Installing Windows Server Update Services-Step-By-Step (2016)
Installing Windows Server Update Services-Step-By-Step (2016)
(Server 2016)
Installing WSUS is very straightforward. WSUS is built in on Server 2016 and can be installed
from the Server Manager.
WSUS will allow you to manage patching for workstations and servers. You can pre-approve
patches, set up test groups to verify patches prior to install and generally make patching systems
more manageable.
This document will help you to install, configure and deploy your own patch management
solution. We will use Group Policy to deploy the settings to all workstations and servers in the
domain.
Must have at least 10 GB (40 GB recommended) of hard disk drive space available for updates
and database!
221 N. Stadium Blvd., Ste. 201 Columbia, MO 65203 P: (573) 884-7200 F: (573) 884-6673 www.MORE.net
Installation:
9. Click Next
10. Select Features
11. Click Next
12. Windows Server Update Services – Read Info
13. Click Next
14. Select Role Services
At this point you can close the Add Roles and Features Window.
You can check the Progress of the Role in Server Manager by clicking the Notification ‘Flag’
When the Feature is complete (you may want to refresh Server Manager)
The Icon for the Notification will change
Click the Notification Icon
Configuring WSUS:
This section will help you configure the Windows Update Services. We will explore all the
options and focus on default values, to optimize the installation.
Click Next
Microsoft Update Improvement Program
Make your choice and click next
Choose upstream server:
If this is your first server you will want to Synchronize from Microsoft, if this is a secondary
(site) server then you can synchronize from an upstream server
*NOTE – If you select Synchronize from Upstream server, the Information for Products and
Classifications and Update Files and Languages will be grayed out, as this server will get the
files that you specified on your upstream server.
Click Next
Specify Proxy Settings
Enter your proxy settings if you have a proxy
Click Next
Choose Language(s)
Click Next
Choose Products
Choose the products that you want to update; Office, Windows OS, etc.
Click Next
Choose Classification
Choose the update classification you would like to download
Click Next
Click Next
Click Finish
We have now finished the Initial Configuration, when you click Finish the WSUS Console will
open and additional settings can be configured at this time.
Now we are ready for our next step, setup automatic approval rules. The automatic approval
rules will allow for specific update classification to be automatically approved so they can be
applied at the next update schedule without interaction.
There us already a default rule created but it is not enabled. We can check the box to enable this
rule.
Below we see ‘When an update is in … , this is a link, Click the link
Click Ok
Click Ok
There are several ways to add a client. The best way if you are in an Active Directory domain is
via Group Policy. We will look at this option as well creating a local security policy on a single
system.
Group Policy:
We will step through this to make sure we get all the settings. On a side note, the WSUS server
DOES NOT have to be in the same Active Directory domain or in any domain.
Let’s take a look at the settings for active directory; I am going to lay this part out in steps.
1. Open Server Manager > Click Tools > Group Policy Management
2. Expand the Domain
3. Right Click Group Policy Objects (Folder)
4. Click New
5. Name Your Policy
6. Click Ok
7. Right Click the new WSUS Policy
8. Click Edit
9. Expand:
a. Computer Configuration > Policies > Administrative Templates > Windows
Components > Windows Update
There are a lot of new settings, we will no go through all the settings here but will highlight the
most common and make mention of a few that may be useful.
Configure Manually:
You can manually configure the settings in the registry:
Create a script that will set the settings and apply to all systems:
@ECHO OFF &SETLOCAL disableDelayedExpansion
Link to more information about the settings in the script and their settings:
https://technet.microsoft.com/en-us/library/dd939844(v=ws.10).aspx
Installing Microsoft Report Viewer to run reports
After installing WSUS you will need to run the Microsoft Report Viewer in order to create
reports. You will also need to download the Microsoft System CLR Types for SQL Server 2012.
You will get this error when running reports:
Click the link in the error message to be taken to the download page
Click Download
Click Save
If you Click RUN now you will get this error:
Once you have it saved to the Downloads folder, navigate to that folder and install
the following:
SQLSysClrTypes.msi
Run:
Click Next
Accept the terms, Click Next
Click Install
Click Finish
ReportViewer.msi
Run
Next
Accept Terms, Click Next
Click Install
Click Finish
Install during automatic maintenance: The maintenance window can be set within another policy
Schedule install time: Default 03:00am
Install updates for other Microsoft products
Specify the intranet Microsoft update service location:
Set the server and port information for the intranet update server:
http://servername:port (default port: 8530)
The above 2 settings are required and all that is needed to get clients to start updating from the
WSUS server.
We will look at a few more settings, the rest you will want to read the information to determine if
those policies are right for your environment.
Honorable Mentions:
To block systems from contacting Microsoft Internet servers set this policy to ‘Enable’
Allow Automatic Updates immediate installation
This setting allow for the immediate installation of updates that DO NOT require a reboot, This
setting can help spread out the updates so that ALL updates are not waiting to be installed during
the scheduled installation time.
Enable this policy to allow for immediate installation
Once you have completed all your policy settings we are now ready to link this policy to the
proper OU’s for it to take effect.
Defer Windows Updates:
These settings allow you to defer Feature Updates and Quality Updates for Windows 10.
Select when Feature Updates are received:
Feature updates are the current branch release of Windows, you can block Feature updates for up
to 180 days. You can also PAUSE the updates for 60 days by checking the ‘Pause feature
updates’ checkbox.
(Prior to 1703 feature updates could only be paused for 60 days)
You can check the date that the feature updates were paused by checking the PausedFeatureDate
registry key: HKLM\SOFTWARE\Microsoft\WindowsUpdate\UpdatePolicy\Settings
Select when Quality Updates are received:
Quality updates are released in the normal patch cycle at the first Tuesday of the month
(although they can be released any time). These updates will be paused for 30 days, if you check
the box to Pause quality updates then they will be paused for 35 days.
Link the Policy to the OU:
Note – If you create and link the policy at the top level with the Default Domain Policy then it
will affect ALL computers in the domain including the servers. You can choose to link this on
your specific computer OU or set it here and then create computer groups and restrict them from
the policy!
###############################################################################
#
# Created By: Jim Long
# Last Updated: 07-22-2017
#
###############################################################################
######################################################################
#
#
" Checking to see if WSUS is installed..."
#
#
######################################################################
$IsWSUS = $false
######################################################################
#
" Installing WSUS if necessary..."
# Use -SkipWSUSCheck to bypass this section.
# Install WSUS Services
#
######################################################################
if ( $IsWSUS )
{
" Is WSUS Server = " + $IsWSUS
}
elseif ( $(Get-WindowsFeature -Name UpdateServices).Installed -eq $false )
{
# Bertlham
APPENDIX B
Create WSUS GPO:
Save the following as wsus-GPO.ps1
Script checks to see if a policy already exists called WSUS and if the policy exists it will not
create a new one.
Run the following script on a domain controller to create a basic WSUS policy. This policy is
created in the Group Policy Objects folder and is not linked to any OU. Verify and change any
settings and then link to the appropriate OU(s).
######################################################################
#
" Create GPO for WSUS if necessary...`n "
#
######################################################################
$GPOExist = $false
$gpocheck = (Get-GPO -all); if ($gpocheck.displayname -eq "WSUS") {$GPOExist = $true}
" WSUS GPO Created but is not linked. Link GPO after configuring WSUS server in
Server Manager "
}
elseif ($gpoexist -eq $True)
{
" WSUS GPO already exists"
}
# Bertlham
APPENDIX C
WSUS Cleanup Script:
Script to run WSUS server cleanup
Save as WSUS-cleamup.ps1 and schedule it via Windows task scheduler.
###############################################################################
#
# This script will be used to run the WSUS Server Cleanup Wizard
#
# This script MUST be run on the WSUS server
#
# Do not run the script by double-clicking it or right-clicking it, the
# script must be run from the command line in PowerShell.
#
###############################################################################
###############################################################################
#
# Created By: Jim Long
# Last Updated: 07-22-2017
#
###############################################################################
# Then Run:
# Bertlham
APPENDIX D
LINKS:
WSUS Troubleshooting
https://support.microsoft.com/en-us/help/4025764/how-to-troubleshoot-wsus