 7 to 15 days if you reduce the size of a database that is
larger than 1 GB by less than 25 percent in the process of running this command.
Note
For more information about the databases you can use with WSUS, see the
"Choose the Database Used for WSUS" topic in Deploying Microsoft Windows
Update Services at http://go.microsoft.com/fwlink/?LinkID=41777.
Syntax
wsusutil deleteunneededrevisions
Important
Before running this command, you must stop the World Wide Web publishing
service in IIS. You must restart it only after you have finished running this
command. To stop or start the IIS service, open IIS, navigate to and then right-
click the Web site where WSUS is is installed (by default this is the Default Web
Site), and then click Stop or Start.
Listinactiveapprovals
If you change language options on an upstream WSUS server, you can create a situation
where the number of updates approved on a parent upstream server does not match the
number of approved updates on a replica server.
You have configured your upstream parent server to synchronize from Microsoft Update
and have left the language setting set to All Languages (the default). You then run
synchronization and approve 300 updates, of which 50 are not English language
64
updates. You then change the language setting on the server to English only. After this,
a replica server synchronizes from the parent upstream server and downloads only the
"active" approvals, which now are only the English language ones (replica servers always
only synchronize active approvals). At this point, if you look on the WSUS console on the
parent server, you will see that 300 updates are approved. If you do the same on the
replica server, you will see that only 250 are approved. You would use
listinactiveapprovals to see a list of the updates on the parent upstream server that are
permanently inactive—in this case, you would see the 50 updates that are not English.
You can run this command if you want to see a list of the inactive approvals (for example,
to help you decide if you want to remove the inactive approvals). You do not have to run
this command before running the removeinactiveapprovals command.
Syntax
wsusutil listinactiveapprovals
Removeinactiveapprovals
The scenario in which you would use this command is the same as the one described for
listinactiveapprovals. However, while you use listinactiveapprovals to list the inactive
approvals on the parent upstream server, you use removeinactiveapprovals to remove
them. You do not have to run the listinactiveapprovals command before running this
command.
Syntax
wsusutil removeinactiveapprovals
• Running Reports
Status Description
Status Description
Status Description
Running Reports
Reports enable you to monitor the components of your Windows Server Update Services
implementation.
The report displays information resulting from the most recent contact between client
computers and the WSUS server. The frequency with which client computers contact the
WSUS server is configured through Group Policy. By default, this is every 22 hours.
Unless you want to change the contact frequency for your client computers, generate this
report the day after you approve updates, so that it reflects your latest approvals. For
more information about configuring Group Policy, see Deploying Microsoft Windows
Server Updates Services at http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Note
You can use a command-line tool on client computers that are running the WSUS
client software (Automatic Updates) in order to initiate contact between the client
computer and WSUS server. This can be useful if you want to get immediate
update status for a particular computer—you can run this tool to force connection
and then generate a Status of Updates report.
The update summary view is the default view that appears when you run a Status of
Updates report. By default, the report displays an alphabetical list of approved updates.
You can filter the display by both approval action and computer group by making
appropriate selections under View and then clicking Apply. Your filter is reset to the
default list of all updates when you close the Status of Updates report.
The columns displayed in the update summary view are described in the following table.
Last Updated The date that the latest action for this
update occurred.
The computer group view displays the status of an update by computer group. To use this
view, expand any update that is listed in update summary view.
The columns displayed in the computer group view are described in the following table.
Computer view
The computer view displays the status of each computer in a computer group. To use the
computer view, expand a computer group.
The columns displayed in this view are described in the following table.
You can print the report in update summary, computer group, or computer view,
depending on how you have expanded the Status of Updates report.
Note
You cannot use the Print report task to print a dialog box, and the Print report
task is not enabled if a dialog box is open.
Status Description
You can also print the report, including the list of individual updates with status for
individual computers, if you have expanded the computers (clicked the + symbol).
However, you cannot print the dialog box that appears when you click individual updates
in the list or when you click the status for an individual update.
2. Under View, select the criteria you want to use to filter the report, and then
click Apply. The report displays a cumulative update status summary for all of
the computers in the computer group and for the status you specified.
3. If you want more information about a specific computer, you can do the
74
following:
• To view the status of individual updates for the computer, expand the
computer (click the + sign next to the computer). In addition, you can see the
properties of an individual update by clicking the title of the update.
• To view more information about the specific status result of an update (or,
the event details), click the status for the update.
3. To change the synchronization period for the report, under View, select
another synchronization period in the list, and then click Apply.
Note
The Print report task is not enabled if you have a dialog box open. You
cannot use the Print report task to print a dialog box.
The report has four components, which are described in the following table.
The following table describes the components of the Settings Summary report.
3. If you want more information about a specific update under Update Status,
you can do the following:
• To view the properties of an individual update, click the title of the update.
• To view more information about the specific status result of an update (or
the event details), click the status for the update.
4. To print the report, click the File menu, and then click Print.
3. To print the report, click the File menu, and then click Print.
78
For more information about configuring your WSUS server to use SSL, see Deploying
Microsoft Windows Server Update Services at http://go.microsoft.com/fwlink/?
linkid=41777&clcid=0x409.
In this guide
• Registry settings
• Configuration settings
• IIS settings
• Permissions
79
Important
These settings are configured during WSUS setup by default. They are listed
here as a reference, to use as checkpoints when troubleshooting. When
troubleshooting, you can verify that these settings are in place.
Registry settings
Following are registry settings configured during setup on the WSUS server. These
settings do not store server configuration information. All configuration information is
stored in the WSUS database (SUSDB.mdf).
• ContentDir – the location under which update binaries and end user license
agreement files are stored. If the user chose to install WMSDE during setup, this
location also contains the database storage files and log files; for example, C:\WSUS.
Note the following:
• WmsdeInstalled – this entry specifies whether or not WMSDE was used in the
original installation; for example, 1=yes, 0=no. Note: This key does not get modified if
your later migrate the WMSDE database to a full SQL Server database.
• SqlServerName – The main registry key used under regular server operation.
This is used to bootstrap the server components with the database server where the
rest of data and server configuration is used. Ex: %computername%\WSUS for
WMSDE. Use this key to quickly figure out which SQL server the WSUS server is
using (especially in the remote SQL case).
• SqlDatabaseName – the name of the database. For WSUS 2.0, this is always
SUSDB.
Configuration settings
All of the following server configuration settings are stored inside the WSUS database
(SUSDB.mdf).
80
0 – WSUS server
1 – Microsoft
Update
The second
database location
specifies the name
of the upstream
WSUS server, if you
have chosen one as
the update source.
0 – Do not
download express
files (default) option.
1 – Download
express files.
On the WSUS
console, this is
configured on the
Advanced
Synchronization
Options box.
81
On the WSUS
console this is
configured on the
Advanced
Synchronization
Options box.
IIS settings
The following virtual directories (vroots) are created in IIS (in the Default Web Site by
default) for client to server synchronization, server to server synchronization, reporting,
and client self-update.
82
Permissions
The following lists permissions necessary for specific folders on the WSUS server disk
and registry permissions.
Disk
The following permissions are configured during WSUS setup, and are important for BITS
downloads to work:
• The root folder on the drive where the WSUSContent folder resides (for
example, <%windir%>\WSUS\WSUSContent) must have Read permissions for
either the Users account or the NT Authority\Network Service account (on
Windows 2003). If this permission is not set, BITS downloads will fail. Note: this is the
permission that WSUS setup does not configure, so make sure the permissions are
set as described here
• The NT Authority\Network Service account (on Windows 2003) must have Full
Control permissions to the following folders for the WSUS console to display the
pages correctly:
84
• <%windir%>\Microsoft .NET\Framework\v1.1.4322\Temporary ASP.NET
Files
• <%windir%>\Temp
Registry
The following permissions are set for the Registry during WSUS setup.
• WSUS Administrators
• Setup Issues
• Synchronization issues
Setup Issues
If you are having trouble installing WSUS, use the following information to troubleshoot
the problem.
85
Check for required software and hardware
WSUS has a number of requirements that need to be met prior to installation. For more
information, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
In some cases, setup might fail if you choose the WMSDE database
In some cases, when you choose the WMSDE database, Setup tries to repair WMSDE
and falls into an infinite loop. This is a known issue with the RC release of WSUS. Use
this Knowledge Base article at http://go.microsoft.com/fwlink/?LinkId=48007 to recover
from this problem and install WSUS by using WMSDE.
If the Server service is not running when you install WSUS, the
WSUS installation fails
If you select WMSDE for your database software and the Server service is not running on
the computer where you intend to install WSUS, the WSUS installation fails. This is
because WMSDE requires the Server service to be running to install, and if WMSDE fails
to be installed, the WSUS installation fails.
To work around this issue, turn on the Server service, and run WSUS Setup again. Use
the Knowledge Base article You cannot install MSDE 2000 if the Server service is not
running at http://go.microsoft.com/fwlink/?LinkId=48009 to recover from this problem and
install WSUS by using WMSDE.
You cannot install MSDE 2000 if the Server service is not running
Upgrade Issues
• WSUS database
For information about backing up and restoring your existing WSUS installation, see
Backing Up Windows Server Update Services.
86
For information about how to manually remove Network Service or ASP.NET accounts
from a computer running SQL Server 2000 or MSDE, see SQL Server product
documentation. You can download product documentation for SQL Server 2000 from the
SQL Server 2000 Books Online (Updated 2004) page of the Microsoft Web site at
http://go.microsoft.com/fwlink/?LinkId=13959.
Note
If WSUS is installed on a domain controller, only a member of the Domain
Administrator group can use the WSUS console.
4. In the Enter the object names to select (examples) box, type the object
name, and then click OK.
One way of inadvertently overtaxing your WSUS server is to have antivirus software
installed on it, which is monitoring the WSUS content directory. During synchronization,
the antivirus software can overload out the CPU. You can work around this situation by
setting the antivirus software to ignore where WSUS content is stored.
The workaround is to give read access for IWAM and ASP.NET accounts to the following
registry key.
HKEY_LOCAL_MACHINE\software\microsoft\update services
88
To give read access for the IWAM account on Windows 2000 Server configured
as a domain controller
1. Click Start, and then click Run.
7. In the Locations dialog box, select the local computer, and then click OK.
3. At the command prompt, type the following, and then press ENTER:
drive:\windows\microsoft .net\framework\v1.1.4322\aspnet_regiis -i
where drive is the drive letter of the disk on which you installed Windows.
To give read access for the IWAM account on Windows 2000 Server configured
as a domain controller
• At the command prompt, type the following, and then press ENTER:
To have WSUS verify which updates are stored on the disk, you must run the
WSUSutil.exe using the reset command.
Note
Performing a reset causes the WSUS server to be unresponsive for up to five
minutes.
Synchronization issues
Synchronization is the process in which the WSUS server connects to Microsoft Update
or to another WSUS server and downloads updates. During synchronization, WSUS
determines if any new updates have been made available since the last time you
synchronized. If it is your first time synchronizing WSUS, all updates are made available
for approval. If synchronizations are failing, you can try the following procedures.
To determine if there is a problem with network name resolution services, use the ping
command from the downstream WSUS server that cannot synchronize. You should use
the same naming convention that is used in the WSUS console. For example, if you used
a NetBIOS name in WSUS console, use the NetBIOS name of the upstream server with
the ping command. If you cannot ping the upstream server, you might have a problem
with network name resolution services. To work around this type of issue, you could use a
different name resolution service or the IP address of the upstream server.
ping WSUSServerNname
where WSUS server name is the name of the upstream WSUS server you are
trying to synchronize with.
To troubleshoot this issue, on the downstream server, make a note of the title of the
updates for which download failed. These will be visible on the Updates page, and
marked with a red X. Then, check if these updates exist on the upstream server (look at
the Updates page. If they do not match, do one of the following, depending on which
updates you need:
• Specify the missing updates on the upstream server, and then synchronize from
the update source.
• On the downstream server, cancel the updates that are not on the upstream
server, if these updates are no longer needed. Then decline the old updates on the
downstream server.
If you are unable to download update files to your local WSUS server,
your server might not support the necessary HTTP protocol
If synchronization of update files to your WSUS server fails, you might see the following
message in the corresponding event log:
Content file download failed. Reason: The server does not support the necessary
HTTP protocol. Background Intelligent Transfer Service (BITS) requires that the
server support the Range protocol header.Source File: /msdownload/update/v3-
19990518/cabpool/windows2000-kb873339-x86-
enu_500e4656b4f0ca3431565631989090bbeeb74bcc.exe Destination File: %drive
%\wsus\WsusContent\WsusContent\CC\500E4656B4F0CA3431565631989090BBEEB74BCC.EXE.
This problem occurs if your proxy environment doesn’t support HTTP 1.1 Protocol. You
can manually work around this by running the following commands at the command
prompt to configure BITS.
"%programfiles%\Update Services\tools\osql\osql.exe"
-S SQL_InstanceName
set BitsDownloadPriorityForeground=1"
4. Close the command prompt window and retry synchronization: in the WSUS
console, click Options, click Synchronization Options, and then under Tasks,
click Synchronize now.
After you edit this file, you must restart both IIS and the WSUS server. You can find the
Urlscan.ini file in the\WINNT\System32\Inetserv\Urlscan directory on the boot drive of
your computer.
3. Make sure the following settings appear under the [AllowVerbs] section:
• GET
• HEAD
• POST
• OPTIONS
95
New approvals can take up to one minute to take effect
If you approve an update on the WSUS console and there are client computers running
detection at that exact moment, those computers might not get the approved update until
they go through another detection cycle. The WSUS server requires approximately one
minute to begin offering newly approved updates to client computers.
If you cannot access WSUS data after restoring the database, check
the WSUS server name and user permissions for the
database
If you restore a WSUS database but cannot access the restored from the WSUS console
check for the following:
• If you have changed the WSUS server name since the backup, you must add the
corresponding users to the database to enable the WSUS console to access the
data.
• If you restore the backup to a WSUS server other than the one from which you
backed up the database, you will have the same result and must also add the
corresponding users.
• In either case, the users need to be granted permissions for public and Web
service.
Selfupdate
See Automatic Updates must be updated for information about troubleshooting the
Selfupdate service.
WSUSService.exe
This service facilitates synchronization. If you have problems with synchronization,
access WSUSService.exe by clicking the Start button, pointing to Administrative Tools,
clicking Services, and then finding Windows Server Update Service in the list of
services. Do the following:
• Verify that this service is running. Click Start if it is stopped or Restart to refresh
the service.
97
• You can also use Event Viewer to check the Application, Security, and System
event logs to see if there are any events that might indicate a problem.
• You can also check the SoftwareDistribution.log to see if there are events that
might indicate a problem.
Web services
Web services are hosted in IIS. If they are not running, ensure that IIS is running (or
started). You can also try resetting the Web service by typing iisreset at a command
prompt.
SQL service
Every service except for the selfupdate service requires that the SQL service is running. If
any of the log files indicate SQL connection problems, check the SQL service first. To
access the SQL service, click the Start button, point to Administrative Tools, click
Services, and then look for one of the following:
• MSSQLSERVER (if you are using WMSDE or MSDE, or if you are using SQL
Server and are using the default instance name for the instance name)
• MSSQL$WSUS (if you are using a SQL Server database and have named your
database instance "WSUS")
Right-click the service, and then click Start if the service is not running or Restart to
refresh the service if it is running.
Using Group Policy to point client computers to your WSUS server should eventually
cause an Automatic Updates detection and client self-update. For more information about
98
this process, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
SUS Client
99
WSUS Client
Verify that the SUS clients are pointed to the WSUS server
If you have the WSUS client installed but the client computer is pointed to a SUS server,
Automatic Updates falls into legacy mode and the client computer uses the SUS client
user interface. In this case you need to redirect the computer away from the SUS server
to get the WSUS client to function. When you point Automatic Updates away from the
100
SUS server, it automatically comes out of legacy mode and the new client user interface
appears.
If your client computers are pointed to the WSUS server and you do not see the WSUS
client user interface shown above, see the next section.
To ensure that the self-update tree is working properly, first make sure there is a Web site
set up on port 80 of the WSUS server. Next, type the following at the command prompt of
the WSUS server:
If you have WSUS client self-update running on port 80 of the WSUS server, see the next
section.
If you have installed Windows® SharePoint® Services on the default Web site in
IIS, configure it to not interfere with Self-update
If you install Microsoft Windows Sharepoint Services on the same server that is running
WSUS, you might get the following issues:
If client computers are not running the WSUS-compatible version of Automatic Updates,
they will not be able to receive updates through WSUS.
e. In the Add a new pathbox, set the type to excluded path. Under Path,
type the following:
• "/iuident.cab"
• "/wutrack.bin"
• "/clientwebservice"
• "/Selfupdate"
http://WSUSServerName/iuident.cab
where WSUS server name is the name of your WSUS server. Ensure that you are
prompted to download or open Iuident.cab. This verifies network connectivity from the
WSUS client and the availability of the Iuident.cab file on the WSUS server.
4. If there are any boxes prompting you to download or save, click Cancel. In Internet
Explorer Address bar, type:
http://WSUSServerName/selfupdate/AU/x86/osvariable/languagevariable/wuaucomp.cab
where WSUSServerName is the name of your WSUS server and where osvariable is a
variable indicating the operating system of the client computer. The possible variables for
osvariableare NetServer, W2K or XP, and where languagevariable is a variable indicating
the language of the operating system of the client computer. The possible variables for
oslanguage are based on the standard 2- to 4-letter language abbreviations. For example,
here is a URL for a client computer running an English version of Windows XP:
http://WSUSServerName/selfupdate/AU/x86/XP/EN/wuaucomp.cab
Ensure that you are prompted to download or save Wuaucomp.cab. This verifies network
connectivity from the WSUS client and the availability of the Iuident.cab file on the WSUS
server.
If you are prompted to save or download both of these files, see the next section.
These files are hidden by default. Use the following procedure to display hidden files and
folders in Windows Server 2003.
2. On the View tab, under Hidden files and folders, click Show hidden files
103
and folders.
If you can find no problem with the logs on the WSUS client, see the next section.
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\
4. On the menu, click Edit, point to New, and then click Key.
6. Double-click the WUServer setting, type the URL to your WSUS server, and then press
ENTER.
On the menu, click Edit, point to New, and then click String Value.
8. Double-click the WUStatusServer setting, type the URL to your WSUS server, and then press
ENTER.
If the WUStatusServer setting does not exist, do the following:
On the menu, click Edit, point to New, and then click String Value.
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
On the menu, click Edit, point to New, and then click Key.
12. Verify that the UseWUServer setting has a value of 1 (0x1).If it does not, modify it by double-
clicking the setting and then changing the value.
On the menu, click Edit, point to New, and then click DWORD Value.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto
Update
16. In the Automatic Updates dialog box, specify download and installation options, and then click
OK. Make sure that Turn off Automatic Updates is not selected.
17. Ensure that the AUState setting has a value of 2 (0x2). If it does not, modify it by double-
clicking and changing the value.
20. At the command prompt, type the following, and then press ENTER to stop the Automatic
Updates service:
21. At the command prompt, type the following, and then press ENTER to restart the Automatic
Updates service:
To force the SUS client computer to check with the WSUS server
• Wait approximately one minute, and then refresh the registry. You should
now see the following settings and values:
Although these values refer to the time that detection is going to start, the first phase of
detection is the process of checking whether a self-update is necessary. Therefore, these
values actually refer to when self-update from SUS client to the WSUS client should
occur.
If the client software has not self-updated after ten minutes, refresh the \Auto Update
registry key. If the LastWaitTimeout value has changed and is now 24 hours later than
its previous value, that indicates that Automatic Updates was not able to contact the
server URL that you specified in the WUServer value.
Verify that target computer group names match groups on the WSUS
server
Make sure the name of the target computer group in Group Policy matches the name of
the computer group on the WSUS server. Check the Group Policy object (GPO) or the
registry setting where you enabled client-side targeting. Make sure that there are no
discrepancies between the name of the computer group used in Group Policy and the
name of the group used on the server. If WSUS cannot find a computer group on the
server reported by a client computer, it loads the computer into the Unassigned
Computers group.
106
Wait an hour for changes to take effect
If you make a change to group membership by using client-side targeting and the client
computer has already contacted the WSUS server, it takes an hour for the server to
change the computer’s group membership. This is because WSUS uses cookies to
manage group membership with client-side targeting and these cookies are set to expire
after one hour.
If you cannot wait an hour, use command-line options to reset the cookie and initiate
detection. For information about how to use command-line options, see Deploying
Microsoft Windows Server Update Services at http://go.microsoft.com/fwlink/?
linkid=41777&clcid=0x409.
More Documentation
• For high-level information about what's new and features of WSUS, see Microsoft
Windows Server Update Services Overview at http://go.microsoft.com/fwlink/?
LinkID=42213.
107
• For step-by-step guidance for getting started, including installing WSUS, setting
up a client computer, and deploying your first set of updates, see Step-by-Step Guide
to Getting Started with Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?LinkID=41774.
• For information about planning for, installing, and then configuring WSUS
components and infrastructure, see Deploying Microsoft Windows Server Update
Services at http://go.microsoft.com/fwlink/?linkid=41777.
• For information that helps you automate tasks or customize WSUS, see the
Microsoft Windows Server Update Services Software Developer's Kit at
http://go.microsoft.com/fwlink/?LinkID=43099 and Windows Update Agent Software
Developer's Kit at http://go.microsoft.com/fwlink/?LinkID=43101. Note that the
Windows Update Agent is the Automatic Updates service. Both SDKs contain
information about the application programming interface (API), as well as sample
scripts and ready-to-use tools for your WSUS deployment and implementation.