Exam Ref 70-696 Managing Enterprise Devices and Apps (MCSE): Plan and Implement Software Updates

  • 12/31/2014

Objective 3.2: Deploy software updates by using Configuration Manager and WSUS.

Integrating Configuration Manager with WSUS provides many benefits to an administrator responsible for ensuring that computers in his or her organization remain up to date. Using Configuration Manager gives you much more control over update deployment, enabling you to specify when updates will be installed and giving you detailed information about whether Configuration Manager clients comply with previously deployed updates.

Software updates in Configuration Manager

Configuration Manager integrates with the WSUS engine to synchronize with the Microsoft Update servers to retrieve metadata for software updates, assess which software updates are required for Configuration Manager clients, and then deploy those updates to clients. You get the following benefits by using Configuration Manager to manage software updates instead of using WSUS by itself:

  • Scan and deploy functionality You can scan a collection of client computers for required updates, analyze results, and then deploy updates to those client computers.
  • Compliance integration You can integrate the software updates feature with other Configuration Manager functionality, such as compliance baselines and task sequences, for operating system deployment.
  • Collection-based maintenance windows Use this feature to ensure that Configuration Manager only applies updates during approved maintenance periods.
  • Enhanced monitoring and reporting Compared to WSUS, Configuration Manager provides extensive monitoring capabilities, such as detailed state messages, status updates, and alerts for key software-update issues. Configuration Manager also provides an extensive number of reports to show your entire organization’s deployment status and compliance statistics with respect to updates.
  • Wake on LAN and power management support Configuration Manager includes support for technology that wakes up a computer on a local area network (Wake On LAN technology). This feature enables you to deploy software updates after business hours without requiring users to leave their computers on, which consumes power unnecessarily.
  • Support for Network Access Protection (NAP) With the integration of NAP and the System Health Validator point site system role, you can define what software updates are required for computers to connect to and communicate with the network resources. This differs from WSUS integration with NAP, by which, rather than requiring specific updates to be deployed, you test to see whether an update check was performed recently and detected updates of a specific type have been installed.

Configuration Manager software update point

The software update point is a Configuration Manager site system role that supports software update management. It integrates WSUS with the Configuration Manager infrastructure. In multisite Configuration Manager deployments, each site usually contains a software update point. You typically configure the software update point at the hierarchy’s top-level site to synchronize updates from Microsoft Update. Then, you configure the software update points in each child site to synchronize updates from the upstream update server in the parent site.

The deployment of software update points in secondary sites is optional. It is generally a good idea to deploy a software update point in a secondary site when there is limited network bandwidth between client computers and site systems in the primary site. When you configure a software update point in a secondary site, the WSUS installation is configured as a replica of the WSUS instance located in the primary site. Clients located within the secondary site boundaries are configured to communicate with the local software update point in the secondary site. In this configuration, you continue to manage all deployments from the primary site.

System Center 2012 R2 Configuration Manager supports multiple software update points in each site. When you deploy multiple software update points in a site, those software update points are automatically load balanced in the following way: Configuration Manager initially assigns a client to a software update point. The client retains that assignment unless it experiences a software-update failure such as the WSUS server being unavailable or unresponsive. The client retries to connect to the software update point a minimum of four times at 30-minute intervals. After the fourth attempt, the client waits an additional two minutes and then chooses another software update point randomly from the site, with a priority of a software update point that resides in the same forest.

If you deploy the software update point on a computer that hosts additional site system roles, you can support up to 25,000 clients. If the software update point site system role is deployed by itself, it can support up to 100,000 clients.

Deployment

When you install a software update point, you must configure it to communicate with the WSUS through the appropriate ports. By default, when you install WSUS on a computer running Windows Server 2012 or Windows Server 2012 R2, it creates a dedicated website for WSUS and configures ports 8530 for HTTP and 8531 for HTTPS.

A Configuration Manager software update point has the following prerequisites:

  • WSUS 3.0 SP2 or newer The Software Updates feature requires WSUS 3.0 Service Pack 2 (SP2) or newer for software-updates catalog synchronization and client scanning for compliance assessments with respect to software updates. For Windows Server 2008 R2, you must download and install WSUS and related prerequisites on a system before configuring that system as a Configuration Manager site system for a software update point. From Windows Server 2012 onward, WSUS is a built-in role.
  • WSUS 3.0 SP2 or newer administration console If WSUS is not installed on the site server, you must install the WSUS administration console on the Configuration Manager site server. This enables the site server and the WSUS server to communicate with each other.
  • Configuration Manager roles The software update point also requires the management point and distribution point roles to be deployed.
  • Configuration Manager reporting services point Although not a primary prerequisite, before you can use software updates reports you need to configure a reporting services point site system. However, because other Configuration Manager features require the reporting services point, you most likely have deployed it within your infrastructure already.

As you deploy and configure the software update point, ensure that the site system role is working as expected. Component Status provides status messages related to the components used during the software update configuration. In the Monitoring workspace, expand System Status and then click Component Status. The following components are related to the software update point:

  • SMS_WSUS_CONTROL_MANAGER Displays status information related to the installation of the component on the software update point. This component also provides information about the availability of the component on the server. The related WSUSCtrl.log stores detailed information.
  • SMS_WSUS_CONFIGURATION_MANAGER Displays status information related to the success or failure of configuration settings for the software update point. The related WCM.log stores detailed information.

Synchronizing the update point

The software update process begins when the top-level site (central administration site or standalone primary site) downloads the metadata of the software update catalog that identifies each update and the products to which it applies. Depending on synchronization settings that you configure within the Configuration Manager console, the software-updates synchronization process retrieves the metadata from an upstream software update point or from Microsoft Update. You can schedule metadata synchronization as part of the software update point properties, or you can initiate the update manually.

To synchronize the metadata of the software update catalog, follow these steps:

  1. Select the software update classes and products for synchronization and then synchronize them either based on a schedule that you configure or by initiating the synchronization manually. The WSUS Synchronization Manager on the site server calls an application programming interface (API) to request the WSUS server to initiate synchronization with Microsoft Update or with an existing WSUS server that is not in the Configuration Manager hierarchy.
  2. The WSUS server requests the metadata of the software update catalog from Microsoft Update, which returns it to the WSUS server. If the synchronization occurs on a configured schedule, the software update point performs a full synchronization and applies all metadata changes, such as additions, modification, or removals. If you initiate the synchronization manually, the software update point inserts only new catalog metadata into the site database. This results in faster synchronization. The WSUS server stores the metadata in the WSUS database, and the WSUS Synchronization Manager continues to poll the WSUS server until synchronization is complete.
  3. When WSUS Synchronization Manager polling detects that WSUS synchronization is complete, it requests the software update metadata from the WSUS server and inserts it into the Configuration Manager site database. When synchronization is complete, the SMS_WSUS_SYNC_MANAGER component creates status message 6702. You also can verify a successful synchronization by reviewing the site server’s Wsyncmgr.log for a reference to status message 6702. If synchronization fails, the WSUS Synchronization Manager schedules another attempt within 60 minutes. Status message 6703 also provides information about the failure. When the metadata synchronization process is complete, you can view the software updates from within the Configuration Manager console.

When the software update point that is located in the central administration site completes metadata synchronization, the metadata replicates to all child primary site databases by using database replication. After data replication is complete for the site databases, the child site’s WSUS Synchronization Manager requests the WSUS database instance running on the child site’s software update point to initiate synchronization with the upstream WSUS server in the central site. Child sites always perform a full synchronization. The WSUS Synchronization Manager in each primary site then sends a replication request to any of its respective child secondary sites that contain a software update point.

If you have a software update point that you do not configure to synchronize with an upstream server (for example, a software update point that is located in a perimeter network), you can export and import updates manually by using the WSUSutil tool. Using WSUSutil to export or import metadata requires local administrative privileges on the WSUS server. You must run the tool locally on the server. Use the following process to export and import the metadata:

  1. On the export server, copy all the files and folders from WSUSInstallationDrive\WSUS \WSUSContent\ to the import server. This ensures that locally stored updates and applicable license terms are available to the import server.
  2. On the export server, open a command prompt, type the following command, and then press Enter:

    wsusutil.exe export <packagename> <logfilename>
  3. Move the exported package to the import server, open a command prompt, type the following command, and then press Enter:

    wsusutil.exe import <packagename> <logfilename>

Software Update Manager security role

To configure the site system role for the software update point, you need to be a member of the Full Administrator security role. The Software Update Manager role should be associated with administrative users who need to perform software update–related tasks. This role includes the following permissions:

  • Allows you to delegate the management of software updates.
  • Allows you to define and deploy software updates to clients.
  • Provides permissions to create and modify software update packages, Software Update Groups, deployment templates, and provides the ability to enable software updates for NAP.

Software update client settings

In the Administration workspace, you use the Client Settings node to specify settings related to various client agent components, including the Software Updates agent. You can use the Default Client Settings object to apply configuration settings for software updates to the hierarchy’s clients. You can create and configure a Custom Client Device Settings object if you have unique software updates settings that you want to apply to members of a specific collection.

The Computer Agent section of the Default Settings dialog box provides the Disable Deadline Randomization setting for controlling the deployment of software updates. This Yes or No setting determines whether updates deploy at the designated time or use a random start time of up to two hours after the scheduled beginning of the deployment.

The Software Updates section, shown in Figure 3-9, contains the following settings that configure how client computers deploy software updates:

FIGURE 3-9

FIGURE 3-9 Software Updates

  • Enable Software Updates On Clients Specifies whether the Software Updates agent is enabled or disabled on client computers. Setting the option to Yes enables software updates, which is the default setting. Setting the option to No disables software updates on clients.
  • Software Update Scan Schedule Specifies how often the client computer initiates a scan for software updates compliance. By default, the software update scan occurs every seven days.
  • Schedule Deployment Re-evaluation Configures how often the Software Updates agent reevaluates software updates for installation status. This setting is useful if a user has uninstalled a deployed update. This setting initiates reevaluation, and if an update is missing, it reinstalls that update automatically according to the reevaluation schedule that you configure. By default, deployment reevaluation is every seven days.
  • When Any Software Update Deployment Deadline Is Reached, Install All Other Software Update Deployments With Deadline Coming Within A Specified Period Of Time Specifies whether to enforce all required software update deployments that have installation deadlines within a specific period if a single update reaches its installation deadline. Setting the option to Yes enables the setting. Setting it to No disables the setting, which is the default configuration.
  • Period Of Time For Which All Pending Deployments With Deadline In This Time Will Also Be Installed Specifies the period for the previous setting. When you set the previous setting to Yes, you can specify a period. Required updates within the specified period deploy when another update reaches its deadline. The default setting is one hour.

Maintenance windows, shown in Figure 3-10, enable you to prevent systems from rebooting during critical times. For example, deploying updates in the middle of the workday would most likely be disruptive to your users, so you can configure a maintenance window so that update deployment would occur only after 4:00 P.M. or 5:00 P.M.

FIGURE 3-10

FIGURE 3-10 Maintenance Windows tab

Use maintenance windows to control when:

  • Required software deployments can run.
  • Software updates will deploy.
  • Compliance settings deployments and evaluations can run.
  • Operating system deployments can occur.
  • Task sequence deployments can run.

By specifying available windows for these tasks to run, you can prevent unnecessary interruptions for users. Maintenance windows only apply to when deployments are allowed to run. You can schedule the deployments to download and run locally so that downloads can occur before the maintenance window.

You configure maintenance windows in the properties of a device collection on the Maintenance Windows tab. You can configure multiple windows on a collection, and a device can be in multiple collections that have scheduled maintenance windows. Each maintenance window is defined by the start time, end time, and recurrence pattern. In addition, you can configure the maintenance windows to All Deployments, only Software Updates, or only Task sequences.

Any reboots caused by a deployment can occur only during a maintenance window. Therefore, you should configure your software updates maintenance windows to be long enough to deploy all the appropriate updates to prevent reboots during working hours. Each maintenance window must be configured for less than 24 hours.

When a device is affected by multiple maintenance windows, the maintenance windows are cumulative. For example, if a device is in a collection with a maintenance window from 12:00 A.M. to 3:00 A.M. and in a different collection with a maintenance window from 2:00 A.M. to 5:00 A.M., its effective maintenance window would be from 12:00 A.M. to 5:00 A.M.

Maintenance windows only affect deployments that start automatically. If a user starts a deployment from the application catalog or from the software center, the application will install, and any required reboots will occur.

Scanning for update compliance

When the initial scan begins on a client, the Software Updates agent submits a request to the management point to find the WSUS server that the scan will use. After the management point provides the WSUS server location, the agent enables the Specify Intranet Microsoft Update Service Location local Group Policy setting located at Computer Configuration \Administrative Templates\Windows Components\Windows Update and then configures the policy setting with the URL of the server that is running the software update point.

If you configure Windows Update settings in an Active Directory–based Group Policy Object (GPO), the Active Directory settings override the local Group Policy settings that the Software Updates agent configures. Be sure to remove conflicting Group Policy settings from Active Directory when integrating software updates by using Configuration Manager.

The Software Updates agent then passes a scan request to the Windows Update agent. The Windows Update agent connects to the WSUS server, retrieves the software updates metadata, and then performs a local scan on the client. The Windows Update agent sends the compliance results to the management point by using state messages. The management point forwards the results to the site server, which then inserts them in the site database.

The process to scan clients for update compliance is as follows:

  1. Per the schedule that you configure, or when you initiate the scan manually, the client receives machine policy from the Management point. The machine policy configures local Group Policy settings with the name of the software update point that the Windows Update agent should use. The machine policy also provides the schedules for scanning and reevaluation.
  2. The compliance scan initiates on the client. The Windows Update agent on the client connects to the WSUS server, retrieves the software update metadata, and initiates the compliance scan. The client returns a list that reflects the compliance state for every update evaluated.
  3. If configured, WSUS stores the scan results in the WSUS database. This setting is not enabled by default.
  4. The client stores the compliance scan results in Windows Management Instrumentation (WMI) and then sends the results as a batch to the management point as state messages. The client then sends the state messages to the management point in bulk every 15 minutes by default.
  5. The management point sends the results to the site server, which then enters them in the site database.
  6. You can view the compliance scan results by using the Configuration Manager console or by using reports in categories such as the Software Updates – D Scan category and Software Updates – A Compliance category.

Compliance states

When a client computer performs a deployment evaluation for software updates, Configuration Manager creates a state message that contains the software update’s compliance state for each update that it is evaluating. Configuration Manager then sends state messages to the site server through the management point, which then inserts them in the site database. A database summarization process occurs, which summarizes the results into specific compliance states. For each update, the Configuration Manager console displays the number of client computers in each compliance state.

Compliance states are as follows:

  • Required The software update is applicable to and required on the client computer. The site server also might report this state for three scenarios:

    • If the software update is deployed but not installed
    • If the state messages have not been received on the site server
    • If the update requires a computer restart before it completes
  • Installed The software update has installed on the computer.
  • Not Required The software update is not applicable to the client computer.
  • Unknown The site server has not received any information about the specific update from the client computer. The site server might report this state for three scenarios:

    • The client computer’s compliance scan has not been reported.
    • The scan was not successful.
    • The scan was successful, but the state message has not been processed at the site server due to a backlog state or a corrupt state message file.

Managing updates

Managing software updates includes determining what software updates to deploy, deploying the updates to client devices, and then monitoring the results of the software updates deployment. To improve efficiency and consistency of software updates management, you can use software update groups.

Software update groups

A software update group is a logical collection of software updates that can be deployed as a single unit.

Using a software update group has many advantages, including the following:

  • Ensuring ease of management when you deploy multiple updates You can use a software update group to organize multiple software updates into a single object that a deployment can reference for targeted collections. You can run the Download Software Updates Wizard based on a software update group and then create a deployment package. This package references specific software-update installation files and then distributes the files to distribution points. You also can use the Deploy Software Updates Wizard for a software update group to deploy the updates within that software update group to a targeted collection.
  • Providing easy tracking capabilities for the compliance status for multiple updates A software update group includes only the software updates that you add. You can use the software update group to monitor the compliance status for target systems. In addition, when you use software update groups to create deployment packages, you can use reports such as the Compliance 1 – Overall Compliance and the Compliance 3 – Update Group (per update) to obtain status for each software update within the group.
  • Enabling the delegation of software update administration Using a software update group enables you to delegate the administration of software updates. For each software update group, you can set one or more security scopes, which you then can reference when you add an administrative user to whom you assign the Software Update Manager security role.

To create a software update group, select one or more updates and then, on the ribbon, click Create Software Update Group. In the Create Software Update Group dialog box, you can set options for a group name and description.

You can add software updates to an existing software update group by selecting the update and then clicking the Edit Membership button on the Home tab on the ribbon. This displays a list of available software update groups that you can then select as required.

Downloading updates

Deploying software updates involves creating a deployment package, downloading the software update files, and then distributing them to distribution points. Verify that the content is available on distribution points before you deploy the software updates to clients.

You can use the Download Software Updates Wizard to create the deployment package, define the distribution points, and specify the download location of the update files. Start the wizard by selecting one or multiple software updates or a software update group and then clicking the Download button on the ribbon.

When you run the Download Software Updates Wizard, you configure the following:

  • Deployment Package Enables you to select an existing deployment package or create a new one. The deployment package specifies its source, which is the location to which the source files download and from which the client distributes them to distribution points. You must create and share the package source folder that the deployment package uses. Each deployment package uses a specific shared folder.
  • Distribution Points Enables you to specify the distribution points or distribution point groups that host the deployment package files. This page displays only if you are creating a new deployment package.
  • Distribution Settings Enables you to specify several distribution options. This page displays only when you are creating a new deployment package. The options that you can specify include the following:

    • Distribution Priority You can specify the priority in which the client sends packages to distribution points. The client sends packages with a high priority before sending packages that you configure with a medium or low priority.
    • Distribute The Content For This Package To Preferred Distribution Points If you select this option, a client request causes the local distribution point to download the package if it has not downloaded already.
    • Prestaged Distribution Point Settings This section provides options for controlling the behavior of distribution points that you configure to support prestaged content.
  • Download Location Specifies the location from which the software update point downloads the software update files. If you have an Internet connection, you can select Download Software Updates From The Internet. If you do not have an Internet connection, you can download the software updates manually and then store the files on an accessible network location. You can select Download Software Updates From A Location On My Network and then provide the network location of the stored files.
  • Language Selection Specifies the languages that should be downloaded for each software update file.

Update deployment

When you deploy software updates to client computers, the software-update deployment information is added to the Configuration Manager machine policy. The client computer becomes aware of the deployment on the next machine policy retrieval and evaluation cycle. The cycle’s default setting is every 60 minutes.

To deploy software updates to client computers, you first must create a deployment package. You do so by running the Deploy Software Updates Wizard, which you can invoke by selecting specific updates or by selecting a software update group and then clicking Deploy On The Ribbon.

To deploy software updates:

  1. In the System Center 2012 R2 Configuration Manager console, use the Deploy Software Updates Wizard to create a new deployment package. In the wizard, you can define numerous settings, such as:

    • Software updates or software update group that the deployment includes.
    • Collection or collections that the deployment targets.
    • Deployment settings that you should use, such as whether the updates are required or available and whether to turn on the Wake On LAN functionality.
    • Deployment scheduling, which specifies when the software will be available, and the deadline for the installation.
    • User experience, such as notifications and restart behavior.
    • Alert settings.
    • Download and installation settings for slow networks.
    • Locations of the package source and distribution points.
    • Whether you want to download software updates from the Internet or from a network location.
    • Language selection for the updates.
  2. The site server requests the software updates’ binaries from the download location that you define in the deployment. These binaries can come from Microsoft Update or from a local source.
  3. The site server copies the software update binaries to the content library on the distribution point. The site server adds the new software update deployment to the machine policy.
  4. At the client policy polling interval, the client retrieves the machine policy from the management point and receives the new deployment information.
  5. If the software update catalog has changed, the client scans for each software update to verify that it is still required. If you configure the software-update deployment type as Required, the client requests the binaries from the distribution point for each required update and then stores them in the local cache. If you configure the deployment type as Available, the updates download when the user invokes the installation.
  6. The client sends a state message to the management point that reports that the software update was downloaded. The management point forwards the state message to the site server, which then enters the message into the database.
  7. When the installation deadline for the software update arrives or you initiate the update installation manually, the client scans for each software update to verify that it still is required. The client then installs the software update, performs another scan on the client to verify that the update is no longer required, and then sends a state message to the management point that indicates the update has been installed. If a restart is necessary, the state message indicates that the client computer is pending a restart. After the restart, a scan begins to verify that the software update is complete and no longer required and creates a state message to indicate that the update has installed. For each software update that fails to install, an error-status message is sent to the management point, which forwards the messages to the site server. The site server then inserts status messages into the database.

Client computers initiate a deployment reevaluation cycle every seven days by default. During this evaluation cycle, the client computer scans for previously deployed and installed software updates. If any are missing, the software updates are reinstalled on the client.

Monitoring and troubleshooting software updates

You can use several methods to monitor and troubleshoot the client compliance and deployment of software updates, including the All Software Updates results pane, alerts, status messages, reports, WSUS logs, server-side logs, and client logs.

Monitoring software update processes

You need to monitor three basic activities when using Configuration Manager to manage software updates. These are synchronization, distribution, and client deployment.

To verify that the software update point has the most recent list of available updates, it needs to be able to perform synchronization successfully. You can use the following methods to monitor software update point synchronization:

  • Software Update Point Synchronization Status Located in the Monitoring workspace, the Software Update Point Synchronization Status node provides detailed information related to the synchronization status for all software update points in the hierarchy. Details include the synchronization source, last synchronization date and time, synchronization status, and error codes for failures.
  • Alerts When you configure the synchronization schedule for the software update point, you can configure an alert to generate if synchronization fails on any site in the hierarchy. You also can modify this setting from the Sync Schedule tab of the Software Update Component Properties dialog box. You can view alerts from the Alerts node in the Monitoring workspace.
  • SMS_WSUS_SYNC_MANAGER This method displays status information related to both WSUS synchronization and site database synchronization with WSUS. The wsyncmgr.log stores detailed information and is located in either the INSTALL_PATH \Logs folder or the SMS_CCM\Logs folder, if the system is a management point.

You can use one of the following methods to ensure that update content distributes successfully to distribution points:

  • Content Status In the Monitoring workspace, under the Distribution Status node, you can click Content Status. When you click this node, the results pane displays a list of all content that has been distributed. You can right-click a specific content type, such as a software update package, and then click View Status to display status and progress information related to content distribution to distribution points.
  • Package Transfer Manager The Package Transfer Manager component (SMS_PACKAGE_TRANSFER_MANAGER) provides status information related to content transfers to distribution points. You can find the related PkgXferMgr.log on the site server in the <Configuration Manager Installation Path>\Logs folder. This log file provides verbose installation and configuration information related to content distribution to remote distribution points.

After update content has been transmitted to distribution points, you can use the following elements to monitor the deployment of that content to Configuration Manager clients:

  • Deployment Status When you click the Deployments node, the results pane shows a list of all current deployments, including deployments related to the software update feature. You can right-click a specific deployment and then click View Status to display status information related to a specific software update deployment.
  • Alerts When you create a deployment, you can enable alerts based on specified criteria. For example, you might want an alert to be generated if client compliance for the deployment is below a specific percentage. You view generated alerts from the Alerts node in the Monitoring workspace.

Software Updates reports

The Reporting node in the Monitoring workspace contains reports that are organized within specific categories as shown in Figure 3-11. You can use reports to provide information to anyone who has permission to access the reporting feature.

FIGURE 3-11

FIGURE 3-11 Software Updates reports

These reports are grouped as follows:

  • Software Updates – A Compliance Contains reports related to compliance based on specific software updates, software update groups, or computers. Reports include:

    • Compliance 1 - Overall Compliance.
    • Compliance 2 - Specific Software Update.
    • Compliance 3 - Update Group (Per Update).
    • Compliance 4 - Updates By Vendor Month Year.
    • Compliance 5 - Specific Computer.
    • Compliance 6 - Specific Software Update Status (Secondary).
    • Compliance 7 - Computers In A Specific Compliance State For An Update Group (Secondary).
    • Compliance 8 - Computers In A Specific Compliance State For An Update (Secondary).
  • Software Updates – B Deployment Management Contains reports that provide information related to deployments and the updates contained within specific deployments. Reports include:

    • Management 1 - Deployments Of An Update Group.
    • Management 2 - Updates Required But Not Deployed.
    • Management 3 - Updates In A Deployment.
    • Management 4 - Deployments That Target A Collection.
    • Management 5 - Deployments That Target A Computer.
    • Management 6 - Deployments That Contain A Specific Update.
    • Management 7 - Updates In A Deployment Missing Content.
    • Management 8 - Computers Missing Content (Secondary).
  • Software Updates – C Deployment States Contains reports that illustrate the enforcement and evaluation states of a computer or specific deployment. Reports include:

    • States 1 - Enforcement States For A Deployment.
    • States 2 - Evaluation States For A Deployment.
    • States 3 - States For A Deployment And Computer.
    • States 4 - Computers In A Specific State For Deployment (Secondary).
    • States 5 - States For An Update In A Deployment (Secondary).
    • States 6 - Computers In A Specific Enforcement State For An Update (Secondary).
  • Software Updates – D Scan Contains reports that display the last scan states by collection and by site. Reports include:

    • Scan 1 - Last Scan States By Collection.
    • Scan 2 - Last Scan States By Site.
    • Scan 3 - Clients Of A Collection Reporting A Specific State (Secondary).
    • Scan 4 - Clients Of A Site Reporting A Specific State (Secondary).
  • Software Updates – E Troubleshooting Contains reports that display information related to scan and deployment errors. Reports include:

    • Troubleshooting 1 - Scan Errors.
    • Troubleshooting 2 - Deployment Errors.
    • Troubleshooting 3 - Computers Failing With A Specific Scan Error (Secondary).
    • Troubleshooting 4 - Computers Failing With A Specific Deployment Error (Secondary).

Update-related log files

Configuration Manager log files provide detailed information about software-updates components. You can use log files to help verify functionality or troubleshoot issues.

Site Server Log Files

You can find the Site Server log files in the following folders on the site server, in the <InstallationPath>\Logs folder. These log files include:

  • PatchDownloader.log Located on the Configuration Manager console computer that you use to run the wizard to download the update, this log file provides information about downloading software updates, from the update source that you specify in the software updates metadata to the designated download destination.
  • WCM.log Located on the site server, this log file provides information about the software update-point configuration and about connecting to the WSUS server for subscribed update categories, classifications, and languages.
  • wsyncmgr.log Located on the site server, this log file provides information about the software-updates synchronization process.
Software Update Point Log Files

Software update point log files are located on the software update point (WSUS server) in both the %ProgramFiles%\Update Services\Logfiles folder and the C:\Program Files\Microsoft Configuration Manager\Logs folder. These log files include:

  • WSUSCtrl.log This log file provides information about the configuration, database connectivity, and health of the site’s WSUS server.
  • SoftwareDistribution.log This log file provides information about the software updates that synchronize from the configured update source to the WSUS server database.
Client Computer Software Update Log Files

In some cases, you’ll need to investigate a client computer to determine why software updates are not being applied. Log files are located on the client computer, in both the %windir%\CCM\Logs and the %ProgramFiles%\SMS_CCM\Logs folders (for management points). These logs include:

  • ScanAgent.log This log file provides information about the scan requests for software updates, what tool is requested for the scan, and the WSUS location.
  • WUAHandler.log This log file provides information about when the Windows Update agent searches for software updates.
  • WindowsUpdate.log Found on the client in the %windir% folder, this log file provides information about when the Windows Update agent connects to the WSUS server and retrieves the software updates for compliance assessment and whether there are updates to the agent components.
  • UpdatesHandler.log This log file provides information about software update compliance scanning and the download and installation of software updates on the client.
  • UpdatesStore.log This log file provides information about the compliance status for the software updates that the compliance scan cycle assesses.
  • UpdatesDeployment.log This log file provides information about the deployment on the client, including software update activation, evaluation, and enforcement. Verbose logging shows additional information about the interaction with the client user interface.

Automatic deployment rules

Automatic deployment rules help you automate the deployment of specific update types, depending on the criteria that you configure. You can use an automatic deployment rule to automate:

  • Selection of software updates per criteria that you specify.
  • Creation of a software update group that contains the selected updates.
  • Download and distribution of software-update content to distribution points.
  • Deployment of updates to client computers.

Automatic deployment rules are beneficial for managing routine updates, such as monthly deployments of software updates and definition updates for antimalware solutions such as System Center 2012 R2 Endpoint Protection (Endpoint Protection).

An automatic deployment rule relies on property filters and search criteria that you configure to specify the updates that become part of an associated software update group. For example, you might want to automate creation of a software update group that contains any definition updates released within the past week. To meet this requirement, you configure a rule based on the Date Revised and Update Classification property filters. The Date Revised filter would contain a criterion that selects updates released within the past week, and you would configure the Update Classification filter to select Definition Updates.

After the rule runs, you have the option to:

  • Enable download and deployment of the updates within a software update group.
  • Use the rule to automate membership creation or updating for a software update group and create the deployment object. This enables you to verify the list of the group’s software updates and then enable the update group’s deployment manually as needed.

You use the Create Automatic Deployment Rule Wizard to specify settings that relate to the automatic deployment rule. To start the wizard, use the following procedure:

  1. From the Software Library workspace, expand the Software Updates node.
  2. Select Automatic Deployment Rules.
  3. On the ribbon, click Create Automatic Deployment Rule.

On the pages of the Create Automatic Deployment Rule Wizard, described in Table 3-1, provide the following settings:

TABLE 3-1 Automatic Deployment Rule Wizard pages and settings

Page

Description

General

Enables you to configure general information for the automatic deployment rule, including the following:

  • Name Use to provide the name associated with the automatic deployment rule.
  • Description Use to provide additional information about the rule.
  • Template Select a previously saved deployment template or use the built-in Definition Updates or Patch Tuesday templates. Create a deployment template to save the current configuration settings for the deployment during the wiz-ard’s last step.
  • Collection Specify the collection that the software update deployment is targeting.
  • Software Update Group Add software updates to an existing software update group or ensure creation of a new software update group each time the rule runs.
  • Enable The Deployment After This Rule Runs Specify whether the updates deploy to clients immediately after rule evaluation. If you do not select this option, you need to enable the deployment of the software update group manually.

Deployment Settings

Enables you to configure specific deployment settings, such as:

  • Use Wake On LAN To Wake Up Clients For Required Deployments Select this check box to enable Wake On LAN functionality.
  • Detail Level Specify the amount of information the client returns. Options include All Messages, Only Success And Error Messages, and Only Error Messages.
  • License Agreement Choose automatic deployment of software updates that do not include a license agreement or choose deployment of software updates regardless of whether they have a license agreement.

Software Updates

Enables you to select the property filters and specify the respective search criteria you use to add software updates to the associated software update group.

Evaluation Schedule

Enables you to specify a schedule for running a rule. By default, the evaluation schedule is set to run after any software update-point synchronization. If you choose to run the rule on a specific schedule, you should ensure that the evaluation schedule does not exceed the frequency of the synchronization schedule for the software update point.

Deployment Schedule

Enables you to configure deployment schedule settings, including:

  • Whether the schedule is evaluated by using the client’s local time or Coordinated Universal Time. The latter ensures that deployment occurs at the same time for all clients, regardless of their time zone location.
  • Software available time. The Software Available Time section enables you to schedule when the deployment will become available to clients.
  • An installation deadline. When a scheduled deadline is reached, the software updates in the associated software update group install on the client computers, and the computers restart if necessary and allowed.

User Experience

Enables you to specify various options for the user experience. Three sections outline the user experience:

  • User Visual Experience Use one of three options for user notifications selection: Display In Software Center And Show All Notifications; Display In Software Center, And Only Show Notification For Computer Restarts; and Hide In Software Center And All Notifications.
  • Deadline Behavior Specify activities that can take place outside a configured maintenance window. The options include Software Installation and System Restart.
  • Device Restart Behavior Specify whether to suppress a restart for servers, workstations, or both.

Alerts

Enables you to specify criteria for generating a Configuration Manager alert. You also can specify alert behavior in relation to Operations Manager. For example, to minimize false alerts, you might choose to disable Operations Manager alerts whenever software updates install on a computer.

Download Settings

On the Download Settings page, you can:

  • Specify how software updates run when connected to a slow or unreliable net-work boundary. By design, when a client connects to a fast network boundary, the client downloads content from the distribution point and then installs the software updates locally. By default, when a client connects to a slow network boundary, the client does not install software updates.
  • Configure the deployment so that clients can download updates from an unprotected distribution point if they are not available on a protected distribution point.
  • Enable peer-to-peer content distribution, which uses BranchCache functionality.
  • Configure clients to download the content directly from Microsoft Updates if it is not available on a distribution point.
  • Configure clients on a metered connection to download the content after the installation deadline.

Deployment Package

Enables you to select an existing deployment package or create a new deployment package so that updates deploy from an automatic deployment rule. The deployment package specifies the package source for the deployment. You must create and share the package source folder that the deployment package uses. Each deployment pack-age uses its own shared folder.

Distribution Points

Enables you to specify the distribution points or distribution-point groups that host the package files for deployment. This page is visible only if you are creating a new deploy-ment package.

Download Location

Enables you to specify the location from which you download the software update files. If you have an Internet connection from the software update point, you can select Download Software Updates From The Internet. If you do not have an Internet connection from the software update point, you can download the software updates manually from a different computer and then store the files on an accessible network location.

Language Selection

Specifies the languages that you should download for each software update file.

Summary

The summary page enables you to verify the Automatic Deployment Rule Wizard settings. You also can click the Save As Template button to save the settings that you want to use for subsequent deployments. When you click the Save As Template button, you can select the specific settings that you want to include in the saved template.

Objective summary

  • The Configuration Manager software update point integrates with WSUS to allow software updates to be deployed to Configuration Manager clients.
  • The Configuration Manager software update point integrates with WSUS 3.0 SP2 or newer.
  • The software-updates synchronization process retrieves the metadata from an upstream software update point or from Microsoft Update.
  • You configure Client Settings to specify the software update configuration settings for Configuration Manager clients.
  • Scanning for compliance enables you to determine whether Configuration Manager clients are missing updates.
  • A software update group is a collection of software updates.
  • Deploying software updates involves creating a deployment package, downloading the software update files, and then distributing them to distribution points.
  • You can use several methods to monitor and troubleshoot the client compliance and deployment of software updates, including the All Software Updates results pane, alerts, status messages, reports, WSUS logs, server-side logs, and client logs.

Objective review

Answer the following questions to test your knowledge of the information in this objective. You can find the answers to these questions and explanations of why each answer choice is correct or incorrect in the “Answers” section at the end of the chapter.

  1. You are configuring the connection between the Configuration Manager software update point and a separate WSUS server hosted on a computer running the Windows Server 2012 R2 operating system. This WSUS server is configured using default ports and is configured to accept only secure (HTTPS) traffic. Which port will the Configuration Manager software update point need to use for a connection?

    1. 8530
    2. 8531
    3. 80
    4. 443
  2. Which of the following log files would you examine to review information about synchronization between the software update point and a WSUS server?

    1. Wsyncmgr.log
    2. WSUSCtrl.log
    3. SoftwareDistribution.log
    4. ScanAgent.log
  3. Which of the following compliance states indicates that an update should be deployed to a client computer?

    1. Unknown
    2. Installed
    3. Not Required
    4. Required