Beginner’s Admin FAQ for

Windows Software Update Services 2.0

Some information gleaned from the Microsoft.public.windows.server.update_services newsgroup, www.WSUS.info, and the WSUS mailing list hosted by www.patchmanagement.org

Assembled by Rob Dunn

Email:(uphold twothousand1(#) at hotmail dot com)

01/23/07

 

This list is by no means complete, but I was hoping to put together some handy information into a one-stop-doc.  Hopefully it will benefit someone – Rob

 

Other information contributed from:

 

WSUS MVPS: Torgeir Bakken, Mohammed Athif Khaleel, and Lawrence Garvin

 

WSUS community: Paul Narula, Mike Davies, and Adrian Marsh.

 

I’m going to credit the people here rather than for each item they contributed, so as to clear up as much clutter as possible.

 

This document assumes that you’ve already downloaded and installed the current release of WSUS and that it is functioning without error.  Also, while there are some 3.0 tidbits here and there, most of the document is geared for WSUS 2.0.

 

Before beginning, please review the Microsoft FAQ: http://www.microsoft.com/windowsserversystem/updateservices/evaluation/faqs.mspx

 

 

 


Table of Contents

Wuau.adm.. 4

Q: Where can I get the GPO template wuau.adm for Automatic Updates?. 4

How to configure automatic updates by using Group Policy or registry settings: 4

Further information from Microsoft on how to configure Automatic Updates via GPO: 4

Wuau.adm policy settings. 4

Configure Automatic Updates. 4

Specify intranet Microsoft update service location. 6

Enable client-side targeting. 6

Reschedule Automatic Updates Scheduled installations. 8

No auto-restart for scheduled Automatic Updates installations. 8

Automatic Updates detection frequency. 9

Allow Automatic Updates immediate installation. 9

Delay Restart for scheduled installations. 10

Re-prompt for restart with scheduled installations. 10

Allow non-administrators to receive update notifications. 11

Do not display ‘Install Updates and Shut Down’ option in Shut Down Windows dialog box. 11

Do not adjust default option to ‘Install Updates and Shut Down’ in Shut Down Windows dialog box. 12

Enable recommended updates via Automatic Updates (WSUS 3.0) 12

Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates (WSUS 3.0) 13

Allow signed content from intranet Microsoft update service location (WSUS 3.0) 13

Q: What registry entries are changed when these policy settings are applied?. 14

Q: Where are the non-GPO Automatic Updates registry keys stored?. 14

Other Windows Update related policy settings. 14

Remove access to use all Windows Update features. 14

Selfupdate and WSUSAdmin folders on WSUS IIS Server 16

Q: What address should I point my clients to in my GPO for Windows Updates?. 16

Q: What is the Selfupdate tree for?. 16

Q: Is it necessary to edit the registry on the clients?  When is it necessary?. 16

Applying a GPO in a Windows NT domain environment:. 16

Manually configuring AU Client for WSUS in a workgroup environment:. 17

Updating WSUS clients. 17

Q: How do you push out updates to clients?. 17

Q: Why do my computers keep rebooting even though I specified to not reboot them?. 17

Q: Can I deploy Service Packs?. 17

Q: How can I force my computer to download updates and install?. 18

Q: How can I tell if my computer has a pending reboot?. 18

Q: How do I tell a computer to detect needed updates or check in with the server?. 18

Q: I’ve applied my GPO, but no clients are showing up in the WSUS console.  What’s going on?. 19

Not enough time has passed for the clients to check in automatically. 19

Potential duplicate clients using the same WSUS SID.. 19

Invalid GPO settings or GPO not being applied correctly to the clients. 20

Q: How do I control the bandwidth used by Windows Updates (BITS) 20

Tools and related resources. 21

Q: Where can I find tools to report information from my WSUS database?. 21

Q: Where can I download WSUS?. 21

Q: Where can I locate diagnostic tools to troubleshoot my client and/or server configuration?. 21

Q: Where can I download the WSUS API Samples?. 21

Central reporting for multiple WSUS servers. 22

Q: How can I extract updates directly from the WSUS database?. 23

WSUS and WUA Development 23

Q: Where can I find information on the WSUS (server component) API?. 23

Q: Where can I find information on the WUA (Windows Update Agent) API?. 23

WSUS Administration. 23

Q: Where can I find Microsoft documentation for WSUS 2.0?. 23

Q: I’m having troubles with my WSUS server, what tools are available to help me troubleshoot the problem?  24

Q: My WSUS content directory is full!  How can I clean up unneeded files?. 24

Q: How do I configure the WSUS console for read-only access for reporting purposes? (WSUS 2.0) 25

Q: I like to develop VBScripts for administration purposes.  Where can I find information on the scripting interface for WSUS?. 27

Q: SUS only took up xGb amount of space…why does my WSUS content directory have so much more data in it?  28

Q: I’m getting error code (insert error code here) in my Windows Update logs, what do these errors mean?  28

Other FAQ’s: 28

WSUS Resources. 28

 


 

 

Wuau.adm

 

Q: Where can I get the GPO template wuau.adm for Automatic Updates?

 

It should either be located in your %windir%\inf folder (if you’ve updated to XP SP2 or have Windows Server 2003).

 

Note that the policy "Allow non-administrators to receive update notifications" is missing from the wuau.adm file that comes with WinXP SP2. 

 

To see that policy, use the wuau.adm file that the WSUS installation places in the folder %windir%\inf\ on the WSUS server.

 

So, to enable this template and see all available AU settings in your AD, you will need to make sure that your DC has this copy of the template (should be 42Kb in size).

 

Also note that the new settings that are part of the template which comes with WSUS 3.0 will have no affect on Automatic Update 2.0 and below clients.

 

How to configure automatic updates by using Group Policy or registry settings:

http://support.microsoft.com/Default.aspx?kbid=328010

 

Further information from Microsoft on how to configure Automatic Updates via GPO:

Configure Automatic Updates by Using Group Policy: http://technet2.microsoft.com/WindowsServer/en/Library/51c8a814-6665-4d50-a0d8-2ae27e69ca7c1033.mspx -

Managing the WSUS Automatic Updates Client Download, Install, and Reboot Behavior with Group Policy: http://www.microsoft.com/technet/community/columns/sectip/st0506.mspx

 

Wuau.adm policy settings

See the above link ‘Managing the WSUS Automatic Updates Client Download, Install, and Reboot Behavior with Group Policy’ for some other examples of GPO setting configuration.

 

Configure Automatic Updates

 

Specifies whether this computer will receive security updates and other important downloads through the Windows automatic updating service.

 

This setting lets you specify if automatic updates are enabled on this computer. If the service is enabled, you must select one of the four options in the Group Policy Setting:

 

2 = Notify before downloading any updates and notify again before installing them.

 

When Windows finds updates that apply to this computer, an icon appears in the status area with a message that updates are ready to be downloaded. Clicking the icon or message provides the option to select the specific updates to download. Windows then downloads the selected updates in the background. When the download is complete, the icon appears in the status area again, with notification that the updates are ready to be installed. Clicking the icon or message provides the option to select which updates to install.

 

3 = (Default setting) Download the updates automatically and notify when they are ready to be installed

 

Windows finds updates that apply to your computer and downloads these updates in the background (the user is not notified or interrupted during this process). When the download is complete, the icon appears in the status area, with notification that the updates are ready to be installed. Clicking the icon or message provides the option to select which updates to install.

 

4 = Automatically download updates and install them on the schedule specified below

 

Specify the schedule using the options in the Group Policy Setting. If no schedule is specified, the default schedule for all installations will be everyday at 3:00 AM. If any of the updates require a restart to complete the installation, Windows will restart the computer automatically. (If a user is logged on to the computer when Windows is ready to restart, the user will be notified and given the option to delay the restart.)

 

5 = Allow local administrators to select the configuration mode that Automatic Updates should notify and install updates

 

With this option, the local administrators will be allowed to use the Automatic Updates control panel to select a configuration option of their choice. For example they can choose their own scheduled installation time. Local administrators will not be allowed to disable Automatic Updates' configuration.

 

To use this setting, click Enabled, and then select one of the options (2, 3, 4 or 5). If you select 4, you can set a recurring schedule (if no schedule is specified, all installations will occur everyday at 3:00 AM).

 

If the status is set to Enabled, Windows recognizes when this computer is online and uses its Internet connection to search the Windows Update Web site for updates that apply to this computer.

 

If the status is set to Disabled, any updates that are available on the Windows Update Web site must be downloaded and installed manually by going to http://windowsupdate.microsoft.com.

 

If the status is set to Not Configured, use of Automatic Updates is not specified at the Group Policy level. However, an administrator can still configure Automatic Updates through Control Panel.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

 

 

Rob’s notes:

 

I’ve found that most people have servers set for either option 2 or 3, to prevent accidental reboots (if they are not logged into). 

 

If you have other administrators that maintain their servers, you may want to choose option 5 to allow them to configure the AU settings.

 

Client workstations probably should be configured for option 4 to automatically install.  Computers will reboot if no one is logged into them.  Of course, this depends on your environment and how you’ve defined your update policies.

 

Specify intranet Microsoft update service location

 

Specifies an intranet server to host updates from the Microsoft Update Web sites. You can then use this update service to automatically update computers on your network.

 

This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network.

 

To use this setting, you must set two servername values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server.

 

If the status is set to Enabled, the Automatic Updates client connects to the specified intranet Microsoft update service, instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don't have to go through a firewall to get updates, and it gives you the opportunity to test updates before deploying them.

 

If the status is set to Disabled or Not Configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.

 

Note: If the "Configure Automatic Updates" policy is disabled, then this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

menu.

 

Rob’s notes:

 

Currently (as of 8/25/05), the ‘Set the intranet statistics server’ has no affect (for future releases).

 

 

Enable client-side targeting

 

Specifies the target group name that should be used to receive updates from an intranet Microsoft update service.

 

If the status is set to Enabled, the specified target group information is sent to the intranet Microsoft update service which uses it to determine which updates should be deployed to this computer.

 

If the status is set to Disabled or Not Configured, no target group information will be sent to the intranet Microsoft update service.

 

Note: This policy applies only when the intranet Microsoft update service this computer is directed to is configured to support client-side targeting. If the "Specify intranet Microsoft update service location" policy is disabled or not configured, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

in the Start menu.

 

Rob’s notes:

Using client-side targeting is the way to go, especially for medium to larger organizations.  This way, you can organize your clients in WSUS according to your AD layout.  If you move a computer into a different OU, the settings will change accordingly (if you have the GPO set up to be different for different OU’s, that is!).

 

I recommend creating the target groups first in the WSUS administration console before enabling and configuring this setting.  If you do not do this, your computers will appear in the ‘unassigned computers’ group.  If you create your groups after you’ve configured the GPO, the computers should relocate into the appropriate target groups in WSUS after they’ve performed a GPO machine policy refresh.

 

Another thing to note is that if someone configures their computer to receive updates from the server, but perhaps the computer is not part of your OU structure where you’ve applied a GPO, it will appear in the ‘unassigned computers’ group in WSUS.

 

If you don’t use client-side targeting, you will have to manually create your groups in WSUS and manually move the clients to the appropriate groups.

 

I recommend creating at least a few groups to accommodate testing of new updates:

 

1.      Servers/Workstations - Integrity Testing

2.      Workstations – Test

3.      Workstations – Production

4.      Servers – Test

5.      Servers – Production

 

 

Integrity testing is a term given to the process to determine if a patch will crash a computer and uninstall properly.  This is not to determine if other applications are affected by the update.

 

We have new updates automatically deploying to our Integrity Testing group which contains ONLY computers and servers that have been set up with the idea that if the system crashes, the server or workstation affected does not impact the workday or business production.

 

Testing means that there is a procedure in place to test application functionality on the computers/servers where the updates have been deployed.  Normally, this group is a set of computers that have copies of production applications installed on them to verify that the update did not “break” the app.  The testing procedures can become quite tedious and thorough, but depend on your update procedures.

 

We have a group of 10 willing users that are “IT friendly” which test our updates after the initial testing is complete.  They report back to us any instability and our Support Desk is aware who is in the group and when new updates will be deployed to them.

 

We have a few servers on different OS’ that are set up in a virtual environment with various roles (printing, DHCP, domain controller, applications, etc.).

 

Production is the final deployment group that will receive the updates after all testing has been completed in the prior two groups.

 

You should have a complete patch management process in place with instructions on what to do when there are enterprise or system problems.

 

Reschedule Automatic Updates Scheduled installations

 

Specifies the amount of time for Automatic Updates to wait, following system startup, before proceeding with a scheduled installation that was missed previously.

 

If the status is set to Enabled, a scheduled installation that did not take place earlier will occur the specified number of minutes after the computer is next started.

 

If the status is set to Disabled, a missed scheduled installation will occur with the next scheduled installation.

 

If the status is set to Not Configured, a missed scheduled installation will occur one minute after the computer is next started.

 

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

Shut Down option in the Start menu.

 

Rob’s notes:

 

If you have your WU Agent set to refresh and detect in the morning, it might be useful to have this set for a short time period after a person may log into the PC – so they aren’t working on something important if the PC needs to be rebooted.

 

No auto-restart for scheduled Automatic Updates installations

 

Specifies that to complete a scheduled installation, Automatic Updates will wait for the computer to be restarted by any user who is logged on, instead of causing the computer to restart automatically.

 

If the status is set to Enabled, Automatic Updates will not restart a computer automatically during a scheduled installation if a user is logged in to the computer. Instead, Automatic Updates will notify the user to restart the computer.

 

Be aware that the computer needs to be restarted for the updates to take effect.

 

If the status is set to Disabled or Not Configured, Automatic Updates will notify the user that the computer will automatically restart in 5 minutes to complete the installation.

 

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

Shut Down option in the Start menu.

 

Rob’s notes:

 

This setting is important so that you don’t surprise people with a reboot during their workday!

 

Most network admins will configure this option to ‘Enabled’ so that it reminds the user to restart.

 

Note that this GPO has no affect if you set a deadline to an approved update that is installed on a computer (Deadlines force the computer to restart).

 

 

Automatic Updates detection frequency

 

Specifies the hours that Windows will use to determine how long to wait before checking for available updates. The exact wait time is determined by using the hours specified here minus zero to twenty percent of the hours specified. For example, if this policy is used to specify a 20 hour detection frequency, then all clients to which this policy is applied will check for updates anywhere between 16 and 20 hours.

 

If the status is set to Enabled, Windows will check for available updates at the specified interval.

 

If the status is set to Disabled or Not Configured, Windows will check for available updates at the default interval of 22 hours.

 

Note: The "Specify intranet Microsoft update service location" setting must be enabled for this policy to have effect.

 

Note: If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

 

 

Rob’s notes:

 

If you have a test lab/target group set up, you might consider reducing this down to a more frequent interval (we use 1 hour, since all of our test computers are local) for only that target group.  Note that you can force the client to do this by running ‘wuauclt.exe /detectnow’.

 

 

Allow Automatic Updates immediate installation

 

Specifies whether Automatic Updates should automatically install certain updates that neither interrupt Windows services nor restart Windows.

 

If the status is set to Enabled, Automatic Updates will immediately install these updates once they are downloaded and ready to install.

 

If the status is set to Disabled, such updates will not be installed immediately.

 

Note: If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

Shut Down option in the Start menu.

 

Rob’s notes:

 

I haven’t seen any negative effect (yet) of this setting being enabled.  It is nice to have updates install and then have the client report back before a reboot is performed stating that the computer is completely up to date. 

 

Some admins don’t like to install any updates without restarting, so your mileage may vary.

 

 

Delay Restart for scheduled installations

 

Specifies the amount of time for Automatic Updates to wait before proceeding with a scheduled restart.

 

If the status is set to Enabled, a scheduled restart will occur the specified number of minutes after the installation is finished.

 

If the status is set to Disabled or Not Configured, the default wait time is 5 minutes.

 

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

Shut Down option in the Start menu.

 

Rob’s notes:

 

This is the amount of time after an update is installed that the user will be prompted with a ‘Restart Now’ dialog.  We have ours set for 10 minutes, but it doesn’t really matter, since the updates install in the background anyway (unless they are really nosey and know exactly when they are being updated!).

 

As far as I know, there is no way to remove this notification altogether using the GPO template or Windows Update Agent settings.

 

If you don’t configure the next policy setting ‘Re-prompt for restart with scheduled installations’, the user will be prompted EVERY 10 minutes (default value) after they click ‘Restart later’ at the initial restart option dialog.  Most people find this extremely annoying.

 

 

Re-prompt for restart with scheduled installations

 

Specifies the amount of time for Automatic Updates to wait before prompting again with a scheduled restart.

 

If the status is set to Enabled, a scheduled restart will occur the specified number of minutes after the previous prompt for restart was postponed.

 

If the status is set to Disabled or Not Configured, the default interval is 10 minutes.

 

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

Shut Down option in the Start menu.

 

Rob’s notes:

This option is very useful for those who do not want to be bothered every 10 minutes (the default) after they click ‘Restart later’ with the restart option dialog.

 

We have our setting configured as 240 minutes (as our installs are at 12:00), so it reminds the users to restart close to the end of the workday.

 

 

Allow non-administrators to receive update notifications

 

Specifies whether, when logged on, non-administrative users will receive update notifications based on the configuration settings for Automatic Updates. If Automatic Updates is configured, by policy or locally, to notify the user either before downloading or only before installation, these notifications will be offered to any non-administrator who logs onto the computer.

 

If the status is set to Enabled, Automatic Updates will include non-administrators when determining which logged-on user should receive notification.

 

If the status is set to Disabled or Not Configured, Automatic Updates will notify only logged-on administrators.

 

Note: If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

 

Supported on: Windows Server 2003, XP SP1, 2000 SP3

 

 

Rob’s notes:

 

When enabled, this will allow non-admins to:

 

Keep this in mind when applying updates to Terminal/Citrix Servers. 

 

We have our setting disabled for all workstations, as we don’t want non-admins controlling reboots of any updated computers. 

 

 

Do not display ‘Install Updates and Shut Down’ option in Shut Down Windows dialog box

 

This policy setting allows you to manage whether the 'Install Updates and Shut Down' option is displayed in the Shut Down Windows dialog box.

 

If you enable this policy setting, 'Install Updates and Shut Down' will not appear as a choice in the Shut Down Windows dialog box, even if updates are available for installation when the user selects the Shut Down option in the Start menu.

 

If you disable or do not configure this policy setting, the 'Install Updates and Shut Down' option will be available in the Shut Down Windows dialog box if updates are available

 

Supported on: At least Microsoft Windows XP with SP2

Shut Down option in the Start menu.

 

Rob’s notes:

 

This gives the user of applying any updates while they are shutting down their PC.  What might not be so nice is if the update is fairly large, and the user is in a hurry to get going.

 

See the next policy setting on how to configure it to be the default option for their shutdown screen.

 

Note that if you have scheduled your updates to install automatically (option 4 under ‘Configure Automatic Updates’), then this is a great additional setting to configure.  Again, if the updates have downloaded but not yet installed on the system, this option will remind the user to do so prior to shutting down.  If they do not install the updates, they will get the option during their startup process the next time they boot up (called ‘Install at startup’ – there is no policy to control this particular option).

 

 

Do not adjust default option to ‘Install Updates and Shut Down’ in Shut Down Windows dialog box

 

This policy setting allows you to manage whether the 'Install Updates and Shut Down' option is allowed to be the default choice in the Shut Down Windows dialog.

 

If you enable this policy setting, the user's last shut down choice (Hibernate, Restart, etc.) is the default option in the Shut Down Windows dialog box, regardless of whether the 'Install Updates and Shut Down' option is available in the 'What do you want the computer to do?' list.

 

If you disable or do not configure this policy setting, the 'Install Updates and Shut Down' option will be the default option in the Shut Down Windows dialog box if updates are available for installation at the time the user selects the Shut Down option in the Start menu.

 

Note that this policy setting has no impact if the Computer Configuration\Administrative Templates\Windows Components\Windows Update\Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box policy setting is enabled.

 

Supported on: At least Microsoft Windows XP with SP2

Shut Down option in the Start menu.

 

 

Rob’s notes:

 

See my note above regarding the usefulness of this setting if you have updates automatically installing.

 

This is nice to set the default option to install the updates for the users so they are again reminded visually to update their system. 

 

Enable recommended updates via Automatic Updates (WSUS 3.0)

 

 

Specifies whether Automatic Updates will deliver both important as well as recommended updates from the Windows Update update service.

 

When this policy is enabled, Automatic Updates will install recommended updates as well as important updates from Windows Update update service.

 

When disabled or not configured Automatic Updates will continue to deliver important updates if it is already configured to do so.

 

 

Rob’s notes:

 

No notes yet 01/23/07

 

Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates (WSUS 3.0)

 

 

Specifies whether the Windows Update will use the Windows Power Management features to automatically wake up the system from hibernation, if there are updates scheduled for installation.

 

Windows Update will only automatically wake up the system if Windows Update is configured to install updates automatically. If the system is in hibernation when the scheduled install time occurs and there are updates to be applied, then Windows Update will use the Windows Power management features to automatically wake the system up to install the updates.

 

Windows update will also wake the system up and install an update if an install deadline occurs.

 

The system will not wake unless there are updates to be installed.  If the system is on battery power, when Windows Update wakes it up, it will not install updates and the system will automatically return to hibernation in 2 minutes.

 

Rob’s notes:

 

No notes yet 01/23/07

 

 

Allow signed content from intranet Microsoft update service location (WSUS 3.0)

 

 

Specifies whether Automatic Updates should accept updates signed by entities other than Microsoft when the update is from an intranet Microsoft update services location.

 

If set to Enabled, Automatic Updates will accept updates received through an intranet Microsoft update services location if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local machine.

 

If set to Disabled, updates from an intranet Microsoft update services location must be signed by Microsoft.

 

Updates from a service other than an intranet Microsoft update service must always be signed by Microsoft regardless of whether this policy is Enabled or Disabled.

 

 

Rob’s notes:

 

No notes yet 01/23/07

 

Q: What registry entries are changed when these policy settings are applied?

 

These settings manipulate the following key: HKLM\Software\Polices\Windows\WindowsUpdate

 

Q: Where are the non-GPO Automatic Updates registry keys stored?

 

You can find these settings in the following key: HKLM\ SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate

 

Note that a GPO will supersede these localized settings.

 

Other Windows Update related policy settings

 

Remove access to use all Windows Update features 

 

This setting allows you to remove access to Windows Update.

 

If you enable this setting, all Windows Update features are removed. This includes blocking access to the Windows Update Web site at http://windowsupdate.microsoft.com, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you will neither be notified about nor will you receive critical updates from Windows Update. This setting also prevents Device Manager from automatically installing driver updates from the Windows Update Web site.

 

Supported on: At least Microsoft Windows XP Professional or Windows Server 2003 family (although this works on 2000 as well – Rob)

Shut Down option in the Start menu.

 

Rob’s notes:

 

Found under ‘User Configuration’> ‘Administrative Templates’ > ‘Windows Update’

 

This will block all access to the Windows Update site so the only location you can pull updates from is your WSUS server. 

 

How this relates to WSUS:

This option will cause the option ‘restart later’ to be grayed out even if the user is a local administrator on the PC.  The only way to eliminate this message is either to click ‘restart now’, or to stop the ‘Automatic Updates’ service.  It is an effective way to remove the ability to defer restarts to all of your users, including administrators!

 

You may end up annoying a LOT of people with this setting, so be careful!

 

NOTE: This is a user-based policy.

 

 

 


Q&A

 

Selfupdate and WSUSAdmin folders on WSUS IIS Server

 

Q: What address should I point my clients to in my GPO for Windows Updates?

Q: What is the Selfupdate tree for?


Point your clients to http://server/ - that should be adequate – unless during setup you've specified an alternate port (like 8530), in which case it would be: http://server:8530/. In 99% of cases, you'd only specify http://server/.

The /wsusadmin directory is where you as administrator go to do administrator-like things with WSUS - i.e. approve/un-approve updates for detect or install.

The /selfupdate tree is for use only by the WU agent on the client computers.   This is what keeps your clients up to date with the latest WU agent. If this isn't working, you may have troubles with new clients reporting in.

Information on SelfUpdate and troubleshooting:

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/WSUS/WSUSOperationsGuideTC/b23562a8-1a97-45c0-833e-084cd463d037.mspx

 

 

Editing the Client Registry (no AD to apply GPO’s)

Q: Is it necessary to edit the registry on the clients?  When is it necessary?


Only if there isn't a way to centrally manage your clients via GPO's. So, if you don't have access to create a central policy for your client computers, editing the registry might be the answer for you.

 

You’d want to use registry edits in NT4 or workgroup environments.  Also, a member of http://www.WSUS.info (thank you!) site provided this information:

Applying a GPO in a Windows NT domain environment:

 

You don't have to use regedit (either manually or via script). You can use the wuau.adm template provided for use with GPO, in NT4 System Policy Editor, SO LONG AS you resave the template in non-unicode format.

Information about saving the wuau.adm template in non-unicode format is here: http://support.microsoft.com/default.aspx?scid=kb;en-us;325909

Try to use the latest version of System Policy Editor, under XP-SP2.

All the settings are the same as for the AD GPO, and are well documented in the Microsoft whitepapers, especially "Deploying Microsoft WSUS" by Tim Elhajj and Sean Bentley.

Edit the Default Computer object, after testing the settings with specific named Computer objects in your Domain. As with all NT4 Domain System Policy, you must save the resulting file as NTConfig.pol in the netlogon share of your domain controllers (typically the PDC has the master copy), and ensure that this file is replicated to all other BDCs in the Domain.

Reboot the client to pick up the setting changes. If you have access to regedit, you can check the appropriate keys to ensure the change has taken place.

WSUS detection, client update, and any approved installs should now happen according to your specified schedule.

 

Manually configuring AU Client for WSUS in a workgroup environment:

 

WSUS: Script to Manually Configure Automatic Update Client for WSUS in a workgroup environment: http://support.microsoft.com/kb/555454

 

 

Updating WSUS clients

 

Q: How do you push out updates to clients?

 

Updates don't actually get pushed, per se - you select what updates you want to install to your clients (or to find out whether or not they are needed – i.e. ‘detect now’).

 

The clients report to the server and figure out what updates it needs, and the server stores the needed/not needed info in the database.

Then, at the pre-determined time (defined in your GPO's/registry edits) it will cause one of the following things to happen to the client computer:

 

         Check for updates and report the needed or not needed status to the server, and notify the user that there are new updates available for download...

         Check for updates, report, and download the updates and alert the user they are ready to install

         Check for updates, report, download, and install the updates

 

 

Q: Why do my computers keep rebooting even though I specified to not reboot them?

 

Most commonly, this is because a deadline has passed for a particular update.  Even if you’ve specified that updates should only download and not install automatically, the deadline will force the client to install the update as soon as it checks to detect new update status from the WSUS server.

 

Many people think that if they apply a deadline to an update, this means that the update will apply on that day.  This is not true – without using deadlines, the time that the update will install is contingent upon the time that you’ve specified in the GPO setting ‘Configure Automatic Updates.’   So, if you’ve specified the updates to install at 12:00 via this policy setting, that’s when the computer will try to install the updates.

 

Also, make sure you have not enabled and applied the policy setting ‘Remove all access to Windows Update’ to your domain.  This policy setting will gray out the ‘Restart later’ option when updates have applied and require a reboot.

 

 

Q: Can I deploy Service Packs?

 

Yes, for example, WSUS is able to provide SP4 to Win2k SP3 computers.

 

Service Pack 4 for Windows 2000 is categorized under "Service Packs" at the WSUS server. Verify that you have selected the category "Service Packs" under update classification.

 

In the WSUS admin console:

 

Click Options --> Synchronization Options --> Press the "Change..." button under "Update classifications".  Select “Service Packs" and “Update Rollups” if not already selected.  Click ‘OK’ to return to the main console window.

 

If it was not selected, save the settings and perform a new synchronization by clicking on ‘Synchronize now’ in the tasks pane.

 

Afterwards, to locate SP4 for Win2k, you can create a custom view on the ‘Updates’ screen that includes ‘Service Packs’.  You can use the following search text in your filter criteria:

 

Service Pack 4

 

 

Q: How can I force my computer to download updates and install?

 

Try the force download and installation of approved updates from WSUS server and email results script here:

 

http://www.vbshf.com/vbshf/forum/forums/thread-view.asp?tid=199&start=1

 

 

 

Q: How can I tell if my computer has a pending reboot?

 

You can run the following VBScript to get this information.  Copy the lines of code into a text file and name it with a .vbs extension:

  

Set objSysInfo = CreateObject("Microsoft.Update.SystemInfo")

 

Wscript.Echo "OEM hardware support link: " _

 & objSysInfo.OEMHardwareSupportLink

Wscript.Echo "Reboot required: " & objSysInfo.RebootRequired

 

 

Q: How do I tell a computer to detect needed updates or check in with the server?

 

From the client computer, run the command ‘wuauclt.exe /detectnow’.  This will tell the client to check in for newly approved updates.

 

You can force a remote Windows Update Agent detection cycle by running the following VBScript (copy lines of code into a text file and name it with a .vbs extension).

 

sComputer = inputbox("Enter a computer name to run WUA detectnow","Invoke detectnow")

 

If sComputer = "" then

  wscript.echo "No computer name given.  Defaulting to local computer."

End If

 

on error goto 0

 

Set autoUpdateClient = CreateObject("Microsoft.Update.AutoUpdate",sComputer)

 

autoUpdateClient.detectnow()

 

wscript.echo "All done.  Check the windowsupdate.log file for WUA results."

 

 

Q: I’ve applied my GPO, but no clients are showing up in the WSUS console.  What’s going on?

 

There are number of reasons for this (and not all of them are listed here).  Please read through these carefully!

 

Not enough time has passed for the clients to check in automatically

 

Make sure that you’ve allowed enough time for the clients to check into the WSUS server.  I’ve seen clients check in as quickly as 10 minutes after running ‘wuauclt.exe /detectnow’, but sometimes it can be as much as a few days, depending on other factors:

 

·         Frequency of the GPO’s being applied to the computer (wuau.adm is a machine policy template), or if the GPO is applied at all

·         The time that you specified in your GPO for client check-ins under the GPO setting: ‘Automatic Updates Check-in Frequency’.

·         Frequency of computer restarts (and resultant GPO refreshes)

·         Frequency of computer connection to the AD (or whatever method you are using to propagate the WSUS client settings)

 

To force the computer to refresh the machine policy (note that this does not force a WU Agent refresh), do the following:

 

Windows 2000:     secedit /refreshpolicy machine_policy /enforce

Windows XP/2k3:  gpupdate /force

 

Potential duplicate clients using the same WSUS SID

 

Verify that you are not using cloned images without some sort of SID generation tool (Microsoft Sysprep or Norton’s GhostWalk, for example).  You may need to resolve this issue by deleting the registry keys that contain the WSUS SID information:

 

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\AccountDomainSid

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\PingID

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\SusClientId

 

Stop and restart the ‘Automatic Updates’ service in the service management console.

Execute ‘wuauclt /resetauthorization /detectnow’ from the command-prompt.

 

You can run this in a batch script to automate the process.  Copy the lines of code into a text file and name it with a .bat extension:

 

@echo off

Echo Save the batch file "AU_Clean_SID.cmd". This batch file will do the following:

Echo 1.    Stops the wuauserv service

Echo 2.    Deletes the AccountDomainSid registry key (if it exists)

Echo 3.    Deletes the PingID registry key (if it exists)

Echo 4.    Deletes the SusClientId registry key (if it exists)

Echo 5.    Restarts the wuauserv service

Echo 6.    Resets the Authorization Cookie

Echo 6.    More information on http://msmvps.com/Athif

Pause

@echo on

net stop wuauserv

REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v AccountDomainSid /f

REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v PingID /f

REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientId /f

net start wuauserv

wuauclt /resetauthorization /detectnow

Pause

 

Invalid GPO settings or GPO not being applied correctly to the clients

 

This is probably the #1 reason why clients are not showing up in the WSUS administration console.  Check and recheck your settings and make sure that you are applying your GPO properly!

 

Remember that the WSUS GPO is a computer-based GPO.  If you’ve applied it to an OU where only user objects are stored, you will not see any computers appear in the WSUS console.

 

Information on Windows 2003 Group Policies:

http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/featured/gp/default.mspx

 

Check to verify that you are receiving the WSUS policy on the client computer:

 

Windows 2000:

GPResult.exe (http://download.microsoft.com/download/win2000platform/gpresult/1.0/NT5/EN-US/gpresult.exe)

Windows XP/2K3:     

Resultant Set of Policies (RsoP) MMC snap-in or GPResult (built-in)

 

Q: How do I control the bandwidth used by Windows Updates (BITS)

 

WSUS and the Microsoft Updates service utilizes BITS (Background Intelligent Transfer Service), which can be throttled back to reduce bandwidth consumption.  This makes a single WSUS even more robust, by effectively increasing the variety of LAN/WAN scenarios to which it can service.

 

Information on using a GPO to manage BITS:

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/bits/bits/group_policies.asp

Try starting out by configuring it to 10kbps during the day and 50kbps after-hours.

 

 

Tools and related resources

 

Q: Where can I find tools to report information from my WSUS database?

Q: Where can I download WSUS?

Q: Where can I locate diagnostic tools to troubleshoot my client and/or server configuration?

Q: Where can I download the WSUS API Samples?

 

From this link:

http://www.microsoft.com/windowsserversystem/updateservices/downloads/default.mspx

 

You can find client and server diagnostic tools, the WSUS server software itself, RC Upgrade cleanup tool, and WSUS API samples.  

 

The WSUS samples includes the following tools (as of 8/25/2005):

(http://download.microsoft.com/download/7/4/5/7458e392-11de-4543-936c-b5248e344487/readme.htm)

 

Sample Name

Description

ApprovedUpdatesToXML

Creates an XML file with a list of approved updates and details of their approval including the groups that the update is approved for, and the approval action.

UpdateStatusToXML

Creates an XML file with a list of approved updates and their installed status on client computers. Each update section contains an overall summary for all computers, a summary per target group and the status of the update on each computer within each target group.

ComputerStatusToXML

Creates an XML file with a list computers on the Update Services server, and the status of updates approved for each computer.

UpdateStatusToCSV

Creates a simple CSV file with a list of approved updates and a summary of the status of the updates on each computer

UpdatesToXML

Creates an XML file with a list of updates and interesting information about each update, including ID, title, description, KB articles etc.

Update Services Notifications

A Windows Service that periodically sends email notifications to selected users about synchronized updates, and an update status summary. To install the service, run the setup and then run the Update Services Notifications shortcut from the start menu to configure the service.

ADImporter

This tool allows you to pre-populate target groups with computers from Active Directory. The sample application connects to the default Active Directory domain controller, and lists the OUs and computers in the domain. It also lists the computer groups available on the Update Services server. Using this sample, you can select computers from Active directory and "register" the selected computers with Update Services. Note that each computer registered must be configured to talk to the Update Services server independently of using this tool

CleanStaleComputers

This sample application removes computers from the Update Services server that have not contacted the server in a specified number of days.
USAGE:
CLEANSTALECOMPUTERS /DAYS:[1-365] /DELETE:{YES | NO} /PROMPT:{YES | NO}
/DAYS. Days since the computer contacted the server
/DELETE. Delete from the Update Services server or move to the Stale computers group
/PROMPT. Prompt before moving/deleting computers

ComplianceReport

Creates an HTML report that lists computers that do not have all the approved updates installed

ComputersNeedingReboot

Creates an HTML report that lists computers that have installed updates, but still require a reboot to be fully patched

ApproveNeededUpdates

(undocumented)

This tool lists all needed updates for clients (reporting to the WSUS server from where the tool is executed from) which have been set to an approval of ‘detect only’.  You are given a choice of approving all updates to ‘install’ status.  This will result in all previous approval settings for the affected updates to be removed.

ListApprovedUpdates

(undocumented)

Creates a text report that lists all approved updates since the specified date (accessible via a drop-down calendar object).  Along with the update title, the release date of the update, the applicable Operating Systems, and the date when the updates were approved are also listed.

wsusmigrate

 

The WSUS Migration Tools can assist in migrating settings from one WSUS server to another. The tools can backup and restore the following settings:

Configuration – export and import all WSUS options.

Computers – this refers to the machines that exist in the database of the server that you are backing up.
Target Groups – easily set up same target groups on multiple servers.
Approvals – migrate update approvals.

 

           

 

Central reporting for multiple WSUS servers

 

WSUS Reporting Rollup Sample Tool

This tool uses the WSUS application programming interface (API) to demonstrate centralized monitoring and reporting for WSUS. It creates a single report of update and computer status from the WSUS servers into your WSUS environment. The sample package also contains sample source files to customize or extend the tool functionality of the tool to meet specific needs. The WSUS Reporting Rollup Sample Tool and files are provided AS IS. No product support is availabe for this tool or sample files. For more information read the readme file.

 

Also located at: http://www.microsoft.com/windowsserversystem/updateservices/downloads/default.mspx

 

Q: How can I extract updates directly from the WSUS database?

You can use the WSUS Extract HTA tool developed by Rob Dunn here: http://www.wsus.info/forums/index.php?showtopic=6685

Alternatively, you can use this batch script found here: http://msmvps.com/blogs/athif/archive/2006/05/09/94107.aspx

 

WSUS and WUA Development

 

Q: Where can I find information on the WSUS (server component) API?

 

A MSDN portal has been set up here that goes into full detail of the information regarding developer resources for the WSUS development resources.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wus/wus/portal.asp

 

Also review the API samples listed above under ‘Tools and related resources’.

 

 

Q: Where can I find information on the WUA (Windows Update Agent) API?

 

A MSDN portal has been set up here that goes into full detail of the information regarding developer resources for the WSUS development resources.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wua_sdk/wua/portal_client.asp

 

 

WSUS Administration

 

Q: Where can I find Microsoft documentation for WSUS 2.0?

 

You can find it here:

http://www.microsoft.com/windowsserversystem/updateservices/downloads/WSUS.mspx

 

But for brevity’s sake, the main links are here:

 

 

 

Q: I’m having troubles with my WSUS server, what tools are available to help me troubleshoot the problem?

 

The server diagnostic tool (also called the “WSUS debug tool”) is available from here: http://www.microsoft.com/windowsserversystem/updateservices/downloads/default.mspx

 
This tool helps administrators gather Update Services Server debug logs and configuration information for further troubleshooting.
 
The tool has the below command line parameters (from the readme):
 
               OutputCab: optional parameter to create a cab of the tool output in the specified file.
 
               Tool: mandatory parameter specifying the tool to run. this parameter has the below options
·         ResetAnchors: Force a full sync in the next subscription run.
·         PurgeUnneededFiles: Delete all files not needed on the WSUS server.
·         SetForegroundDownload: Enable foreground content download in WSUS server. This can be used for proxies that don't support range requests.
·         ResetForegroundDownload: Reset foreground content download in WSUS server.
·         GetBitsStatus: Get the status of BITS jobs. This tool requires BitsAdmin.exe to be in PATH.
·         GetConfiguration:  Get the WSUS server configuration Information.
·         GetLogs: Get the WSUS Server Installation/Debug Logs.
 
Examples
 
·         Gather Server Logs: WsusDebugTool.exe /Tool:GetLogs /OutputCab:c:\ServerLogs.cab
·         Get help on a tool: WsusDebugTool.exe /Tool:GetConfiguration /?
·         Purge unneeded content: WsusDebugTool.exe /Tool:PurgeUnnneededFiles

 

Q: My WSUS content directory is full!  How can I clean up unneeded files?

 

See this question about why you may have so much data in your content directory (Re: SUS only took up xGb amount of space…why does my WSUS content directory have 18Gb of data in it?).  You may be downloading updates that you will never need to deploy.

 

Use the server diagnostic tool that you downloaded in the previous step(!) and run it with the following command-line switch:

 

Wsusdebugtool /Tool:PurgeUnneededFiles

 

 
NOTE IF YOU ARE USING REPLICA SERVER GROUPS:
 
Be ESPECIALLY careful about the process you engage when purging content in replica server groups.
 
It's critical that the downstream server has fully synchronized and downloaded all content from the master server -and- that the master server is not permitted to synchronize with microsoft.com during the period of time you intend to purge content stores.
The content stores in a replica server group need to be purged at the same time on all replica servers, or else you will encounter issues with your content folder not being correct on your replica servers [sic].
 
Specifically - if the master server syncs with microsoft, gets an update 'expired', but the downstream replica servers have not downloaded the content for that (now) expired update, the replica servers will crap out trying to download content that is now expired.
 
A similar problem happens if you purge the content from the master server before the replica server(s) have finished downloading the content. When attempting to download content, the replicas will throw '404' exceptions trying to get non-existent content.
I would suggest this procedure (after thinking about this issue for several weeks):
 
1.       Set the master server to manual synchronization.
2.       Synchronize the master server with microsoft.com.
3.       When the master server has finished synchronizing, run 'removeunneededrevisions' (if desired), and then mark updates to be purged as "Declined".
4.       At each replica server, set the replica server to manual synchronization, then synchronize with the master server.
5.       When the replica server has finished synchronizing (which will include the updates now marked as "Declined"), as well as synchronizing for revisions to be removed, and have downloaded any needed content, then run the PurgeUnneededFiles on the replica server. (You cannot run 'removeunneededrevisions' on the replica servers, as the metadata on a replica server cannot be "managed".)
6.       After all replica servers have been synchronized, fully downloaded, and purged, then you can run PurgeUnneededFiles on the master server.
7.       Reset the master server to automatic synchronization. (You might also want to run a manual synchronization if you missed a scheduled synchronization during this purge process.)
8.       Reset the replica servers to automatic synchronization.
 
I believe this procedure will avoid any risks that would otherwise be encountered when purging content from a replica server group.
 
-Lawrence Garvin WSUS MVP

 

 

 

Q: How do I configure the WSUS console for read-only access for reporting purposes? (WSUS 2.0)

 

This is not Microsoft recommended, but it can be done.

 

This will result in the following:

 

You can set up a ‘read-only’ group so that certain members of management, etc. can view the reports and have no permission to edit any settings.  This is accomplished by creating a couple copies of the main aspx files and adding some permissions to the subfolders of the WSUS administration site.

 

NOTE: Step 11 involves editing a file that will reduce functionality slightly by removing the ability to edit an update approval settings via the WSUS reporting mechanism.  This can still be accomplished through the main update window via the WSUS console.

 

 

  1. Create a new local group on your WSUS server, called ‘WSUS Read-only’, add your members to this group.

 

  1. Browse to the ‘C:\program files\update services’ folder (or wherever your root update services folder resides).

 

  1. Right-click the administration folder> Security, add ‘WSUS Read-only’, click the ‘Advanced’ button.

 

  1. Under ‘Permission entries’, double click ‘WSUS Read-only’, change the permissions so ‘Apply onto’ is set for ‘This folder only’.

 

  1. Click ‘OK’ to apply your changes to the advanced permissions window, then ‘OK’ again for the folder properties window.

 

  1. Right-click the ‘Common’ folder> ‘Security’, give the ‘WSUS read-only’ group the following permissions:

 

 

  1. Give full read permissions to the ‘WSUS read-only’ group (see step 6 for help):

 

  1. Give the ‘WSUS Read-only’ group read permissions (at this folder level ONLY, not subfolders) to the following folders (see step 4 for help):

 

  1. Give the ‘WSUS Read-only’ group read permissions for the following files (see step 6 for help):

·         Help.aspx

·         utcxpost.aspx

 

·         Details.aspx

 

                                                               i.            Details.aspx

 

  1. Make a copy of these two files in the root of./administration, and paste them back into the same folder:

           

Rename the copies to:

 

  1. Make changes to the following files:

.\administration\RO-default.aspx:

 Change any reference to banner.aspx to say RO-banner.aspx (should only be one)

 

.\administration\RO-banner.aspx:

                        Add the following lines right before </html> toward the end of the file.

           

<script language="VBSCRIPT">

TabManage.style.display = "none"

TabComputers.style.display = "none"

TabUpdates.style.display = "none"

</script>

 

Warning:  This next file change will disable the ability to approve/decline updates from the reporting mechanism (even if you are an administrator).  You can still perform approval actions against the updates if you go through the Updates interface as Administrator.

 

.\administration\reporting\currentstatus\approvalsummary\detaulsdialog.aspx

Add ‘//’ to line 39, so it looks like this (this remarks out the function to create the approval links in the details window for the update if it is clicked on):

 

//TCDeploymentTableClick(null, null, TCLastSelectedRow);

 

Have one of your new WSUS read-only users browse to http://server/wsusadmin/ro-default.asp.  The ‘WSUS read-only’ group should be able to view the welcome screen, reports and computers icon.  They should not have the ability to change or decline any approvals.

 

 

Q: I like to develop VBScripts for administration purposes.  Where can I find information on the scripting interface for WSUS?

 

There isn’t a current interface for WSUS (you have to develop your tools in .NET for WSUS), but there is for the Windows Update Agent. 

 

Here are two good resources from Microsoft:

 

http://www.microsoft.com/technet/scriptcenter/scripts/sus/client/default.mspx

http://www.microsoft.com/technet/community/columns/scripts/sg0705.mspx#EMAA

 

 

Q: SUS only took up xGb amount of space…why does my WSUS content directory have so much more data in it? 

  

A number of factors can determine exactly how much data your WSUS content folder is holding.

 

 

So, while SUS didn't store as much content, WSUS has a bit more flexibility in what it is archiving – verify your configuration by checking the WSUS Administration options under ‘Synchronize’.  Make sure you are only downloading the updates for the languages and OS types that you support.

 

Q: I’m getting error code (insert error code here) in my Windows Update logs, what do these errors mean?

 

Here is a list of Automatic Update related error codes that you can peruse that may give you an indication of what’s going on (it’s a big file, so be patient while it loads):

http://www.vbshf.com/vbshf/wsus/sus_error_code.htm

 

 

Other FAQ’s:

http://www.microsoft.com/windowsserversystem/updateservices/evaluation/faqs.mspx - Microsoft WSUS

http://www.wsuswiki.com/WSUSFAQ - WSUS Wiki

 

 

WSUS Resources

http://www.microsoft.com/wsus - WSUS download and technical documentation

http://www.microsoft.com/windowsserversystem/updateservices/evaluation/revguide.mspx - Windows Update Services Reviewer’s Guide

http://www.wsus.info/ - WSUS information/forums/articles/tool recommendations

http://www.wsuswiki.com/ - WSUS WIKI information

http://msmvps.com/Athif/ - Mohammed Athif Khaleel’s WSUS blog (WSUS MVP)